Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FTE98767800000.bat.exe

Overview

General Information

Sample name:FTE98767800000.bat.exe
Analysis ID:1494146
MD5:e418c8ddea38739c5fa4e6ee469ffd47
SHA1:52ee59d5c7d3768056ac7809aea362e8adbeaa74
SHA256:8fcca28a02a116ed9c02bfdcbe3bfb47206592110805aaeda4ad5c55aba82a74
Tags:exeRATRemcosRAT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Disables UAC (registry)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Mail credentials (via file registry)
Uses regedit.exe to modify the Windows registry
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • FTE98767800000.bat.exe (PID: 6788 cmdline: "C:\Users\user\Desktop\FTE98767800000.bat.exe" MD5: E418C8DDEA38739C5FA4E6EE469FFD47)
    • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1548 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 1672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1056 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • regedit.exe (PID: 4088 cmdline: "C:\Windows\regedit.exe" MD5: 999A30979F6195BF562068639FFC4426)
    • wmplayer.exe (PID: 2104 cmdline: "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" MD5: A7790328035BBFCF041A6D815F9C28DF)
    • svchost.exe (PID: 6736 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • cmd.exe (PID: 1080 cmdline: "C:\Windows\System32\cmd.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • calc.exe (PID: 64 cmdline: "C:\Windows\System32\calc.exe" MD5: 5DA8C98136D98DFEC4716EDD79C7145F)
    • iexplore.exe (PID: 4596 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
      • iexplore.exe (PID: 3472 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\bknppbdkpzebeql" MD5: 6F0F06D6AB125A99E43335427066A4A1)
      • iexplore.exe (PID: 2244 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay" MD5: 6F0F06D6AB125A99E43335427066A4A1)
      • iexplore.exe (PID: 6096 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay" MD5: 6F0F06D6AB125A99E43335427066A4A1)
      • iexplore.exe (PID: 5052 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\nhgsrmyfrpotrkvlriveph" MD5: 6F0F06D6AB125A99E43335427066A4A1)
    • WerFault.exe (PID: 5696 cmdline: C:\Windows\system32\WerFault.exe -u -p 6788 -s 1244 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "192.210.150.26:8787:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-Q4NYK2", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000A.00000002.3358064621.00000000049CF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 61 entries
              SourceRuleDescriptionAuthorStrings
              0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x690b8:$a1: Remcos restarted by watchdog!
                    • 0x69630:$a3: %02i:%02i:%02i:%03i
                    0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6310c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x63088:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x63088:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x63588:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x63db8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6317c:$str_b2: Executing file:
                    • 0x641fc:$str_b3: GetDirectListeningPort
                    • 0x63ba8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x63d28:$str_b7: \update.vbs
                    • 0x631a4:$str_b9: Downloaded file:
                    • 0x63190:$str_b10: Downloading file:
                    • 0x63234:$str_b12: Failed to upload file:
                    • 0x641c4:$str_b13: StartForward
                    • 0x641e4:$str_b14: StopForward
                    • 0x63c80:$str_b15: fso.DeleteFile "
                    • 0x63c14:$str_b16: On Error Resume Next
                    • 0x63cb0:$str_b17: fso.DeleteFolder "
                    • 0x63224:$str_b18: Uploaded file:
                    • 0x631e4:$str_b19: Unable to delete:
                    • 0x63c48:$str_b20: while fso.FileExists("
                    • 0x636c1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 83 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FTE98767800000.bat.exe", ParentImage: C:\Users\user\Desktop\FTE98767800000.bat.exe, ParentProcessId: 6788, ParentProcessName: FTE98767800000.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, ProcessId: 1548, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FTE98767800000.bat.exe", ParentImage: C:\Users\user\Desktop\FTE98767800000.bat.exe, ParentProcessId: 6788, ParentProcessName: FTE98767800000.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, ProcessId: 1548, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FTE98767800000.bat.exe", ParentImage: C:\Users\user\Desktop\FTE98767800000.bat.exe, ParentProcessId: 6788, ParentProcessName: FTE98767800000.bat.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 6736, ProcessName: svchost.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FTE98767800000.bat.exe", ParentImage: C:\Users\user\Desktop\FTE98767800000.bat.exe, ParentProcessId: 6788, ParentProcessName: FTE98767800000.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force, ProcessId: 1548, ProcessName: powershell.exe
                    Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FTE98767800000.bat.exe", ParentImage: C:\Users\user\Desktop\FTE98767800000.bat.exe, ParentProcessId: 6788, ParentProcessName: FTE98767800000.bat.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 6736, ProcessName: svchost.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files (x86)\Internet Explorer\iexplore.exe, ProcessId: 4596, TargetFilename: C:\ProgramData\remcos\logs.dat
                    Timestamp:2024-08-17T06:07:07.568075+0200
                    SID:2803304
                    Severity:3
                    Source Port:49701
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-08-17T06:07:05.582956+0200
                    SID:2032777
                    Severity:1
                    Source Port:8787
                    Destination Port:49699
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-17T06:07:04.783463+0200
                    SID:2032776
                    Severity:1
                    Source Port:49699
                    Destination Port:8787
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "192.210.150.26:8787:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-Q4NYK2", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: FTE98767800000.bat.exeReversingLabs: Detection: 26%
                    Source: FTE98767800000.bat.exeVirustotal: Detection: 49%Perma Link
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3358064621.00000000049CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: FTE98767800000.bat.exeJoe Sandbox ML: detected
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,10_2_004338C8
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_65b5b348-f

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00407538 _wcslen,CoGetObject,10_2_00407538
                    Source: FTE98767800000.bat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFC2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Users\user\Desktop\FTE98767800000.bat.PDBe"e48 source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFC2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb$/ source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbModel, V source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: .pdbHJ source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\user\Desktop\FTE98767800000.bat.PDB source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Core.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Management.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: C:\Users\user\Desktop\FTE98767800000.bat.PDB@ source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmp, WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.pdbq1 source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: .VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: scorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb0 source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Management.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Management.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdba source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: scorlib.pdb5 source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: pC:\Users\user\Desktop\FTE98767800000.bat.PDB source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: FTE98767800000.bat.PDB source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_0040928E
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,10_2_0041C322
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,10_2_0040C388
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_004096A0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,10_2_00408847
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00407877 FindFirstFileW,FindNextFileW,10_2_00407877
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0044E8F9 FindFirstFileExA,10_2_0044E8F9
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040BB6B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00419B86
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040BD72
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_100010F1
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_10006580 FindFirstFileExA,10_2_10006580
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407EF8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,20_2_00407898
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,10_2_00407CD2

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49699 -> 192.210.150.26:8787
                    Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 192.210.150.26:8787 -> 192.168.2.6:49699
                    Source: Malware configuration extractorURLs: 192.210.150.26
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49701 -> 178.237.33.50:80
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,10_2_0041B411
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: iexplore.exe, 0000000A.00000002.3359669312.0000000006410000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                    Source: iexplore.exe, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                    Source: iexplore.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                    Source: iexplore.exe, 00000010.00000002.2198814517.0000000004718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                    Source: iexplore.exe, 00000010.00000002.2198814517.0000000004718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                    Source: iexplore.exe, 0000000A.00000002.3359370619.00000000062E0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                    Source: iexplore.exe, 0000000A.00000002.3359370619.00000000062E0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                    Source: iexplore.exe, 0000000A.00000003.2203147763.0000000005A5A000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2203261489.0000000005A68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                    Source: iexplore.exe, iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3359161902.0000000005C49000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2203319931.0000000005C49000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2202911040.0000000005C49000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, regedit.exe, 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, cmd.exe, 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, calc.exe, 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: iexplore.exe, 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp6
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                    Source: iexplore.exe, 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0:
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0H
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0I
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0Q
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.msocsp.com0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://ocsp.msocsp.com0S
                    Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: http://www.digicert.com/CPS0~
                    Source: iexplore.exe, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                    Source: iexplore.exe, iexplore.exe, 00000014.00000003.2171073888.000000000325D000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000014.00000003.2171137311.000000000325D000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                    Source: iexplore.exe, 0000000A.00000002.3359669312.0000000006410000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                    Source: iexplore.exe, 00000014.00000003.2171073888.000000000325D000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000014.00000003.2171137311.000000000325D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
                    Source: iexplore.exe, 0000000A.00000002.3359669312.0000000006410000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                    Source: iexplore.exe, 00000010.00000002.2198397623.00000000008F4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                    Source: iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                    Source: iexplore.exeString found in binary or memory: https://login.yahoo.com/config/login
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://www.digicert.com/CPS0
                    Source: iexplore.exe, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: iexplore.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                    Source: bhv4F2B.tmp.16.drString found in binary or memory: https://www.office.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000010_2_0040A2F3
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\Internet Explorer\iexplore.exeJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,10_2_0040B749
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,10_2_004168FC
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,16_2_0040987A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_004098E2
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,19_2_00406DFC
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,19_2_00406E9F
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,20_2_004068B5
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,20_2_004072B5
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,10_2_0040B749
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,10_2_0040A41B
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3358064621.00000000049CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041CA73 SystemParametersInfoW,10_2_0041CA73

                    System Summary

                    barindex
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,10_2_0041812A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,10_2_0041330D
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,10_2_0041BBC6
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,10_2_0041BB9A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00401806 NtdllDefWindowProc_W,16_2_00401806
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_004018C0 NtdllDefWindowProc_W,16_2_004018C0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_004016FD NtdllDefWindowProc_A,19_2_004016FD
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_004017B7 NtdllDefWindowProc_A,19_2_004017B7
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_00402CAC NtdllDefWindowProc_A,20_2_00402CAC
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_00402D66 NtdllDefWindowProc_A,20_2_00402D66
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,10_2_004167EF
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348C69350_2_00007FFD348C6935
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348C54C50_2_00007FFD348C54C5
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B0A050_2_00007FFD348B0A05
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B5D700_2_00007FFD348B5D70
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348BD5600_2_00007FFD348BD560
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348BAF500_2_00007FFD348BAF50
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348BAF480_2_00007FFD348BAF48
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B83450_2_00007FFD348B8345
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B5E7B0_2_00007FFD348B5E7B
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348BF3ED0_2_00007FFD348BF3ED
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348BFF7A0_2_00007FFD348BFF7A
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B11FA0_2_00007FFD348B11FA
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B95950_2_00007FFD348B9595
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348C1E6A0_2_00007FFD348C1E6A
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348C63FB0_2_00007FFD348C63FB
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348C63860_2_00007FFD348C6386
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD349A03F30_2_00007FFD349A03F3
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043706A10_2_0043706A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041400510_2_00414005
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043E11C10_2_0043E11C
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004541D910_2_004541D9
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004381E810_2_004381E8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041F18B10_2_0041F18B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0044627010_2_00446270
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043E34B10_2_0043E34B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004533AB10_2_004533AB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0042742E10_2_0042742E
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043756610_2_00437566
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043E5A810_2_0043E5A8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004387F010_2_004387F0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043797E10_2_0043797E
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004339D710_2_004339D7
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0044DA4910_2_0044DA49
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00427AD710_2_00427AD7
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041DBF310_2_0041DBF3
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00427C4010_2_00427C40
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00437DB310_2_00437DB3
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00435EEB10_2_00435EEB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043DEED10_2_0043DEED
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00426E9F10_2_00426E9F
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_1001719410_2_10017194
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_1000B5C110_2_1000B5C1
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044B04016_2_0044B040
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0043610D16_2_0043610D
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044731016_2_00447310
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044A49016_2_0044A490
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040755A16_2_0040755A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0043C56016_2_0043C560
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044B61016_2_0044B610
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044D6C016_2_0044D6C0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_004476F016_2_004476F0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044B87016_2_0044B870
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044081D16_2_0044081D
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0041495716_2_00414957
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_004079EE16_2_004079EE
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00407AEB16_2_00407AEB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044AA8016_2_0044AA80
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00412AA916_2_00412AA9
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00404B7416_2_00404B74
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00404B0316_2_00404B03
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0044BBD816_2_0044BBD8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00404BE516_2_00404BE5
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00404C7616_2_00404C76
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00415CFE16_2_00415CFE
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00416D7216_2_00416D72
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00446D3016_2_00446D30
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00446D8B16_2_00446D8B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00406E8F16_2_00406E8F
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0040503819_2_00405038
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0041208C19_2_0041208C
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_004050A919_2_004050A9
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0040511A19_2_0040511A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0043C13A19_2_0043C13A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_004051AB19_2_004051AB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0044930019_2_00449300
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0040D32219_2_0040D322
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0044A4F019_2_0044A4F0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0043A5AB19_2_0043A5AB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0041363119_2_00413631
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0044669019_2_00446690
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0044A73019_2_0044A730
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_004398D819_2_004398D8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_004498E019_2_004498E0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0044A88619_2_0044A886
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0043DA0919_2_0043DA09
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00438D5E19_2_00438D5E
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00449ED019_2_00449ED0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_0041FE8319_2_0041FE83
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00430F5419_2_00430F54
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_004050C220_2_004050C2
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_004014AB20_2_004014AB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_0040513320_2_00405133
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_004051A420_2_004051A4
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_0040124620_2_00401246
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_0040CA4620_2_0040CA46
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_0040523520_2_00405235
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_004032C820_2_004032C8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_0040168920_2_00401689
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_00402F6020_2_00402F60
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 004169A7 appears 87 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 004165FF appears 35 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00434801 appears 41 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00422297 appears 42 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 0044DB70 appears 41 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00401E65 appears 35 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00444B5A appears 37 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00413025 appears 79 times
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00416760 appears 69 times
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6788 -s 1244
                    Source: FTE98767800000.bat.exeStatic PE information: No import functions for PE file found
                    Source: FTE98767800000.bat.exe, 00000000.00000000.2092430738.000002B7B4822000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHolyaya.exe0 vs FTE98767800000.bat.exe
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIjawoxafesazuroH vs FTE98767800000.bat.exe
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs FTE98767800000.bat.exe
                    Source: FTE98767800000.bat.exeBinary or memory string: OriginalFilenameHolyaya.exe0 vs FTE98767800000.bat.exe
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@27/14@1/2
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,16_2_004182CE
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,10_2_0041798D
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,20_2_00410DE1
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,16_2_00418758
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,10_2_0040F4AF
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,10_2_0041B539
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,10_2_0041AADB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].jsonJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1672:120:WilError_03
                    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6788
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yrmdn24b.yo2.ps1Jump to behavior
                    Source: FTE98767800000.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: FTE98767800000.bat.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: iexplore.exe, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: iexplore.exe, iexplore.exe, 00000013.00000002.2170242090.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: iexplore.exe, 0000000A.00000002.3359370619.00000000062E0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                    Source: iexplore.exe, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                    Source: iexplore.exe, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: iexplore.exe, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: iexplore.exe, 00000010.00000002.2198874700.0000000004C3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: iexplore.exe, iexplore.exe, 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: FTE98767800000.bat.exeReversingLabs: Detection: 26%
                    Source: FTE98767800000.bat.exeVirustotal: Detection: 49%
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeFile read: C:\Users\user\Desktop\FTE98767800000.bat.exeJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                    Source: unknownProcess created: C:\Users\user\Desktop\FTE98767800000.bat.exe "C:\Users\user\Desktop\FTE98767800000.bat.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\calc.exe "C:\Windows\System32\calc.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6788 -s 1244
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\bknppbdkpzebeql"
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay"
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay"
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\nhgsrmyfrpotrkvlriveph"
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\calc.exe "C:\Windows\System32\calc.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\bknppbdkpzebeql"Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay"Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay"Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\nhgsrmyfrpotrkvlriveph"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: FTE98767800000.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: FTE98767800000.bat.exeStatic file information: File size 1461889 > 1048576
                    Source: FTE98767800000.bat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFC2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Users\user\Desktop\FTE98767800000.bat.PDBe"e48 source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFC2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb$/ source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbModel, V source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: .pdbHJ source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\user\Desktop\FTE98767800000.bat.PDB source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Core.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Management.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: C:\Users\user\Desktop\FTE98767800000.bat.PDB@ source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2221245307.000002B7B4AB2000.00000004.00000020.00020000.00000000.sdmp, WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.pdbq1 source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: .VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: scorlib.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb0 source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Drawing.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Management.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Management.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdba source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: scorlib.pdb5 source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFF4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: pC:\Users\user\Desktop\FTE98767800000.bat.PDB source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: FTE98767800000.bat.PDB source: FTE98767800000.bat.exe, 00000000.00000002.2216972063.000000C2CAAF2000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WER88BB.tmp.dmp.13.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER88BB.tmp.dmp.13.dr
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041CBE1
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B8118 push ebx; ret 0_2_00007FFD348B816A
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B8248 push ebx; retn 5F4Ch0_2_00007FFD348B826A
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348C6FF6 pushfd ; retf 0_2_00007FFD348C6FF8
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD348B77F2 push edi; retf 0008h0_2_00007FFD348B77F3
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeCode function: 0_2_00007FFD349A01B8 push esp; retf 4810h0_2_00007FFD349A0312
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00406EEB ShellExecuteW,URLDownloadToFileW,10_2_00406EEB
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,10_2_0041AADB

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041CBE1
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040F7E2 Sleep,ExitProcess,10_2_0040F7E2
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLP
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAMEP
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory allocated: 2B7B4B50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory allocated: 2B7CE670000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sysJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sysJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeFile opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sysJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,10_2_0041A7D9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5760Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3983Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_10-53193
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI coverage: 8.3 %
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4080Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_0040928E
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,10_2_0041C322
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,10_2_0040C388
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_004096A0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,10_2_00408847
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00407877 FindFirstFileW,FindNextFileW,10_2_00407877
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0044E8F9 FindFirstFileExA,10_2_0044E8F9
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040BB6B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00419B86
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040BD72
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_100010F1
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_10006580 FindFirstFileExA,10_2_10006580
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 19_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407EF8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 20_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,20_2_00407898
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,10_2_00407CD2
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_00418981 memset,GetSystemInfo,16_2_00418981
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMUP
                    Source: Amcache.hve.13.drBinary or memory string: VMware
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware ToolsP
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Amcache.hve.13.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3359161902.0000000005C49000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2203319931.0000000005C49000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2202911040.0000000005C49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: Amcache.hve.13.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.13.drBinary or memory string: vmci.sys
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREpv
                    Source: Amcache.hve.13.drBinary or memory string: VMware20,1
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sysP
                    Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.13.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Amcache.hve.13.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.13.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREP
                    Source: Amcache.hve.13.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareP
                    Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.13.drBinary or memory string: VMware20,1hbin@
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sysP
                    Source: Amcache.hve.13.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.13.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.13.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                    Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: bhv4F2B.tmp.16.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\P
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Amcache.hve.13.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIP
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sysP
                    Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.13.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: iexplore.exe, 00000010.00000003.2189528292.0000000004C31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2225577568.000002B7CEFC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: FTE98767800000.bat.exe, 00000000.00000002.2222022778.000002B7B6693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI call chain: ExitProcess graph end nodegraph_10-54729
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00434A8A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041CBE1
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00443355 mov eax, dword ptr fs:[00000030h]10_2_00443355
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_10004AB4 mov eax, dword ptr fs:[00000030h]10_2_10004AB4
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,10_2_00411D39
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0043503C
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00434A8A
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0043BB71
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00434BD8 SetUnhandledExceptionFilter,10_2_00434BD8
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_100060E2
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_10002639
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_10002B1C
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: FTE98767800000.bat.exe, --------.csReference to suspicious API methods: _31E1.LoadLibrary(_31E1._31D8(_31CE_31C3_A9BE_31DF_A9BA_3207._3193_31D5_3214_31C4_A97D_31D3_31C8_D7FD))
                    Source: FTE98767800000.bat.exe, -.csReference to suspicious API methods: GetProcAddress(_320C_31D9_31D2_3200_31CE, _31CA_3221_D7C7)
                    Source: FTE98767800000.bat.exe, -.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)_A97E.Length, 64u, out var _3222_318F_322A_3229_31EC)
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -ForceJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,10_2_0041812A
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 459000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 471000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 477000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 478000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 479000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\regedit.exe base: 47E000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 459000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 471000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 477000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 478000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 479000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\svchost.exe base: 47E000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 459000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 471000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 477000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 478000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 479000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\cmd.exe base: 47E000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 459000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 471000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 477000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 478000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 479000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Windows\System32\calc.exe base: 47E000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 459000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 471000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 477000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 478000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 479000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 47E000Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 877008Jump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe10_2_00412132
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00419662 mouse_event,10_2_00419662
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Windows\System32\calc.exe "C:\Windows\System32\calc.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
                    Source: iexplore.exe, 0000000A.00000002.3358885755.0000000005A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager;C:\
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager!
                    Source: iexplore.exe, 0000000A.00000003.2203147763.0000000005A5A000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2203261489.0000000005A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*
                    Source: iexplore.exe, 0000000A.00000002.3358885755.0000000005A68000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerK2\
                    Source: iexplore.exe, 0000000A.00000002.3358885755.0000000005A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerK2\cf
                    Source: iexplore.exe, 0000000A.00000002.3358885755.0000000005A68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet/
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, logs.dat.10.drBinary or memory string: [Program Manager]
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00434CB6 cpuid 10_2_00434CB6
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,10_2_0045201B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,10_2_004520B6
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_2_00452143
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,10_2_00452393
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,10_2_00448484
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_004524BC
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,10_2_004525C3
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_00452690
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,10_2_0044896D
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoA,10_2_0040F90C
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,10_2_00451D58
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,10_2_00451FD0
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeQueries volume information: C:\Users\user\Desktop\FTE98767800000.bat.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00404F51 GetLocalTime,CreateEventA,CreateThread,10_2_00404F51
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_0041B69E GetComputerNameExW,GetUserNameW,10_2_0041B69E
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 10_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,10_2_00449210
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 16_2_0041739B GetVersionExW,16_2_0041739B
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Users\user\Desktop\FTE98767800000.bat.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
                    Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3358064621.00000000049CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data10_2_0040BA4D
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\10_2_0040BB6B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \key3.db10_2_0040BB6B
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: ESMTPPassword19_2_004033F0
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword19_2_00402DB3
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword19_2_00402DB3
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3472, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-Q4NYK2Jump to behavior
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.regedit.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c688b578.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c6812b30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FTE98767800000.bat.exe.2b7c67462f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3358064621.00000000049CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FTE98767800000.bat.exe PID: 6788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: regedit.exe PID: 4088, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: calc.exe PID: 64, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 4596, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: cmd.exe10_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    21
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts111
                    Native API
                    1
                    Windows Service
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts12
                    Command and Scripting Interpreter
                    Logon Script (Windows)1
                    Access Token Manipulation
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Remote Access Software
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    1
                    DLL Side-Loading
                    2
                    Credentials In Files
                    3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script422
                    Process Injection
                    1
                    Bypass User Account Control
                    LSA Secrets37
                    System Information Discovery
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials261
                    Security Software Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Modify Registry
                    DCSync151
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job151
                    Virtualization/Sandbox Evasion
                    Proc Filesystem4
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1494146 Sample: FTE98767800000.bat.exe Startdate: 17/08/2024 Architecture: WINDOWS Score: 100 36 geoplugin.net 2->36 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 19 other signatures 2->48 8 FTE98767800000.bat.exe 1 4 2->8         started        signatures3 process4 signatures5 50 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->50 52 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->52 54 Uses regedit.exe to modify the Windows registry 8->54 56 4 other signatures 8->56 11 iexplore.exe 3 15 8->11         started        16 powershell.exe 23 8->16         started        18 WerFault.exe 19 16 8->18         started        20 6 other processes 8->20 process6 dnsIp7 38 192.210.150.26, 49699, 49700, 8787 AS-COLOCROSSINGUS United States 11->38 40 geoplugin.net 178.237.33.50, 49701, 49702, 80 ATOM86-ASATOM86NL Netherlands 11->40 34 C:\ProgramData\remcos\logs.dat, data 11->34 dropped 58 Detected Remcos RAT 11->58 60 Maps a DLL or memory area into another process 11->60 62 Installs a global keyboard hook 11->62 22 iexplore.exe 2 11->22         started        24 iexplore.exe 1 11->24         started        26 iexplore.exe 1 11->26         started        28 iexplore.exe 11->28         started        64 Loading BitLocker PowerShell Module 16->64 30 WmiPrvSE.exe 16->30         started        32 conhost.exe 16->32         started        file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    FTE98767800000.bat.exe26%ReversingLabsWin64.Trojan.Generic
                    FTE98767800000.bat.exe49%VirustotalBrowse
                    FTE98767800000.bat.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    geoplugin.net1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.imvu.comr0%URL Reputationsafe
                    http://www.imvu.comr0%URL Reputationsafe
                    http://www.imvu.com0%URL Reputationsafe
                    http://www.imvu.com0%URL Reputationsafe
                    http://upx.sf.net0%URL Reputationsafe
                    https://aefd.nelreports.net/api/report?cat=bingaotak0%URL Reputationsafe
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%URL Reputationsafe
                    https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                    http://geoplugin.net/json.gpSystem320%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    https://aefd.nelreports.net/api/report?cat=bingaot0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    https://aefd.nelreports.net/api/report?cat=bingrms0%URL Reputationsafe
                    https://login.yahoo.com/config/login0%URL Reputationsafe
                    http://www.ebuddy.com0%URL Reputationsafe
                    https://aefd.nelreports.net/api/report?cat=wsb0%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingth0%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingth0%VirustotalBrowse
                    https://www.office.com/0%VirustotalBrowse
                    http://www.imvu.compData0%Avira URL Cloudsafe
                    http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
                    https://www.office.com/0%Avira URL Cloudsafe
                    http://www.nirsoft.net0%Avira URL Cloudsafe
                    http://geoplugin.net/json.gp60%Avira URL Cloudsafe
                    192.210.150.260%Avira URL Cloudsafe
                    http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                    https://www.google.com0%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=wsb0%VirustotalBrowse
                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL0%Avira URL Cloudsafe
                    http://www.nirsoft.net0%VirustotalBrowse
                    http://geoplugin.net/0%Avira URL Cloudsafe
                    https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat0%Avira URL Cloudsafe
                    https://www.google.com0%VirustotalBrowse
                    http://geoplugin.net/json.gp60%VirustotalBrowse
                    https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                    http://geoplugin.net/json.gpl0%VirustotalBrowse
                    http://www.nirsoft.net/0%Avira URL Cloudsafe
                    http://geoplugin.net/1%VirustotalBrowse
                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&0%Avira URL Cloudsafe
                    192.210.150.262%VirustotalBrowse
                    https://www.google.com/accounts/servicelogin0%VirustotalBrowse
                    http://www.nirsoft.net/0%VirustotalBrowse
                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    geoplugin.net
                    178.237.33.50
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    192.210.150.26true
                    • 2%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gpfalse
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.office.com/bhv4F2B.tmp.16.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.imvu.comriexplore.exe, 0000000A.00000002.3359669312.0000000006410000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gpliexplore.exe, 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.imvu.compDataiexplore.exe, 00000014.00000003.2171073888.000000000325D000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000014.00000003.2171137311.000000000325D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingthbhv4F2B.tmp.16.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.imvu.comiexplore.exe, iexplore.exe, 00000014.00000003.2171073888.000000000325D000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000014.00000003.2171137311.000000000325D000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=wsbbhv4F2B.tmp.16.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://upx.sf.netAmcache.hve.13.drfalse
                    • URL Reputation: safe
                    unknown
                    http://www.nirsoft.netiexplore.exe, 00000010.00000002.2198397623.00000000008F4000.00000004.00000010.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingaotakbhv4F2B.tmp.16.drfalse
                    • URL Reputation: safe
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv4F2B.tmp.16.drfalse
                    • URL Reputation: safe
                    unknown
                    https://deff.nelreports.net/api/report?cat=msnbhv4F2B.tmp.16.drfalse
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gp6iexplore.exe, 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gpSystem32iexplore.exe, 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comiexplore.exe, 0000000A.00000002.3359669312.0000000006410000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.comiexplore.exe, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhv4F2B.tmp.16.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/iexplore.exe, 0000000A.00000003.2203147763.0000000005A5A000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000003.2203261489.0000000005A68000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingaotbhv4F2B.tmp.16.drfalse
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gp/CFTE98767800000.bat.exe, 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, regedit.exe, 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, cmd.exe, 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, calc.exe, 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, iexplore.exe, 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv4F2B.tmp.16.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingrmsbhv4F2B.tmp.16.drfalse
                    • URL Reputation: safe
                    unknown
                    https://www.google.com/accounts/serviceloginiexplore.exefalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://login.yahoo.com/config/loginiexplore.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.nirsoft.net/iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv4F2B.tmp.16.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ebuddy.comiexplore.exe, iexplore.exe, 00000014.00000002.2171255797.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    192.210.150.26
                    unknownUnited States
                    36352AS-COLOCROSSINGUStrue
                    178.237.33.50
                    geoplugin.netNetherlands
                    8455ATOM86-ASATOM86NLfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1494146
                    Start date and time:2024-08-17 06:06:10 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 38s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:24
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:FTE98767800000.bat.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.expl.evad.winEXE@27/14@1/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 92%
                    • Number of executed functions: 135
                    • Number of non-executed functions: 262
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 13.89.179.12
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.
                    TimeTypeDescription
                    00:07:02API Interceptor19x Sleep call for process: powershell.exe modified
                    00:07:10API Interceptor1x Sleep call for process: WerFault.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    178.237.33.50Request For Quotation 34333.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    • geoplugin.net/json.gp
                    Order_2480500093314.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • geoplugin.net/json.gp
                    Quotation.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    Mcib4Llptj.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    waybill_shipping_documents_original_BL_CI&PL_11_08_2024_000000002024_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                    • geoplugin.net/json.gp
                    DHL-66445735750-DHL-66445735750-DHL-66445735750.jsGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    FLUID CONTROLS PRIVATE LIMITED.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    SecuriteInfo.com.Trojan.PackedNET.3021.26937.12766.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • geoplugin.net/json.gp
                    Payment_Advice_REMITTANCE _USD105090-AUG-13-070224-000218.com.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.13950.5767.rtfGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    geoplugin.netRequest For Quotation 34333.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    Order_2480500093314.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 178.237.33.50
                    Quotation.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Mcib4Llptj.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    waybill_shipping_documents_original_BL_CI&PL_11_08_2024_000000002024_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                    • 178.237.33.50
                    DHL-66445735750-DHL-66445735750-DHL-66445735750.jsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    FLUID CONTROLS PRIVATE LIMITED.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    SecuriteInfo.com.Trojan.PackedNET.3021.26937.12766.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 178.237.33.50
                    Payment_Advice_REMITTANCE _USD105090-AUG-13-070224-000218.com.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.13950.5767.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AS-COLOCROSSINGUSrfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                    • 23.94.239.112
                    rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                    • 23.94.239.112
                    rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                    • 23.94.239.112
                    Comprobante_swift_8986.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                    • 192.3.216.142
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.28515.30848.rtfGet hashmaliciousFormBookBrowse
                    • 192.210.150.33
                    weneedyou.htaGet hashmaliciousCobalt StrikeBrowse
                    • 107.173.143.28
                    OC 20240814.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                    • 107.172.31.13
                    Orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                    • 107.172.31.13
                    C#U00f3pia do comprovante de pagamento.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                    • 107.172.31.13
                    OC 20240912.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                    • 107.172.31.13
                    ATOM86-ASATOM86NLRequest For Quotation 34333.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    Order_2480500093314.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 178.237.33.50
                    Quotation.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Mcib4Llptj.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    waybill_shipping_documents_original_BL_CI&PL_11_08_2024_000000002024_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                    • 178.237.33.50
                    DHL-66445735750-DHL-66445735750-DHL-66445735750.jsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    FLUID CONTROLS PRIVATE LIMITED.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    SecuriteInfo.com.Trojan.PackedNET.3021.26937.12766.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 178.237.33.50
                    Payment_Advice_REMITTANCE _USD105090-AUG-13-070224-000218.com.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.13950.5767.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    No context
                    No context
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):1.2399579430715
                    Encrypted:false
                    SSDEEP:192:roe5Rx+wcNX9ii0sLolaWxUUXeZg/zuiF5Z24lO87o:rokewcNX90sLolaGUZKzuiF5Y4lO87
                    MD5:588C02385C24D5BA191F90F8BA40776F
                    SHA1:CAC4870EAFB2754C5FA021557C18C3715543298A
                    SHA-256:F4CA4770AA40200D3A00EA46B623B62736995E046420BE39F57782A471251376
                    SHA-512:CE8EC64EFE99BF165CD169D46B4F2BB3F0AFBA9F2095B43AA93CE381128CCD4B9C6199605F80EA31B67682D624C0E9A59F233B937072D53FA05F1CF1E557B603
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.8.3.4.1.2.2.4.1.3.5.7.8.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.8.3.4.1.2.2.5.6.3.5.7.9.1.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.0.4.4.e.b.2.8.-.e.2.e.f.-.4.7.0.a.-.8.3.5.e.-.7.9.b.0.6.5.9.1.3.9.8.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.e.d.d.4.b.c.7.-.5.0.1.a.-.4.1.b.a.-.8.0.1.9.-.7.1.a.c.e.7.a.d.b.4.c.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.F.T.E.9.8.7.6.7.8.0.0.0.0.0...b.a.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.H.o.l.y.a.y.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.8.4.-.0.0.0.1.-.0.0.1.5.-.2.a.9.e.-.7.a.e.7.5.a.f.0.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.7.1.1.2.a.4.9.a.e.e.1.6.b.8.0.3.a.8.e.7.5.f.8.c.b.7.3.f.7.c.b.0.0.0.0.0.0.0.0.!.0.0.0.0.5.2.e.e.5.9.d.5.c.7.d.3.7.6.8.0.5.6.a.c.7.8.0.9.a.e.a.3.6.2.e.8.a.d.b.e.a.a.7.4.!.F.T.E.9.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 16 streams, Sat Aug 17 04:07:04 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):474302
                    Entropy (8bit):3.266153958967013
                    Encrypted:false
                    SSDEEP:6144:DvHLBW19cWD72Ya4qhF3QhI8+45ysST4FL5GuI/npE:DC9cojqTQyRc
                    MD5:62198314DB36178C37CC3CA5E4525193
                    SHA1:358F4E32F3777429081D030C2F0BDFB7C3F0CBB5
                    SHA-256:FDDA021BE711676E1D933EB467622B68C3F41E3B7D62D2E195951AD72D3BA22D
                    SHA-512:E7080AE8922336845EBA17ECAA7380BC0695FDD28DAC6AAA8078ABB804F7D2D54ECFBC148DA62CDB02DE5982644B56F850246A1D336CFF740EF1EB0CE6345E0D
                    Malicious:false
                    Preview:MDMP..a..... ........!.f............t...........<...........$....(......("...(.......R..............l.......8...........T............>...............K...........M..............................................................................eJ.......M......Lw......................T............!.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8654
                    Entropy (8bit):3.7047891573861276
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJx8m6Y2DBNhXgmfZd6prr89bV9MvfOjflm:R6lXJam6YcNhgmfTDV9MfOro
                    MD5:8CC762DE5A893BDD680172CA7B3FBB40
                    SHA1:60A89756F7FFE379D5995A582718F1D4483615BB
                    SHA-256:55670D92D4979872C20AF785D16C2B348082A9D67F08DBCB5A928C31C78FE29D
                    SHA-512:1C5145BD66720C4203978255DC5B4CA57D0EEC00943FA9159CEE66D578CF7DFDB6551B93E60A3ABBFDBCB1F9D6C36569DFB015635379FF1716FA76BB6040B5EB
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.8.8.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4850
                    Entropy (8bit):4.506189306697447
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsxJg771I9OpWpW8VYSYm8M4JNE6FMyq8vaEMhW2kh1d:uIjfDI7NY7V+JmnWDMhzkh1d
                    MD5:3245554ACFEFB7D108A2D332A345A125
                    SHA1:850F3B2BA8C6A747EE18EBCD7D0BD1CA3FCB291C
                    SHA-256:BA385F16675835243EA8632E37455500029952AAEE4E3B3091FB1E8FAD22ACDA
                    SHA-512:960C97DF61D34ECC5C68DF01E5A87BD3FB7258FF257559D383FE4E8D265B73D4F5365ED4CFB378EBBFE01F9B4279E8F6445EC9C50E3E0B0671C320F556C2D025
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="459069" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):144
                    Entropy (8bit):3.3603882199736725
                    Encrypted:false
                    SSDEEP:3:rhlKlm5wlf8ClDl5JWRal2Jl+7R0DAlBG45klovDl6v:6lm5wlECb5YcIeeDAlOWAv
                    MD5:6E39F6A5A51543225205A03E3C6386E8
                    SHA1:F5CF7D95AF5F12E413B5FED23F578CA212D3AE20
                    SHA-256:ABAC231F40E708E02D581A6EBE361071A72AB2ECD488E40305F2ADAF13F69A91
                    SHA-512:110B44B2E90DCCA392FB5E46D9A06BF6065E2584B2BE68BE04A7044CEFA957377C23CAB5585839B5B1FFAEA2C596F430D5DA9FEF95FD9562E4C2D53E55F0BDD5
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                    Preview:....[.2.0.2.4./.0.8./.1.7. .0.0.:.0.7.:.0.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):962
                    Entropy (8bit):5.013811273052389
                    Encrypted:false
                    SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                    MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                    SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                    SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                    SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                    Malicious:false
                    Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):64
                    Entropy (8bit):1.1510207563435464
                    Encrypted:false
                    SSDEEP:3:Nlllullkv/tz:NllU+v/
                    MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                    SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                    SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                    SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                    Malicious:false
                    Preview:@...e................................................@..........
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    File Type:Extensible storage user DataBase, version 0x620, checksum 0xfd0fbf3e, page size 32768, DirtyShutdown, Windows version 10.0
                    Category:dropped
                    Size (bytes):17301504
                    Entropy (8bit):1.0235383496802375
                    Encrypted:false
                    SSDEEP:6144:LvQPYV7AyUO+xBGA611GJxBGA611Gv0M6JKX3XX35X3khTAvhTA/hTATX3t8nqks:AyUt3F0TkT0TAitKxK9JdIC4Ago
                    MD5:564E48E56D324763E654A181B88D7EE9
                    SHA1:E9E43CCE55FBFFBAFAB2B31F68EA68DE95BE4A04
                    SHA-256:FF59FBB0B7AE0F0161EE01FFF435DAC61426BCFBAE27BB795673DCAEBECD3DBA
                    SHA-512:AFC7FF201CE630109F58678F1FD7977981BF5C16FF52D03B115B6BC773E5F5A85F87552E6573667E4522793BAFE119F8EAC597F5B5B440DEC151B987CCAB4815
                    Malicious:false
                    Preview:...>... .......4.........gN;....{........................&....../...{.......|..h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{...................................v.......|.................2V[......|...........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                    Category:dropped
                    Size (bytes):2
                    Entropy (8bit):1.0
                    Encrypted:false
                    SSDEEP:3:Qn:Qn
                    MD5:F3B25701FE362EC84616A93A45CE9998
                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                    Malicious:false
                    Preview:..
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.468781243322673
                    Encrypted:false
                    SSDEEP:6144:XzZfpi6ceLPx9skLmb0fDZWSP3aJG8nAgeiJRMMhA2zX4WABluuNxjDH5S:DZHtDZWOKnMM6bFpPj4
                    MD5:2F32224F059920C6D5CEA83F72618F35
                    SHA1:8D8B6021C1412183DC2B6CB525E20A43C0FEBB3A
                    SHA-256:0A25B9C052ED59F9545AADDE19EA6CB16933734603556A5C5E0BEDF0CF06956F
                    SHA-512:E25AACF239DA1CD8DEFB96580389A023D5809D987E468DD6F90CEC656A53A92A56770AA3D585F8F7AA65FDD5804D242AE7FFE56D0BB686CFE018B3472BDEC5C3
                    Malicious:false
                    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...Z................................................................................................................................................................................................................................................................................................................................................'..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):6.749044053307031
                    TrID:
                    • Win64 Executable Console Net Framework (206006/5) 48.58%
                    • Win64 Executable Console (202006/5) 47.64%
                    • Win64 Executable (generic) (12005/4) 2.83%
                    • Generic Win/DOS Executable (2004/3) 0.47%
                    • DOS Executable Generic (2002/1) 0.47%
                    File name:FTE98767800000.bat.exe
                    File size:1'461'889 bytes
                    MD5:e418c8ddea38739c5fa4e6ee469ffd47
                    SHA1:52ee59d5c7d3768056ac7809aea362e8adbeaa74
                    SHA256:8fcca28a02a116ed9c02bfdcbe3bfb47206592110805aaeda4ad5c55aba82a74
                    SHA512:3879b2ff0821511222cd9de8dc369037df52f655c2be937c4499cd9006049ed3a671c6ccd33f0adfa499aec935e14e388449574b5f282e6f5a230993b9192128
                    SSDEEP:12288:0EOm/U97V194bWub1V5jdJislsmq/aWPNUEFkWsnFvM1XcCDB6iCuIgWPm3A5kIo:m9B19g5V5nxsmqaWPaEXsnfCPu6BH
                    TLSH:BB6512207A6B0D4BFC546075E6E0B4F540FD6D1B35F3925FEF812D6229A833C581AAB2
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...M(.f.........."...0.................. ....@...... ....................................`................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x400000
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66BE284D [Thu Aug 15 16:09:49 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    dec ebp
                    pop edx
                    nop
                    add byte ptr [ebx], al
                    add byte ptr [eax], al
                    add byte ptr [eax+eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x596.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x7fdc0x800087ea835a9d5762e76b1f4f836a0bf899False0.59307861328125data6.38120898706342IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xa0000x5960x600ef83d8e892edcf1beee7cfe694fe04edFalse0.408203125data4.034358228528137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0xa0a00x30cdata0.41923076923076924
                    RT_MANIFEST0xa3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                    2024-08-17T06:07:07.568075+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa34970180192.168.2.6178.237.33.50
                    2024-08-17T06:07:05.582956+0200TCP2032777ET MALWARE Remcos 3.x Unencrypted Server Response1878749699192.210.150.26192.168.2.6
                    2024-08-17T06:07:04.783463+0200TCP2032776ET MALWARE Remcos 3.x Unencrypted Checkin1496998787192.168.2.6192.210.150.26
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 17, 2024 06:07:04.777569056 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:04.782418013 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:04.782483101 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:04.783463001 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:04.788454056 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:05.582956076 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:05.584300995 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:05.589122057 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:05.675906897 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:05.720417023 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:05.748061895 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:05.753015995 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:05.753083944 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:05.753103971 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:05.757958889 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230499029 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230523109 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230535984 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230547905 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230561018 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230572939 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230576038 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.230586052 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230597973 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230608940 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230618954 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.230622053 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.230629921 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.230669022 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.235563040 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.235588074 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.235644102 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.317265987 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317287922 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317301989 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317313910 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317326069 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317368031 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.317548037 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317611933 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.317758083 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317774057 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317791939 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317804098 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317816973 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.317826986 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.317864895 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.318665981 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.318679094 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.318691015 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.318702936 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.318716049 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.318717957 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.318743944 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.318772078 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.319482088 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.319494009 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.319506884 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.319533110 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.319556952 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.319570065 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.319605112 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.320322990 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.320374966 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.322232962 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.376702070 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.403956890 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404126883 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404139042 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404151917 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404164076 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404175997 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404207945 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.404217958 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404254913 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.404275894 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404289007 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404331923 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404333115 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.404346943 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404359102 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404370070 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.404402018 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.404402018 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.414809942 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.414973974 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.414993048 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415010929 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415024042 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415038109 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415051937 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415056944 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415070057 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415081024 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415092945 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415103912 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415115118 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415126085 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415137053 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415137053 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415144920 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415158033 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415163040 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415169001 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415179968 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415183067 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415191889 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415203094 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415205002 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415220022 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415230989 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415231943 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415244102 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415251017 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415256023 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415262938 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415282011 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415288925 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415292978 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415306091 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415307999 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415323973 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415337086 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415343046 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415349007 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415359974 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415360928 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.415394068 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.415414095 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.446891069 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.446902990 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.446913958 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.446949005 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.491483927 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491504908 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491517067 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491528034 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491542101 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491554022 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491568089 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491605043 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.491662025 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.491928101 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491940975 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491959095 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491970062 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491981983 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.491995096 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.492003918 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.492008924 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.492027044 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.492062092 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.493837118 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493849039 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493860960 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493904114 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.493936062 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.493944883 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493957043 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493968010 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493978977 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493990898 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.493997097 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.494003057 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.494023085 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.494034052 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.494035006 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.494046926 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.494055033 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.494057894 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.494071960 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.494092941 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.494092941 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496262074 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496280909 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496305943 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496316910 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496337891 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496376038 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496491909 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496509075 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496520996 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496532917 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496543884 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496555090 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496565104 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496567011 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496565104 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496578932 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496587038 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496592999 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496604919 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.496609926 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.496645927 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.497983932 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.497996092 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498008013 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498029947 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498058081 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498061895 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498080969 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498091936 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498110056 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498122931 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498131990 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498135090 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498152018 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498161077 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498167992 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498178959 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498181105 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498192072 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498203993 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498214006 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498260975 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498660088 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498677015 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498689890 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498722076 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498753071 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498764038 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498775959 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498785973 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498799086 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.498814106 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.498833895 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.499001026 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499049902 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499062061 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499102116 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.499114037 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499125004 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499135971 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499147892 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499156952 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.499183893 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.499954939 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.499972105 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.500030041 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.507440090 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.534883976 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.534909964 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.534921885 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.534934998 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.534948111 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.534957886 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.534992933 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577616930 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577771902 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577790022 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577807903 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577820063 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577837944 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577841043 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577850103 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577861071 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577872992 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577884912 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577896118 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577899933 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577900887 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577900887 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577908039 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577920914 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577927113 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577933073 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577938080 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577951908 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577964067 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577974081 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.577976942 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.577990055 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578006983 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578018904 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578021049 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578030109 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578042984 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578046083 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578054905 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578066111 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578075886 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578100920 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578111887 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578123093 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578125954 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578139067 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578150988 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578165054 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578169107 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578181982 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578186035 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578192949 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578206062 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578223944 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578241110 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578260899 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578273058 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578283072 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578298092 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578308105 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578320026 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578320980 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578342915 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578342915 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.578963995 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578977108 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.578988075 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579005957 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579016924 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579019070 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579019070 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579029083 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579041958 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579056025 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579066038 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579078913 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579107046 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579107046 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579116106 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579128981 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579139948 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579152107 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579169035 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579175949 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579180956 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579193115 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.579195976 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.579245090 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583060980 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583074093 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583085060 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583096981 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583113909 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583125114 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583133936 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583137035 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583148956 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583157063 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583163023 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583173037 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583228111 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583251953 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583262920 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583275080 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583286047 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583297968 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583318949 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583349943 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583426952 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583540916 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583556890 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583569050 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583580017 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583589077 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583590984 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583602905 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583610058 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583615065 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583626986 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583626986 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583740950 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583741903 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.583934069 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583950996 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583962917 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583975077 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583986998 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.583997011 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584008932 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584021091 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584032059 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584068060 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584068060 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584068060 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584068060 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584220886 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584260941 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584371090 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584383011 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584393978 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584405899 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584415913 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584428072 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584428072 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584439993 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584446907 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584451914 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584464073 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584470034 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584475994 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.584506035 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.584522963 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.604321003 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.621953964 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.621990919 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.622003078 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.622056007 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.622066975 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.622076035 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.622078896 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.622092009 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.622106075 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.622131109 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664474964 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664505959 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664520979 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664535999 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664556026 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664573908 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664586067 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664587021 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664598942 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664612055 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664623022 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664633989 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664645910 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664659023 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664674997 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664685965 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664688110 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664685965 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664685965 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664700985 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664714098 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664732933 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664736032 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664747953 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664764881 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664777994 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664789915 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664789915 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664817095 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664843082 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664864063 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664901018 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664917946 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664932013 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664946079 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664947033 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664980888 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.664988041 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.664999962 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665009975 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665021896 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665036917 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665066957 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665393114 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665405035 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665416002 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665451050 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665468931 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665468931 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665488005 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665498018 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665508986 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665519953 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665529013 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665537119 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665549040 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665549994 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665565968 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665581942 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665592909 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665601015 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665611982 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665611982 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665616989 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665627956 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665654898 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665710926 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665724039 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665734053 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665756941 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665776968 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665779114 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665788889 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665816069 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665827036 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665838003 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665841103 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665849924 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665862083 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665873051 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665873051 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665936947 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665936947 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.665960073 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665971994 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665982008 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.665993929 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666009903 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666068077 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666070938 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666083097 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666095972 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666106939 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666125059 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666153908 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666341066 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666352987 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666364908 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666394949 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666440010 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666450977 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666470051 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666481972 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666481972 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666495085 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666532993 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666551113 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666555882 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666564941 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666610003 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666671991 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666683912 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666697025 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666707993 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666719913 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666731119 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666738987 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666743994 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666760921 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666789055 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666800022 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666821003 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666831970 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666862965 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666894913 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666902065 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666914940 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666924953 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666934967 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666946888 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666959047 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.666970015 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.666991949 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667017937 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667026043 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667040110 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667052031 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667064905 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667076111 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667082071 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667117119 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667134047 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667146921 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667156935 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667169094 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667188883 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667216063 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667221069 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667232990 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.667277098 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.667870045 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.708714008 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708726883 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708736897 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708776951 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708789110 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708794117 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.708798885 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708811045 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708822012 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.708842993 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.708873987 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752676010 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752688885 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752703905 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752715111 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752732038 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752739906 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752743959 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752757072 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752768993 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752777100 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752780914 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752789021 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752796888 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752806902 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752810001 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752821922 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752835035 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752835035 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752846956 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752857924 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752861023 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752870083 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752878904 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752882957 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752895117 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752906084 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752918005 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752918959 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752931118 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752944946 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752944946 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752957106 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752979040 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.752984047 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.752993107 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753004074 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753015041 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.753015041 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753026962 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753036976 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.753038883 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753050089 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753062963 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753073931 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753077030 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.753084898 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753094912 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753103018 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.753107071 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753118992 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753123045 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.753132105 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:06.753134012 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.753163099 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.798574924 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:06.938318014 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:06.943358898 CEST8049701178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:06.943538904 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:06.945152044 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:06.945502996 CEST4970280192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:06.950067997 CEST8049701178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:06.950321913 CEST8049702178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:06.950407982 CEST4970280192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:07.564686060 CEST8049701178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:07.568074942 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:07.590425014 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:07.597945929 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:08.564251900 CEST8049701178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:08.564424038 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:10.399499893 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:10.407160044 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407170057 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407177925 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407188892 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407197952 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407253027 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:10.407541037 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407587051 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407629967 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407639027 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.407725096 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412163019 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412172079 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412302971 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412312984 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412319899 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412328959 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.412338972 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.427519083 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:10.432858944 CEST878749700192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:10.432912111 CEST497008787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:12.481399059 CEST8049702178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:12.481461048 CEST4970280192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:12.481583118 CEST8049702178.237.33.50192.168.2.6
                    Aug 17, 2024 06:07:12.481919050 CEST4970280192.168.2.6178.237.33.50
                    Aug 17, 2024 06:07:18.753644943 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:18.754946947 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:18.759782076 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:48.784862041 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:07:48.786021948 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:07:48.790860891 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:08:18.828516960 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:08:18.829649925 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:08:18.834553003 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:08:48.871804953 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:08:48.923737049 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:08:48.952788115 CEST496998787192.168.2.6192.210.150.26
                    Aug 17, 2024 06:08:48.957835913 CEST878749699192.210.150.26192.168.2.6
                    Aug 17, 2024 06:08:56.830296993 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:08:56.830297947 CEST4970280192.168.2.6178.237.33.50
                    Aug 17, 2024 06:08:56.832600117 CEST4970280192.168.2.6178.237.33.50
                    Aug 17, 2024 06:08:57.142540932 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:08:57.751925945 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:08:58.955207109 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:09:01.361274004 CEST4970180192.168.2.6178.237.33.50
                    Aug 17, 2024 06:09:06.173758984 CEST4970180192.168.2.6178.237.33.50
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 17, 2024 06:07:06.854090929 CEST5897953192.168.2.61.1.1.1
                    Aug 17, 2024 06:07:06.861030102 CEST53589791.1.1.1192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Aug 17, 2024 06:07:06.854090929 CEST192.168.2.61.1.1.10x42c2Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Aug 17, 2024 06:07:06.861030102 CEST1.1.1.1192.168.2.60x42c2No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                    • geoplugin.net
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649701178.237.33.50804596C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    TimestampBytes transferredDirectionData
                    Aug 17, 2024 06:07:06.945152044 CEST71OUTGET /json.gp HTTP/1.1
                    Host: geoplugin.net
                    Cache-Control: no-cache
                    Aug 17, 2024 06:07:07.564686060 CEST1170INHTTP/1.1 200 OK
                    date: Sat, 17 Aug 2024 04:07:07 GMT
                    server: Apache
                    content-length: 962
                    content-type: application/json; charset=utf-8
                    cache-control: public, max-age=300
                    access-control-allow-origin: *
                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                    Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649702178.237.33.50804596C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    TimestampBytes transferredDirectionData
                    Aug 17, 2024 06:07:12.481399059 CEST233INHTTP/1.1 408 Request Time-out
                    content-length: 110
                    cache-control: no-cache
                    content-type: text/html
                    connection: close
                    Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 34 30 38 20 52 65 71 75 65 73 74 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 0a 59 6f 75 72 20 62 72 6f 77 73 65 72 20 64 69 64 6e 27 74 20 73 65 6e 64 20 61 20 63 6f 6d 70 6c 65 74 65 20 72 65 71 75 65 73 74 20 69 6e 20 74 69 6d 65 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                    Data Ascii: <html><body><h1>408 Request Time-out</h1>Your browser didn't send a complete request in time.</body></html>


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:00:06:58
                    Start date:17/08/2024
                    Path:C:\Users\user\Desktop\FTE98767800000.bat.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\FTE98767800000.bat.exe"
                    Imagebase:0x2b7b4820000
                    File size:1'461'889 bytes
                    MD5 hash:E418C8DDEA38739C5FA4E6EE469FFD47
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2222022778.000002B7B6747000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2223067525.000002B7C6681000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:00:06:58
                    Start date:17/08/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:00:07:01
                    Start date:17/08/2024
                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FTE98767800000.bat.exe" -Force
                    Imagebase:0x7ff6e3d50000
                    File size:452'608 bytes
                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:00:07:01
                    Start date:17/08/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:00:07:01
                    Start date:17/08/2024
                    Path:C:\Windows\regedit.exe
                    Wow64 process (32bit):
                    Commandline:"C:\Windows\regedit.exe"
                    Imagebase:
                    File size:370'176 bytes
                    MD5 hash:999A30979F6195BF562068639FFC4426
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000005.00000002.3356235006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:moderate
                    Has exited:false

                    Target ID:6
                    Start time:00:07:01
                    Start date:17/08/2024
                    Path:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                    Wow64 process (32bit):
                    Commandline:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                    Imagebase:
                    File size:166'912 bytes
                    MD5 hash:A7790328035BBFCF041A6D815F9C28DF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:7
                    Start time:00:07:02
                    Start date:17/08/2024
                    Path:C:\Windows\System32\svchost.exe
                    Wow64 process (32bit):
                    Commandline:"C:\Windows\System32\svchost.exe"
                    Imagebase:
                    File size:55'320 bytes
                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000007.00000002.3356205856.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:high
                    Has exited:false

                    Target ID:8
                    Start time:00:07:02
                    Start date:17/08/2024
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):
                    Commandline:"C:\Windows\System32\cmd.exe"
                    Imagebase:
                    File size:289'792 bytes
                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000008.00000002.3356189884.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:high
                    Has exited:false

                    Target ID:9
                    Start time:00:07:03
                    Start date:17/08/2024
                    Path:C:\Windows\System32\calc.exe
                    Wow64 process (32bit):
                    Commandline:"C:\Windows\System32\calc.exe"
                    Imagebase:
                    File size:27'648 bytes
                    MD5 hash:5DA8C98136D98DFEC4716EDD79C7145F
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.3356228697.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:moderate
                    Has exited:false

                    Target ID:10
                    Start time:00:07:03
                    Start date:17/08/2024
                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                    Imagebase:0xbb0000
                    File size:828'368 bytes
                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3357345887.0000000002D7B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3358064621.00000000049CF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000003.2202960158.0000000002DAC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3357345887.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:moderate
                    Has exited:false

                    Target ID:13
                    Start time:00:07:03
                    Start date:17/08/2024
                    Path:C:\Windows\System32\WerFault.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\WerFault.exe -u -p 6788 -s 1244
                    Imagebase:0x7ff6e9360000
                    File size:570'736 bytes
                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:14
                    Start time:00:07:04
                    Start date:17/08/2024
                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Imagebase:0x7ff717f30000
                    File size:496'640 bytes
                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                    Has elevated privileges:true
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:16
                    Start time:00:07:05
                    Start date:17/08/2024
                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\bknppbdkpzebeql"
                    Imagebase:0xbb0000
                    File size:828'368 bytes
                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:17
                    Start time:00:07:05
                    Start date:17/08/2024
                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay"
                    Imagebase:0xbb0000
                    File size:828'368 bytes
                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:19
                    Start time:00:07:05
                    Start date:17/08/2024
                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\lnaiqunmdhwggwhhay"
                    Imagebase:0xbb0000
                    File size:828'368 bytes
                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:20
                    Start time:00:07:05
                    Start date:17/08/2024
                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe" /stext "C:\Users\user\AppData\Local\Temp\nhgsrmyfrpotrkvlriveph"
                    Imagebase:0xbb0000
                    File size:828'368 bytes
                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:9.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:9
                      Total number of Limit Nodes:0
                      execution_graph 18283 7ffd348b08a5 18284 7ffd348b08e8 FreeConsole 18283->18284 18286 7ffd348b093e 18284->18286 18275 7ffd348b4cea 18276 7ffd348b4cf9 VirtualProtect 18275->18276 18278 7ffd348b4dd1 18276->18278 18279 7ffd348c6332 18280 7ffd348cb010 GetFileAttributesA 18279->18280 18282 7ffd348cb14f 18280->18282

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 7ffd349a03f3-7ffd349a0427 3 7ffd349a0429-7ffd349a0440 0->3 4 7ffd349a045c-7ffd349a0474 0->4 5 7ffd349a0442-7ffd349a045a 3->5 6 7ffd349a04b1-7ffd349a04d0 3->6 5->4 9 7ffd349a04d1-7ffd349a0500 5->9 6->9 14 7ffd349a0502-7ffd349a0534 9->14 15 7ffd349a0571-7ffd349a0590 9->15 16 7ffd349a0597-7ffd349a05c0 15->16 17 7ffd349a0592 15->17 23 7ffd349a05c2-7ffd349a05f4 16->23 24 7ffd349a0631-7ffd349a067a 16->24 17->16 31 7ffd349a067c-7ffd349a067e 24->31 32 7ffd349a06eb-7ffd349a06f1 24->32 33 7ffd349a06fa-7ffd349a073c 31->33 34 7ffd349a0680 31->34 35 7ffd349a0689-7ffd349a06a8 32->35 41 7ffd349a0786-7ffd349a078b 33->41 42 7ffd349a073e-7ffd349a0772 33->42 37 7ffd349a06c6-7ffd349a06c7 34->37 38 7ffd349a0682-7ffd349a0685 34->38 43 7ffd349a06aa-7ffd349a06b9 35->43 44 7ffd349a06bc-7ffd349a06c5 35->44 38->35 46 7ffd349a0a42-7ffd349a0a56 41->46 48 7ffd349a078c-7ffd349a079e 41->48 45 7ffd349a0778-7ffd349a0781 42->45 42->46 43->44 44->37 49 7ffd349a0782-7ffd349a0785 45->49 57 7ffd349a0a57-7ffd349a0a79 46->57 50 7ffd349a079f-7ffd349a07a5 48->50 49->41 51 7ffd349a07a7-7ffd349a07bd 50->51 52 7ffd349a07db 50->52 51->46 62 7ffd349a07c3-7ffd349a07d6 51->62 55 7ffd349a0857-7ffd349a0859 52->55 56 7ffd349a07dd 52->56 55->46 61 7ffd349a085a-7ffd349a0872 55->61 58 7ffd349a07df-7ffd349a07f0 56->58 59 7ffd349a0824 56->59 60 7ffd349a0a11-7ffd349a0a41 57->60 58->49 65 7ffd349a07f2-7ffd349a0808 58->65 59->46 64 7ffd349a082a-7ffd349a0845 59->64 72 7ffd349a0874-7ffd349a0877 61->72 73 7ffd349a08e3-7ffd349a08f0 61->73 71 7ffd349a0847-7ffd349a0856 62->71 74 7ffd349a07d8-7ffd349a07d9 62->74 64->71 65->46 70 7ffd349a080e-7ffd349a0821 65->70 70->59 71->55 76 7ffd349a0879 72->76 77 7ffd349a08f3 72->77 73->77 74->50 74->52 79 7ffd349a087b-7ffd349a08a2 76->79 80 7ffd349a08c0 76->80 77->46 78 7ffd349a08f9-7ffd349a090c 77->78 87 7ffd349a090e-7ffd349a0912 78->87 88 7ffd349a097d-7ffd349a0990 78->88 79->46 84 7ffd349a08a8-7ffd349a08be 79->84 81 7ffd349a08c2 80->81 82 7ffd349a08c3-7ffd349a08e1 80->82 81->82 82->73 84->46 84->80 89 7ffd349a0914 87->89 90 7ffd349a0993 87->90 88->90 92 7ffd349a0974-7ffd349a097b 89->92 90->46 91 7ffd349a0999-7ffd349a09b5 90->91 95 7ffd349a09b7-7ffd349a09cc 91->95 96 7ffd349a09d2-7ffd349a09e6 91->96 92->88 95->96 96->57 97 7ffd349a09e8-7ffd349a09ed 96->97 97->92 99 7ffd349a09ef 97->99 99->60
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226815165.00007FFD349A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD349A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd349a0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID: A
                      • API String ID: 0-3554254475
                      • Opcode ID: 7704fc8554b18f1844b89b37a86cd707a1303f5a9f60c50edd1d9c23cd4e9ffe
                      • Instruction ID: afe187df7070e39bc806689935d1fea500429dd7d1655fba5ccd714a67620408
                      • Opcode Fuzzy Hash: 7704fc8554b18f1844b89b37a86cd707a1303f5a9f60c50edd1d9c23cd4e9ffe
                      • Instruction Fuzzy Hash: 0BC22A72A0E7C54FEB95DB2888A55A47BE0FF67300F0905FEC589CB197D92C6806C791

                      Control-flow Graph

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0dy4$fish
                      • API String ID: 0-1358149781
                      • Opcode ID: 018502a2f9f606b345e4bfdeece910e182e3984494b9a546278cda4c5951d445
                      • Instruction ID: 6483a223267274142162f3d16eb728028f98be67921e0809a812df8663aea334
                      • Opcode Fuzzy Hash: 018502a2f9f606b345e4bfdeece910e182e3984494b9a546278cda4c5951d445
                      • Instruction Fuzzy Hash: 81A1FA31B1CA494FEB5CEB68D8B55BA73D0FF96314B04017EE58BC3292DD68B84296C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33df8d4398ae74ee4ee77b8ef8fb68ccd3919e82efe190ead9ee2a531aa1dafa
                      • Instruction ID: 854de19fdf507ad161513ddbd39bf1e05b443aceb9f0f0bd49c3e1b05f1c5ee8
                      • Opcode Fuzzy Hash: 33df8d4398ae74ee4ee77b8ef8fb68ccd3919e82efe190ead9ee2a531aa1dafa
                      • Instruction Fuzzy Hash: 42D2463061CB494FE359DF28C4A04B5B7E2FF96301B1445BEE58AC72A6DE39E846C781

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 561 7ffd348b8345-7ffd348b8398 565 7ffd348b839b-7ffd348b83d9 561->565 571 7ffd348b83db-7ffd348b8490 565->571 584 7ffd348b84d4-7ffd348b8535 571->584 585 7ffd348b8492-7ffd348b84c4 571->585 595 7ffd348b8537-7ffd348b857d 584->595 596 7ffd348b857f-7ffd348b858f 584->596 585->584 595->596 597 7ffd348b8596-7ffd348b859d 595->597 596->597 598 7ffd348b859f-7ffd348b85af call 7ffd348b5be0 597->598 600 7ffd348b85b4-7ffd348b85e1 call 7ffd348b3f58 598->600 604 7ffd348b85f5-7ffd348b8611 call 7ffd348b5cd8 600->604 605 7ffd348b85e3-7ffd348b85ee 600->605 607 7ffd348b8616-7ffd348b8618 604->607 605->604 608 7ffd348b870e-7ffd348b8740 607->608 610 7ffd348b8799-7ffd348b87a2 608->610 611 7ffd348b8742-7ffd348b8745 608->611 614 7ffd348b87a8-7ffd348b87b0 610->614 615 7ffd348b895c 610->615 612 7ffd348b8747-7ffd348b8759 611->612 613 7ffd348b87c6-7ffd348b87c9 611->613 616 7ffd348b875b-7ffd348b875e 612->616 617 7ffd348b87ca-7ffd348b87d0 612->617 613->617 618 7ffd348b87b4-7ffd348b87c4 614->618 623 7ffd348b8961 615->623 619 7ffd348b87da-7ffd348b87dd 616->619 620 7ffd348b8760 616->620 621 7ffd348b884a-7ffd348b884d 617->621 622 7ffd348b87d1 617->622 618->613 632 7ffd348b87e0-7ffd348b87ee 619->632 624 7ffd348b86e7-7ffd348b870c 620->624 625 7ffd348b8762 620->625 627 7ffd348b87ff-7ffd348b8802 621->627 628 7ffd348b884f-7ffd348b8856 621->628 629 7ffd348b882a-7ffd348b882e 622->629 630 7ffd348b87d2-7ffd348b87d6 622->630 631 7ffd348b8963-7ffd348b8977 call 7ffd348b3fb8 623->631 624->608 627->618 633 7ffd348b8804-7ffd348b881d 627->633 636 7ffd348b8857-7ffd348b8868 628->636 629->632 634 7ffd348b8830-7ffd348b8839 629->634 635 7ffd348b87d8 630->635 630->636 648 7ffd348b897c-7ffd348b897f 631->648 632->615 638 7ffd348b87f4-7ffd348b87fc 632->638 651 7ffd348b8876-7ffd348b8884 633->651 652 7ffd348b881f-7ffd348b8822 633->652 634->615 639 7ffd348b883f-7ffd348b8847 634->639 635->619 643 7ffd348b886a-7ffd348b886d 636->643 644 7ffd348b88c1-7ffd348b88c6 636->644 638->627 639->621 649 7ffd348b886f-7ffd348b8871 643->649 650 7ffd348b88ee-7ffd348b8901 643->650 646 7ffd348b88c8-7ffd348b88d3 644->646 647 7ffd348b88da-7ffd348b88ed call 7ffd348b3f60 644->647 646->647 647->650 654 7ffd348b8998-7ffd348b899f 648->654 649->651 650->654 665 7ffd348b8907-7ffd348b891f 650->665 651->615 657 7ffd348b888a-7ffd348b88a2 651->657 658 7ffd348b8824-7ffd348b8829 652->658 659 7ffd348b88a3-7ffd348b88c0 call 7ffd348b5d40 652->659 656 7ffd348b89a0-7ffd348b89a9 call 7ffd348b89c0 654->656 668 7ffd348b89af-7ffd348b89bf 656->668 657->659 658->629 659->644 665->615 669 7ffd348b8921-7ffd348b892f 665->669 669->656 670 7ffd348b8931-7ffd348b8933 669->670 670->668 671 7ffd348b8935 670->671 671->648 672 7ffd348b8937-7ffd348b894b 671->672 672->623 673 7ffd348b894d-7ffd348b895a 672->673 673->631
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID: L_^
                      • API String ID: 0-925995230
                      • Opcode ID: c4fd735f6846a81362029ea4c2746687f584f25d7ed78cec87c82a766372293e
                      • Instruction ID: 1af1732947d35819a4cb23e0697eaacb8230e0b6bd14e914092d02b1209eb501
                      • Opcode Fuzzy Hash: c4fd735f6846a81362029ea4c2746687f584f25d7ed78cec87c82a766372293e
                      • Instruction Fuzzy Hash: FB124A32A0D69A4FEB59DB2888A15F977E0FF53314B0409BEC149DB193DE68E806D7C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bccd88d144c475136d901b46f8399bdb08438781e728cf0f3000e021f6ce12bc
                      • Instruction ID: 8f27f7d95abf5a8375aa42f09dbed6fab1e01a42e2d0bc283056d63cfdffd71d
                      • Opcode Fuzzy Hash: bccd88d144c475136d901b46f8399bdb08438781e728cf0f3000e021f6ce12bc
                      • Instruction Fuzzy Hash: 90B2C771B08A498FD7A9DB18D4A5AB9B7E1FF56301F1401BAD04ED72E2DE38AC41DB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1707fd3b3fe1a516ccb85e0e0778567cbd19669702683c322c4937ffc1315941
                      • Instruction ID: ca4ba8936a6a118fde16010c98134ee0ffe1e7218c4e06d2ba3ad270c969dfda
                      • Opcode Fuzzy Hash: 1707fd3b3fe1a516ccb85e0e0778567cbd19669702683c322c4937ffc1315941
                      • Instruction Fuzzy Hash: 9C923431A0E68A4FE769CB1884A16B577E1FF97310F1442BDD58ECB593DE2CA846C780
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6cf867e45356bd6226323eb1ab365a972f3bb5abacb32256b02d6eccb6e25f0e
                      • Instruction ID: 374ac484fcbf2ed2cd248d1648e168be303505fca6a63a88a6e4234debc4ec05
                      • Opcode Fuzzy Hash: 6cf867e45356bd6226323eb1ab365a972f3bb5abacb32256b02d6eccb6e25f0e
                      • Instruction Fuzzy Hash: 24723531A1CB4A4FE359DB2884A15B5B7E1FF96300B1045BED58AC72E6DE28EC46C781
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec067329c7866b7423567a47cd409f7b0e66a582afc9e1b77fb23dccbc6a1fb7
                      • Instruction ID: 2fc95c9edf971e92f63b73a800d25521b352cf9fc432b2d499de2c17ca1494e4
                      • Opcode Fuzzy Hash: ec067329c7866b7423567a47cd409f7b0e66a582afc9e1b77fb23dccbc6a1fb7
                      • Instruction Fuzzy Hash: 1142C730B1CA498FDB6CDB28D4A567977E1FF56301F1401BDE48EC7292DE68AC429781
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42035ed5e5f95b9693e8384d22df850abd8bfda605a329a0bf48952f391a37a9
                      • Instruction ID: 0c70db73b4cfe8d2def1309dd11746a0a60f573788cbaf5e534948208c626899
                      • Opcode Fuzzy Hash: 42035ed5e5f95b9693e8384d22df850abd8bfda605a329a0bf48952f391a37a9
                      • Instruction Fuzzy Hash: 68422772F0E6824FE7698BA848F617577D0EF57200B1401BADBC9C7193ED5DB84A92C2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e15074a173c69c6c34c4219cd9683fcd6699a0de40cbb6b85659a71a8d85609
                      • Instruction ID: 03737d5b05d0ebd4513d698eb292e9efc077328a48f18a6f71f25f4fa156494e
                      • Opcode Fuzzy Hash: 1e15074a173c69c6c34c4219cd9683fcd6699a0de40cbb6b85659a71a8d85609
                      • Instruction Fuzzy Hash: E2224D61B1EA954FEBE8DB1C84B65A5B7D1FF9A310F4402BBD14EC7292DE1CAC064381
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: baf8163f698a82912b0a955c5b74e336d5f52cc62490a31e06e76854e43405ab
                      • Instruction ID: bb2d88d1f58672cb7f8b8ddd359e0e46e10871f3588e7501044d618eb14282a7
                      • Opcode Fuzzy Hash: baf8163f698a82912b0a955c5b74e336d5f52cc62490a31e06e76854e43405ab
                      • Instruction Fuzzy Hash: 28D1563160CB864FE31DCB2984A51B5B7E2FF92305B14867ED5CAC72A1DE68A842D7C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4b40864e124d019a2fe3579b2d5a2352e7feeb2ff2d67f5a59c019cc360a0b09
                      • Instruction ID: c83aac6ac3d3255efd6a27d74bfe25e24735367a07a780f4a84c073547ca33f2
                      • Opcode Fuzzy Hash: 4b40864e124d019a2fe3579b2d5a2352e7feeb2ff2d67f5a59c019cc360a0b09
                      • Instruction Fuzzy Hash: 6C91A911B1DA490FE795B77C44763B966C2EF9B250F5902BAE60DC33C3DD6DA8028391
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e4e44ffd3a3cb442eaeb5e35bd6278f8177897b0f7fe5d5349abef17942165b
                      • Instruction ID: 96cb4ede6d702a5493721fef62a74b6849a7009bed5609b0a224890bc2d6dc26
                      • Opcode Fuzzy Hash: 6e4e44ffd3a3cb442eaeb5e35bd6278f8177897b0f7fe5d5349abef17942165b
                      • Instruction Fuzzy Hash: A0414D31B0C6490FE72E9F6898A21B5BB95EB43310F15827FD44AC7197DD28AC4683D1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 674 7ffd348c6332-7ffd348cb08f 678 7ffd348cb0ea-7ffd348cb14d GetFileAttributesA 674->678 679 7ffd348cb091-7ffd348cb0a0 674->679 684 7ffd348cb155-7ffd348cb187 call 7ffd348cb1a3 678->684 685 7ffd348cb14f 678->685 679->678 680 7ffd348cb0a2-7ffd348cb0a5 679->680 682 7ffd348cb0a7-7ffd348cb0ba 680->682 683 7ffd348cb0df-7ffd348cb0e7 680->683 686 7ffd348cb0bc 682->686 687 7ffd348cb0be-7ffd348cb0d1 682->687 683->678 691 7ffd348cb189 684->691 692 7ffd348cb18e-7ffd348cb1a2 684->692 685->684 686->687 687->687 688 7ffd348cb0d3-7ffd348cb0db 687->688 688->683 691->692
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: b0176d9d7e516cfffa02f3898b67599ec7693bb63e7946910a62b9b612d8320f
                      • Instruction ID: d9d53db62a79484a40b182cc901d247ee7fd3be1b642fea6533fcfd399075dcf
                      • Opcode Fuzzy Hash: b0176d9d7e516cfffa02f3898b67599ec7693bb63e7946910a62b9b612d8320f
                      • Instruction Fuzzy Hash: BF518230618A4D8FEB58EF2CD8567F977E1FF59311F10422AE85EC3291DA74E8458B81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1059 7ffd348b4cea-7ffd348b4cf7 1060 7ffd348b4cf9-7ffd348b4d01 1059->1060 1061 7ffd348b4d02-7ffd348b4d13 1059->1061 1060->1061 1062 7ffd348b4d15-7ffd348b4d1d 1061->1062 1063 7ffd348b4d1e-7ffd348b4dcf VirtualProtect 1061->1063 1062->1063 1067 7ffd348b4dd7-7ffd348b4dff 1063->1067 1068 7ffd348b4dd1 1063->1068 1068->1067
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 4a59278fa0150e559c8cf3d43098139cc3df830fd1013e4ee1fbc7f587364042
                      • Instruction ID: 4a711016ec232b7882a1aad874e24cc88a1036b7c8ac4fb17772c76890ac6f37
                      • Opcode Fuzzy Hash: 4a59278fa0150e559c8cf3d43098139cc3df830fd1013e4ee1fbc7f587364042
                      • Instruction Fuzzy Hash: A041273090C7885FDB19DBA898566E97FF1EF56321F0802AFD049C31A3CF686856C792

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1147 7ffd348b08a5-7ffd348b093c FreeConsole 1150 7ffd348b093e 1147->1150 1151 7ffd348b0944-7ffd348b0960 1147->1151 1150->1151
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID: ConsoleFree
                      • String ID:
                      • API String ID: 771614528-0
                      • Opcode ID: 384f1ab8f282e64f14f0f67cd97df2e759c86cf82b83e8128c55d503fa3e336e
                      • Instruction ID: 8a4f262dbd3931c39a4c66264116b28fa3aed823b3ee13d3bb173953ea6da9a1
                      • Opcode Fuzzy Hash: 384f1ab8f282e64f14f0f67cd97df2e759c86cf82b83e8128c55d503fa3e336e
                      • Instruction Fuzzy Hash: 4121C47090CB4C8FDB29DF98D899AE97BF0EF66321F00416FD08AD3552DA746406CB51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1267 7ffd349a01b8-7ffd349a01ec 1268 7ffd349a0236-7ffd349a023b 1267->1268 1269 7ffd349a01ee-7ffd349a0222 1267->1269 1271 7ffd349a03b1-7ffd349a03b7 1268->1271 1272 7ffd349a023c-7ffd349a024e 1268->1272 1270 7ffd349a0228-7ffd349a0231 1269->1270 1269->1271 1273 7ffd349a0232-7ffd349a0235 1270->1273 1278 7ffd349a03b9-7ffd349a03c8 1271->1278 1274 7ffd349a024f-7ffd349a0255 1272->1274 1273->1268 1276 7ffd349a0257-7ffd349a026d 1274->1276 1277 7ffd349a028b 1274->1277 1276->1271 1284 7ffd349a0273-7ffd349a027c 1276->1284 1280 7ffd349a0307-7ffd349a0309 1277->1280 1281 7ffd349a028d 1277->1281 1283 7ffd349a03c9-7ffd349a03e7 1278->1283 1280->1271 1282 7ffd349a030a-7ffd349a0348 1280->1282 1285 7ffd349a028f-7ffd349a02a0 1281->1285 1286 7ffd349a02d4 1281->1286 1282->1278 1298 7ffd349a034a-7ffd349a034d 1282->1298 1292 7ffd349a0284-7ffd349a0286 1284->1292 1285->1273 1289 7ffd349a02a2-7ffd349a02b8 1285->1289 1286->1271 1287 7ffd349a02da-7ffd349a02f5 1286->1287 1294 7ffd349a02f7-7ffd349a0306 1287->1294 1289->1271 1293 7ffd349a02be-7ffd349a02d1 1289->1293 1292->1294 1295 7ffd349a0288-7ffd349a0289 1292->1295 1293->1286 1294->1280 1295->1274 1295->1277 1298->1283 1299 7ffd349a034f 1298->1299 1300 7ffd349a0396-7ffd349a03b0 1299->1300 1301 7ffd349a0351-7ffd349a035f 1299->1301 1301->1300
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226815165.00007FFD349A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD349A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd349a0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID: A
                      • API String ID: 0-3554254475
                      • Opcode ID: a85d7a10d63af81a0697e66a9d5794140e0c86bbea114e733feac42325acd680
                      • Instruction ID: 75642c2bca70448bb0aa8232a30a9d5f600c6f3561b633138c7f086d5983cf6d
                      • Opcode Fuzzy Hash: a85d7a10d63af81a0697e66a9d5794140e0c86bbea114e733feac42325acd680
                      • Instruction Fuzzy Hash: 55714A30A0DA898FDB95DF18C8E46E87BE0FF56304F1545AED14ACB186CE2CA846D750
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226815165.00007FFD349A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD349A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd349a0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb0d4b9e19e9817b124ad7347d321616c704638e9a53a66d00b8fa8febc0485d
                      • Instruction ID: f725fbc0f5755c7e434cf7dda9dbe7c3162f033690e867e66f6c75144f733a85
                      • Opcode Fuzzy Hash: fb0d4b9e19e9817b124ad7347d321616c704638e9a53a66d00b8fa8febc0485d
                      • Instruction Fuzzy Hash: A171F831A0DA894FDB96DB2888A65A57BF0FF57304B0901FFD48AC7197DE2CA845C351
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226815165.00007FFD349A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD349A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd349a0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 226b97000a1c0bed2665bf476702241430c817ed50da6e6e798d738adad4bc97
                      • Instruction ID: 8c4ca110f612e4ee62f297b43c8bf1fec443a7fc05114fae6bd972492a18aaae
                      • Opcode Fuzzy Hash: 226b97000a1c0bed2665bf476702241430c817ed50da6e6e798d738adad4bc97
                      • Instruction Fuzzy Hash: DA311435A09A4D8FDF98DF18D8EA4B8B7E0FF55304B0406BED54AD7599DE38A841C780
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID: X|y4$`zy4$`|y4$h|y4$pzy4$p|y4$xzy4
                      • API String ID: 0-1994962157
                      • Opcode ID: 24ae058826cadb478b3ea7a1fc39c0dbc3122658e344d7594dc91748dce3ce50
                      • Instruction ID: 6336fd575b125983d89cd420d5f7dadbb75d81818f951d779c280982f0ffc764
                      • Opcode Fuzzy Hash: 24ae058826cadb478b3ea7a1fc39c0dbc3122658e344d7594dc91748dce3ce50
                      • Instruction Fuzzy Hash: EBD1E753A0E6C20FE3125BAC68B51E97B90EF4336470801BBD1D88B1D3DD9DB54A9BC5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID: "C2$2M_^
                      • API String ID: 0-842026603
                      • Opcode ID: 4b4d8ec79e08cf961fdda4805329bdf7f0d3ea02fbe3e75772e6395018d503f7
                      • Instruction ID: c41cebb92f3746bf89bd870b2b09112b0769de5ef0d95d16bc0041d88e9f3ffd
                      • Opcode Fuzzy Hash: 4b4d8ec79e08cf961fdda4805329bdf7f0d3ea02fbe3e75772e6395018d503f7
                      • Instruction Fuzzy Hash: B431E227B0D43E6ACB243AFD78651EABB24DF8633270C53B7D188DA043A964748687D4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91d415c32375068399233950a99be45037376ccffdd607f814fa12f451114739
                      • Instruction ID: 4ec4ff0716f88b7cfd9b448e95a9b5f21c52860282af59c712bcb74a5df516de
                      • Opcode Fuzzy Hash: 91d415c32375068399233950a99be45037376ccffdd607f814fa12f451114739
                      • Instruction Fuzzy Hash: E391D897B0D6C21EE6129B3D59FA0E5BF90EF5323471C02F7C689DA0A3AD1D1C0792A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2226358040.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd348b0000_FTE98767800000.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e23b81e21a201b77b03bc9dbcd79e54858f6932d6cc68c16256b50fc6faa68e9
                      • Instruction ID: ee9565da9f9ced5f5859d3241c4622485b50a54c7c12454a1b26872b9e3ba7cc
                      • Opcode Fuzzy Hash: e23b81e21a201b77b03bc9dbcd79e54858f6932d6cc68c16256b50fc6faa68e9
                      • Instruction Fuzzy Hash: E241939BB0D6D21EE6125B7D59F70E57FA0EF5323470801F7C689DA0A3AD0D1C07A262

                      Execution Graph

                      Execution Coverage:4.2%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:6.4%
                      Total number of Nodes:1680
                      Total number of Limit Nodes:39
                      execution_graph 52914 415d41 52929 41b411 52914->52929 52916 415d4a 52940 4020f6 52916->52940 52921 4170c4 52964 401e8d 52921->52964 52925 401fd8 11 API calls 52926 4170d9 52925->52926 52927 401fd8 11 API calls 52926->52927 52928 4170e5 52927->52928 52970 4020df 52929->52970 52934 41b456 InternetReadFile 52939 41b479 52934->52939 52935 41b4a6 InternetCloseHandle InternetCloseHandle 52937 41b4b8 52935->52937 52937->52916 52938 401fd8 11 API calls 52938->52939 52939->52934 52939->52935 52939->52938 52981 4020b7 52939->52981 52941 40210c 52940->52941 52942 4023ce 11 API calls 52941->52942 52943 402126 52942->52943 52944 402569 28 API calls 52943->52944 52945 402134 52944->52945 52946 404aa1 52945->52946 52947 404ab4 52946->52947 53048 40520c 52947->53048 52949 404ac9 ctype 52950 404b40 WaitForSingleObject 52949->52950 52951 404b20 52949->52951 52953 404b56 52950->52953 52952 404b32 send 52951->52952 52954 404b7b 52952->52954 53054 4210cb 54 API calls 52953->53054 52956 401fd8 11 API calls 52954->52956 52958 404b83 52956->52958 52957 404b69 SetEvent 52957->52954 52959 401fd8 11 API calls 52958->52959 52960 404b8b 52959->52960 52960->52921 52961 401fd8 52960->52961 52962 4023ce 11 API calls 52961->52962 52963 401fe1 52962->52963 52963->52921 52965 402163 52964->52965 52969 40219f 52965->52969 53072 402730 11 API calls 52965->53072 52967 402184 53073 402712 11 API calls std::_Deallocate 52967->53073 52969->52925 52971 4020e7 52970->52971 52987 4023ce 52971->52987 52973 4020f2 52974 43bda0 52973->52974 52979 4461b8 ___crtLCMapStringA 52974->52979 52975 4461f6 53003 44062d 20 API calls _Atexit 52975->53003 52976 4461e1 HeapAlloc 52978 41b42f InternetOpenW InternetOpenUrlW 52976->52978 52976->52979 52978->52934 52979->52975 52979->52976 53002 443001 7 API calls 2 library calls 52979->53002 52982 4020bf 52981->52982 52983 4023ce 11 API calls 52982->52983 52984 4020ca 52983->52984 53004 40250a 52984->53004 52986 4020d9 52986->52939 52988 402428 52987->52988 52989 4023d8 52987->52989 52988->52973 52989->52988 52991 4027a7 52989->52991 52992 402e21 52991->52992 52995 4016b4 52992->52995 52994 402e30 52994->52988 52996 4016c6 52995->52996 52997 4016cb 52995->52997 53001 43bd68 11 API calls _Atexit 52996->53001 52997->52996 52998 4016f3 52997->52998 52998->52994 53000 43bd67 53001->53000 53002->52979 53003->52978 53005 40251a 53004->53005 53006 402520 53005->53006 53007 402535 53005->53007 53011 402569 53006->53011 53021 4028e8 53007->53021 53010 402533 53010->52986 53032 402888 53011->53032 53013 40257d 53014 402592 53013->53014 53015 4025a7 53013->53015 53037 402a34 22 API calls 53014->53037 53017 4028e8 28 API calls 53015->53017 53020 4025a5 53017->53020 53018 40259b 53038 4029da 22 API calls 53018->53038 53020->53010 53022 4028f1 53021->53022 53023 402953 53022->53023 53024 4028fb 53022->53024 53046 4028a4 22 API calls 53023->53046 53027 402904 53024->53027 53029 402917 53024->53029 53040 402cae 53027->53040 53028 402915 53028->53010 53029->53028 53031 4023ce 11 API calls 53029->53031 53031->53028 53033 402890 53032->53033 53034 402898 53033->53034 53039 402ca3 22 API calls 53033->53039 53034->53013 53037->53018 53038->53020 53041 402cb8 __EH_prolog 53040->53041 53047 402e54 22 API calls 53041->53047 53043 4023ce 11 API calls 53045 402d92 53043->53045 53044 402d24 53044->53043 53045->53028 53047->53044 53049 405214 53048->53049 53050 4023ce 11 API calls 53049->53050 53051 40521f 53050->53051 53055 405234 53051->53055 53053 40522e 53053->52949 53054->52957 53056 405240 53055->53056 53057 40526e 53055->53057 53058 4028e8 28 API calls 53056->53058 53071 4028a4 22 API calls 53057->53071 53060 40524a 53058->53060 53060->53053 53072->52967 53073->52969 53074 4165db 53085 401e65 53074->53085 53076 4165eb 53077 4020f6 28 API calls 53076->53077 53078 4165f6 53077->53078 53079 401e65 22 API calls 53078->53079 53080 416601 53079->53080 53081 4020f6 28 API calls 53080->53081 53082 41660c 53081->53082 53090 412965 53082->53090 53086 401e6d 53085->53086 53087 401e75 53086->53087 53109 402158 22 API calls 53086->53109 53087->53076 53110 40482d 53090->53110 53092 412979 53117 4048c8 connect 53092->53117 53096 41299a 53182 402f10 53096->53182 53099 404aa1 61 API calls 53100 4129ae 53099->53100 53101 401fd8 11 API calls 53100->53101 53102 4129b6 53101->53102 53187 404c10 53102->53187 53105 401fd8 11 API calls 53106 4129cc 53105->53106 53107 401fd8 11 API calls 53106->53107 53108 4129d4 53107->53108 53111 404846 socket 53110->53111 53112 404839 53110->53112 53113 404860 CreateEventW 53111->53113 53114 404842 53111->53114 53205 40489e WSAStartup 53112->53205 53113->53092 53114->53092 53116 40483e 53116->53111 53116->53114 53118 404a1b 53117->53118 53119 4048ee 53117->53119 53120 40497e 53118->53120 53121 404a21 WSAGetLastError 53118->53121 53119->53120 53122 404923 53119->53122 53206 40531e 53119->53206 53177 402f31 53120->53177 53121->53120 53123 404a31 53121->53123 53241 420cf1 27 API calls 53122->53241 53125 404932 53123->53125 53126 404a36 53123->53126 53131 402093 28 API calls 53125->53131 53246 41cb72 30 API calls 53126->53246 53128 40490f 53211 402093 53128->53211 53130 40492b 53130->53125 53134 404941 53130->53134 53135 404a80 53131->53135 53133 404a40 53247 4052fd 28 API calls 53133->53247 53141 404950 53134->53141 53142 404987 53134->53142 53138 402093 28 API calls 53135->53138 53143 404a8f 53138->53143 53145 402093 28 API calls 53141->53145 53243 421ad1 54 API calls 53142->53243 53146 41b580 80 API calls 53143->53146 53149 40495f 53145->53149 53146->53120 53152 402093 28 API calls 53149->53152 53150 40498f 53153 4049c4 53150->53153 53154 404994 53150->53154 53156 40496e 53152->53156 53245 420e97 28 API calls 53153->53245 53158 402093 28 API calls 53154->53158 53161 41b580 80 API calls 53156->53161 53160 4049a3 53158->53160 53163 402093 28 API calls 53160->53163 53164 404973 53161->53164 53162 4049cc 53165 4049f9 CreateEventW CreateEventW 53162->53165 53167 402093 28 API calls 53162->53167 53166 4049b2 53163->53166 53242 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53164->53242 53165->53120 53168 41b580 80 API calls 53166->53168 53170 4049e2 53167->53170 53171 4049b7 53168->53171 53172 402093 28 API calls 53170->53172 53244 421143 52 API calls 53171->53244 53174 4049f1 53172->53174 53175 41b580 80 API calls 53174->53175 53176 4049f6 53175->53176 53176->53165 53178 4020df 11 API calls 53177->53178 53179 402f3d 53178->53179 53180 4032a0 28 API calls 53179->53180 53181 402f59 53180->53181 53181->53096 53298 401fb0 53182->53298 53184 402f1e 53185 402055 11 API calls 53184->53185 53186 402f2d 53185->53186 53186->53099 53188 4020df 11 API calls 53187->53188 53189 404c27 53188->53189 53190 4020df 11 API calls 53189->53190 53193 404c30 53190->53193 53191 43bda0 _Yarn 21 API calls 53191->53193 53193->53191 53194 4020b7 28 API calls 53193->53194 53195 404ca1 53193->53195 53199 401fd8 11 API calls 53193->53199 53301 404b96 53193->53301 53307 401fe2 53193->53307 53316 404cc3 53193->53316 53194->53193 53328 404e26 WaitForSingleObject 53195->53328 53199->53193 53200 401fd8 11 API calls 53201 404cb1 53200->53201 53202 401fd8 11 API calls 53201->53202 53203 404cba 53202->53203 53203->53105 53205->53116 53207 4020df 11 API calls 53206->53207 53208 40532a 53207->53208 53248 4032a0 53208->53248 53210 405346 53210->53128 53212 40209b 53211->53212 53213 4023ce 11 API calls 53212->53213 53214 4020a6 53213->53214 53252 4024ed 53214->53252 53217 41b580 53218 41b631 53217->53218 53219 41b596 GetLocalTime 53217->53219 53220 401fd8 11 API calls 53218->53220 53221 40531e 28 API calls 53219->53221 53222 41b639 53220->53222 53223 41b5d8 53221->53223 53224 401fd8 11 API calls 53222->53224 53256 406383 53223->53256 53226 41b641 53224->53226 53226->53122 53228 402f10 28 API calls 53229 41b5f0 53228->53229 53230 406383 28 API calls 53229->53230 53231 41b5fc 53230->53231 53261 40723b 77 API calls 53231->53261 53233 41b60a 53234 401fd8 11 API calls 53233->53234 53235 41b616 53234->53235 53236 401fd8 11 API calls 53235->53236 53237 41b61f 53236->53237 53238 401fd8 11 API calls 53237->53238 53239 41b628 53238->53239 53240 401fd8 11 API calls 53239->53240 53240->53218 53241->53130 53242->53120 53243->53150 53244->53164 53245->53162 53246->53133 53250 4032aa 53248->53250 53249 4032c9 53249->53210 53250->53249 53251 4028e8 28 API calls 53250->53251 53251->53249 53253 4024f9 53252->53253 53254 40250a 28 API calls 53253->53254 53255 4020b1 53254->53255 53255->53217 53262 4051ef 53256->53262 53258 406391 53266 402055 53258->53266 53261->53233 53263 4051fb 53262->53263 53272 405274 53263->53272 53265 405208 53265->53258 53267 402061 53266->53267 53268 4023ce 11 API calls 53267->53268 53269 40207b 53268->53269 53294 40267a 53269->53294 53273 405282 53272->53273 53274 405288 53273->53274 53275 40529e 53273->53275 53283 4025f0 53274->53283 53277 4052f5 53275->53277 53278 4052b6 53275->53278 53292 4028a4 22 API calls 53277->53292 53281 4028e8 28 API calls 53278->53281 53282 40529c 53278->53282 53281->53282 53282->53265 53284 402888 22 API calls 53283->53284 53285 402602 53284->53285 53286 402672 53285->53286 53287 402629 53285->53287 53293 4028a4 22 API calls 53286->53293 53289 4028e8 28 API calls 53287->53289 53291 40263b 53287->53291 53289->53291 53291->53282 53295 40268b 53294->53295 53296 4023ce 11 API calls 53295->53296 53297 40208d 53296->53297 53297->53228 53299 4025f0 28 API calls 53298->53299 53300 401fbd 53299->53300 53300->53184 53302 404ba0 WaitForSingleObject 53301->53302 53303 404bcd recv 53301->53303 53341 421107 54 API calls 53302->53341 53305 404be0 53303->53305 53305->53193 53306 404bbc SetEvent 53306->53305 53308 401ff1 53307->53308 53309 402039 53307->53309 53310 4023ce 11 API calls 53308->53310 53309->53193 53311 401ffa 53310->53311 53312 40203c 53311->53312 53313 402015 53311->53313 53314 40267a 11 API calls 53312->53314 53342 403098 28 API calls 53313->53342 53314->53309 53317 4020df 11 API calls 53316->53317 53326 404cde 53317->53326 53318 404e13 53319 401fd8 11 API calls 53318->53319 53320 404e1c 53319->53320 53320->53193 53321 401fd8 11 API calls 53321->53326 53322 4020f6 28 API calls 53322->53326 53325 4041a2 28 API calls 53325->53326 53326->53318 53326->53321 53326->53322 53326->53325 53327 401fe2 28 API calls 53326->53327 53343 401fc0 53326->53343 53327->53326 53329 404e40 SetEvent FindCloseChangeNotification 53328->53329 53330 404e57 closesocket 53328->53330 53331 404ca8 53329->53331 53332 404e64 53330->53332 53331->53200 53333 404e7a 53332->53333 53600 4050e4 84 API calls 53332->53600 53335 404e8c WaitForSingleObject 53333->53335 53336 404ece SetEvent CloseHandle 53333->53336 53601 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53335->53601 53336->53331 53338 404e9b SetEvent WaitForSingleObject 53602 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53338->53602 53340 404eb3 SetEvent CloseHandle CloseHandle 53340->53336 53341->53306 53342->53309 53344 401fd2 CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 53343->53344 53345 401fc9 53343->53345 53344->53326 53348 415b25 53344->53348 53347 4025e0 28 API calls 53345->53347 53347->53344 53349 4020f6 28 API calls 53348->53349 53350 415b47 SetEvent 53349->53350 53351 415b5c 53350->53351 53427 4041a2 53351->53427 53354 4020f6 28 API calls 53355 415b86 53354->53355 53356 4020f6 28 API calls 53355->53356 53357 415b98 53356->53357 53430 41beac 53357->53430 53360 415bc1 GetTickCount 53452 41bc1f 53360->53452 53361 415d20 53424 415d34 53361->53424 53426 415d11 53361->53426 53362 401e8d 11 API calls 53364 4170cd 53362->53364 53367 401fd8 11 API calls 53364->53367 53369 4170d9 53367->53369 53371 401fd8 11 API calls 53369->53371 53370 415bde 53373 41bc1f 28 API calls 53370->53373 53372 4170e5 53371->53372 53374 415be9 53373->53374 53458 41bb27 53374->53458 53379 401e65 22 API calls 53380 415c13 53379->53380 53381 402f31 28 API calls 53380->53381 53382 415c21 53381->53382 53467 402ea1 53382->53467 53385 402f10 28 API calls 53386 415c3f 53385->53386 53387 402ea1 28 API calls 53386->53387 53388 415c4e 53387->53388 53389 402f10 28 API calls 53388->53389 53390 415c5a 53389->53390 53391 402ea1 28 API calls 53390->53391 53392 415c64 53391->53392 53393 404aa1 61 API calls 53392->53393 53394 415c73 53393->53394 53395 401fd8 11 API calls 53394->53395 53396 415c7c 53395->53396 53397 401fd8 11 API calls 53396->53397 53398 415c88 53397->53398 53399 401fd8 11 API calls 53398->53399 53400 415c94 53399->53400 53401 401fd8 11 API calls 53400->53401 53402 415ca0 53401->53402 53403 401fd8 11 API calls 53402->53403 53404 415cac 53403->53404 53405 401fd8 11 API calls 53404->53405 53406 415cb8 53405->53406 53476 401f09 53406->53476 53409 401fd8 11 API calls 53410 415cca 53409->53410 53411 401fd8 11 API calls 53410->53411 53412 415cd3 53411->53412 53413 401e65 22 API calls 53412->53413 53414 415cde 53413->53414 53479 43bb2c 53414->53479 53417 415d16 53418 401e65 22 API calls 53417->53418 53418->53361 53419 415cf0 53420 415d09 53419->53420 53421 415cfe 53419->53421 53484 404f51 53420->53484 53483 404ff4 82 API calls 53421->53483 53499 4050e4 84 API calls 53424->53499 53425 415d04 53425->53426 53426->53362 53500 40423a 53427->53500 53431 4020df 11 API calls 53430->53431 53450 41bebf 53431->53450 53432 401fd8 11 API calls 53433 41bf61 53432->53433 53435 401fd8 11 API calls 53433->53435 53434 41bf31 53438 4041a2 28 API calls 53434->53438 53437 41bf69 53435->53437 53436 4041a2 28 API calls 53436->53450 53440 401fd8 11 API calls 53437->53440 53439 41bf3d 53438->53439 53441 401fe2 28 API calls 53439->53441 53443 415ba1 53440->53443 53444 41bf46 53441->53444 53442 401fe2 28 API calls 53442->53450 53443->53360 53443->53361 53443->53426 53445 401fd8 11 API calls 53444->53445 53447 41bf4e 53445->53447 53446 401fd8 11 API calls 53446->53450 53507 41cec5 28 API calls 53447->53507 53450->53434 53450->53436 53450->53442 53450->53446 53451 41bf2f 53450->53451 53506 41cec5 28 API calls 53450->53506 53451->53432 53508 441ed1 53452->53508 53455 402093 28 API calls 53456 415bd2 53455->53456 53457 41bb77 GetLastInputInfo GetTickCount 53456->53457 53457->53370 53517 436f10 53458->53517 53463 41bdaf 53464 41bdbc 53463->53464 53465 4020b7 28 API calls 53464->53465 53466 415c05 53465->53466 53466->53379 53472 402eb0 53467->53472 53468 402ef2 53469 401fb0 28 API calls 53468->53469 53470 402ef0 53469->53470 53471 402055 11 API calls 53470->53471 53473 402f09 53471->53473 53472->53468 53474 402ee7 53472->53474 53473->53385 53566 403365 28 API calls 53474->53566 53477 402252 11 API calls 53476->53477 53478 401f12 53477->53478 53478->53409 53480 43bb45 _strftime 53479->53480 53567 43ae83 53480->53567 53482 415ceb 53482->53417 53482->53419 53483->53425 53485 404f65 53484->53485 53486 404fea 53484->53486 53487 404f6e 53485->53487 53488 404fc0 CreateEventA CreateThread 53485->53488 53489 404f7d GetLocalTime 53485->53489 53486->53426 53487->53488 53488->53486 53596 405150 53488->53596 53490 41bc1f 28 API calls 53489->53490 53491 404f91 53490->53491 53595 4052fd 28 API calls 53491->53595 53499->53425 53501 404243 53500->53501 53502 4023ce 11 API calls 53501->53502 53503 40424e 53502->53503 53504 402569 28 API calls 53503->53504 53505 4041b5 53504->53505 53505->53354 53506->53450 53507->53451 53509 441edd 53508->53509 53512 441ccd 53509->53512 53511 41bc43 53511->53455 53513 441ce4 53512->53513 53515 441d1b pre_c_initialization 53513->53515 53516 44062d 20 API calls _Atexit 53513->53516 53515->53511 53516->53515 53518 41bb46 GetForegroundWindow GetWindowTextW 53517->53518 53519 40417e 53518->53519 53520 404186 53519->53520 53525 402252 53520->53525 53522 404191 53529 4041bc 53522->53529 53526 40225c 53525->53526 53527 4022ac 53525->53527 53526->53527 53533 402779 11 API calls std::_Deallocate 53526->53533 53527->53522 53530 4041c8 53529->53530 53534 4041d9 53530->53534 53532 40419c 53532->53463 53533->53527 53535 4041e9 53534->53535 53536 404206 53535->53536 53537 4041ef 53535->53537 53551 4027e6 53536->53551 53541 404267 53537->53541 53540 404204 53540->53532 53542 402888 22 API calls 53541->53542 53543 40427b 53542->53543 53544 404290 53543->53544 53545 4042a5 53543->53545 53562 4042df 22 API calls 53544->53562 53546 4027e6 28 API calls 53545->53546 53550 4042a3 53546->53550 53548 404299 53563 402c48 22 API calls 53548->53563 53550->53540 53552 4027ef 53551->53552 53553 402851 53552->53553 53554 4027f9 53552->53554 53565 4028a4 22 API calls 53553->53565 53557 402802 53554->53557 53558 402815 53554->53558 53564 402aea 28 API calls __EH_prolog 53557->53564 53560 402813 53558->53560 53561 402252 11 API calls 53558->53561 53560->53540 53561->53560 53562->53548 53563->53550 53564->53560 53566->53470 53583 43ba8a 53567->53583 53569 43aed0 53589 43a837 36 API calls 2 library calls 53569->53589 53571 43ae95 53571->53569 53572 43aeaa 53571->53572 53582 43aeaf pre_c_initialization 53571->53582 53588 44062d 20 API calls _Atexit 53572->53588 53575 43aedc 53576 43af0b 53575->53576 53590 43bacf 40 API calls __Tolower 53575->53590 53578 43af77 53576->53578 53591 43ba36 20 API calls 2 library calls 53576->53591 53592 43ba36 20 API calls 2 library calls 53578->53592 53580 43b03e _strftime 53580->53582 53593 44062d 20 API calls _Atexit 53580->53593 53582->53482 53584 43baa2 53583->53584 53585 43ba8f 53583->53585 53584->53571 53594 44062d 20 API calls _Atexit 53585->53594 53587 43ba94 pre_c_initialization 53587->53571 53588->53582 53589->53575 53590->53575 53591->53578 53592->53580 53593->53582 53594->53587 53599 40515c 102 API calls 53596->53599 53598 405159 53599->53598 53600->53333 53601->53338 53602->53340 53603 434918 53604 434924 ___scrt_is_nonwritable_in_current_image 53603->53604 53630 434627 53604->53630 53606 43492b 53608 434954 53606->53608 53928 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 53606->53928 53617 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 53608->53617 53929 4442d2 5 API calls TranslatorGuardHandler 53608->53929 53610 43496d 53612 434973 ___scrt_is_nonwritable_in_current_image 53610->53612 53930 444276 5 API calls TranslatorGuardHandler 53610->53930 53613 4349f3 53641 434ba5 53613->53641 53617->53613 53931 443487 36 API calls 5 library calls 53617->53931 53623 434a15 53624 434a1f 53623->53624 53933 4434bf 28 API calls _Atexit 53623->53933 53626 434a28 53624->53626 53934 443462 28 API calls _Atexit 53624->53934 53935 43479e 13 API calls 2 library calls 53626->53935 53629 434a30 53629->53612 53631 434630 53630->53631 53936 434cb6 IsProcessorFeaturePresent 53631->53936 53633 43463c 53937 438fb1 10 API calls 4 library calls 53633->53937 53635 434641 53636 434645 53635->53636 53938 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53635->53938 53636->53606 53638 43464e 53639 43465c 53638->53639 53939 438fda 8 API calls 3 library calls 53638->53939 53639->53606 53642 436f10 ___scrt_get_show_window_mode 53641->53642 53643 434bb8 GetStartupInfoW 53642->53643 53644 4349f9 53643->53644 53645 444223 53644->53645 53940 44f0d9 53645->53940 53647 44422c 53649 434a02 53647->53649 53944 446895 36 API calls 53647->53944 53650 40ea00 53649->53650 53946 41cbe1 LoadLibraryA GetProcAddress 53650->53946 53652 40ea1c GetModuleFileNameW 53951 40f3fe 53652->53951 53654 40ea38 53655 4020f6 28 API calls 53654->53655 53656 40ea47 53655->53656 53657 4020f6 28 API calls 53656->53657 53658 40ea56 53657->53658 53659 41beac 28 API calls 53658->53659 53660 40ea5f 53659->53660 53966 40fb52 53660->53966 53662 40ea68 53663 401e8d 11 API calls 53662->53663 53664 40ea71 53663->53664 53665 40ea84 53664->53665 53666 40eace 53664->53666 54154 40fbee 118 API calls 53665->54154 53668 401e65 22 API calls 53666->53668 53670 40eade 53668->53670 53669 40ea96 53671 401e65 22 API calls 53669->53671 53673 401e65 22 API calls 53670->53673 53672 40eaa2 53671->53672 54155 410f72 36 API calls __EH_prolog 53672->54155 53674 40eafd 53673->53674 53675 40531e 28 API calls 53674->53675 53677 40eb0c 53675->53677 53679 406383 28 API calls 53677->53679 53678 40eab4 54156 40fb9f 78 API calls 53678->54156 53681 40eb18 53679->53681 53683 401fe2 28 API calls 53681->53683 53682 40eabd 54157 40f3eb 71 API calls 53682->54157 53685 40eb24 53683->53685 53686 401fd8 11 API calls 53685->53686 53687 40eb2d 53686->53687 53689 401fd8 11 API calls 53687->53689 53688 401fd8 11 API calls 53690 40ef36 53688->53690 53691 40eb36 53689->53691 53932 443396 GetModuleHandleW 53690->53932 53692 401e65 22 API calls 53691->53692 53693 40eb3f 53692->53693 53694 401fc0 28 API calls 53693->53694 53695 40eb4a 53694->53695 53696 401e65 22 API calls 53695->53696 53697 40eb63 53696->53697 53698 401e65 22 API calls 53697->53698 53699 40eb7e 53698->53699 53700 40ebe9 53699->53700 54158 406c59 53699->54158 53701 401e65 22 API calls 53700->53701 53707 40ebf6 53701->53707 53703 40ebab 53704 401fe2 28 API calls 53703->53704 53705 40ebb7 53704->53705 53706 401fd8 11 API calls 53705->53706 53709 40ebc0 53706->53709 53708 40ec3d 53707->53708 53713 413584 3 API calls 53707->53713 53970 40d0a4 53708->53970 54163 413584 RegOpenKeyExA 53709->54163 53711 40ec43 53712 40eac6 53711->53712 53973 41b354 53711->53973 53712->53688 53719 40ec21 53713->53719 53717 40f38a 54260 4139e4 30 API calls 53717->54260 53718 40ec5e 53721 40ecb1 53718->53721 54167 407751 RegOpenKeyExA RegQueryValueExA RegCloseKey 53718->54167 53719->53708 54166 4139e4 30 API calls 53719->54166 53722 401e65 22 API calls 53721->53722 53725 40ecba 53722->53725 53734 40ecc6 53725->53734 53735 40eccb 53725->53735 53726 40ec79 53728 40ec87 53726->53728 53729 40ec7d 53726->53729 53727 40f3a0 54261 4124b0 65 API calls ___scrt_get_show_window_mode 53727->54261 53732 401e65 22 API calls 53728->53732 54168 407773 30 API calls 53729->54168 53744 40ec90 53732->53744 53733 40f3aa 53737 41bcef 28 API calls 53733->53737 54171 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 53734->54171 53740 401e65 22 API calls 53735->53740 53736 40ec82 54169 40729b 98 API calls 53736->54169 53741 40f3ba 53737->53741 53742 40ecd4 53740->53742 54055 413a5e RegOpenKeyExW 53741->54055 53990 41bcef 53742->53990 53744->53721 53747 40ecac 53744->53747 53746 40ecdf 53994 401f13 53746->53994 54170 40729b 98 API calls 53747->54170 53752 401f09 11 API calls 53754 40f3d7 53752->53754 53753 401f09 11 API calls 53755 40ecf3 53753->53755 53756 401f09 11 API calls 53754->53756 53757 401e65 22 API calls 53755->53757 53758 40f3e0 53756->53758 53759 40ecfc 53757->53759 54058 40dd7d 53758->54058 53763 401e65 22 API calls 53759->53763 53765 40ed16 53763->53765 53764 40f3ea 53766 401e65 22 API calls 53765->53766 53767 40ed30 53766->53767 53768 401e65 22 API calls 53767->53768 53769 40ed49 53768->53769 53770 40edb6 53769->53770 53771 401e65 22 API calls 53769->53771 53772 40edc5 53770->53772 53778 40ef41 ___scrt_get_show_window_mode 53770->53778 53776 40ed5e _wcslen 53771->53776 53773 40edce 53772->53773 53801 40ee4a ___scrt_get_show_window_mode 53772->53801 53774 401e65 22 API calls 53773->53774 53775 40edd7 53774->53775 53777 401e65 22 API calls 53775->53777 53776->53770 53780 401e65 22 API calls 53776->53780 53779 40ede9 53777->53779 54232 413733 RegOpenKeyExA 53778->54232 53783 401e65 22 API calls 53779->53783 53781 40ed79 53780->53781 53785 401e65 22 API calls 53781->53785 53784 40edfb 53783->53784 53788 401e65 22 API calls 53784->53788 53786 40ed8e 53785->53786 54172 40da6f 53786->54172 53787 40ef8c 53789 401e65 22 API calls 53787->53789 53791 40ee24 53788->53791 53792 40efb1 53789->53792 53797 401e65 22 API calls 53791->53797 53795 402093 28 API calls 53792->53795 53794 401f13 28 API calls 53796 40edad 53794->53796 53798 40efc3 53795->53798 53799 401f09 11 API calls 53796->53799 53800 40ee35 53797->53800 54013 4137aa RegCreateKeyA 53798->54013 53799->53770 54230 40ce34 46 API calls _wcslen 53800->54230 54003 413982 53801->54003 53805 40ee45 53805->53801 53807 40eede ctype 53810 401e65 22 API calls 53807->53810 53808 401e65 22 API calls 53809 40efe5 53808->53809 53812 43bb2c _strftime 40 API calls 53809->53812 53811 40eef5 53810->53811 53811->53787 53814 40ef09 53811->53814 53813 40eff2 53812->53813 53815 40effc 53813->53815 53816 40f01f 53813->53816 53817 401e65 22 API calls 53814->53817 54235 41ce2c 88 API calls ___scrt_get_show_window_mode 53815->54235 53820 402093 28 API calls 53816->53820 53818 40ef12 53817->53818 53821 41bcef 28 API calls 53818->53821 53823 40f034 53820->53823 53824 40ef1e 53821->53824 53822 40f003 CreateThread 53822->53816 54734 41d4ee 10 API calls 53822->54734 53825 402093 28 API calls 53823->53825 54231 40f4af 114 API calls 53824->54231 53827 40f043 53825->53827 53829 41b580 80 API calls 53827->53829 53828 40ef23 53828->53787 53830 40ef2a 53828->53830 53831 40f048 53829->53831 53830->53712 53832 401e65 22 API calls 53831->53832 53833 40f054 53832->53833 53834 401e65 22 API calls 53833->53834 53835 40f066 53834->53835 53836 401e65 22 API calls 53835->53836 53837 40f086 53836->53837 53838 43bb2c _strftime 40 API calls 53837->53838 53839 40f093 53838->53839 53840 401e65 22 API calls 53839->53840 53841 40f09e 53840->53841 53842 401e65 22 API calls 53841->53842 53843 40f0af 53842->53843 53844 401e65 22 API calls 53843->53844 53845 40f0c4 53844->53845 53846 401e65 22 API calls 53845->53846 53847 40f0d5 53846->53847 53848 40f0dc StrToIntA 53847->53848 54019 409e1f 53848->54019 53851 401e65 22 API calls 53852 40f0f7 53851->53852 53853 40f103 53852->53853 53854 40f13c 53852->53854 54236 43455e 53853->54236 53857 401e65 22 API calls 53854->53857 53859 40f14c 53857->53859 53858 401e65 22 API calls 53860 40f11f 53858->53860 53862 40f194 53859->53862 53863 40f158 53859->53863 53861 40f126 CreateThread 53860->53861 53861->53854 54731 41a045 113 API calls 2 library calls 53861->54731 53864 401e65 22 API calls 53862->53864 53865 43455e new 22 API calls 53863->53865 53866 40f19d 53864->53866 53867 40f161 53865->53867 53870 40f207 53866->53870 53871 40f1a9 53866->53871 53868 401e65 22 API calls 53867->53868 53869 40f173 53868->53869 53872 40f17a CreateThread 53869->53872 53873 401e65 22 API calls 53870->53873 53874 401e65 22 API calls 53871->53874 53872->53862 54730 41a045 113 API calls 2 library calls 53872->54730 53875 40f210 53873->53875 53876 40f1b9 53874->53876 53877 40f255 53875->53877 53878 40f21c 53875->53878 53879 401e65 22 API calls 53876->53879 54044 41b69e GetComputerNameExW GetUserNameW 53877->54044 53881 401e65 22 API calls 53878->53881 53882 40f1ce 53879->53882 53884 40f225 53881->53884 54243 40da23 53882->54243 53888 401e65 22 API calls 53884->53888 53885 401f13 28 API calls 53887 40f269 53885->53887 53890 401f09 11 API calls 53887->53890 53891 40f23a 53888->53891 53893 40f272 53890->53893 53902 43bb2c _strftime 40 API calls 53891->53902 53892 401f13 28 API calls 53894 40f1ed 53892->53894 53895 40f27b SetProcessDEPPolicy 53893->53895 53896 40f27e CreateThread 53893->53896 53899 401f09 11 API calls 53894->53899 53895->53896 53897 40f293 CreateThread 53896->53897 53898 40f29f 53896->53898 54703 40f7e2 53896->54703 53897->53898 54732 412132 146 API calls 53897->54732 53900 40f2b4 53898->53900 53901 40f2a8 CreateThread 53898->53901 53903 40f1f6 CreateThread 53899->53903 53905 40f307 53900->53905 53907 402093 28 API calls 53900->53907 53901->53900 54733 412716 38 API calls ___scrt_get_show_window_mode 53901->54733 53904 40f247 53902->53904 53903->53870 54735 401be9 50 API calls _strftime 53903->54735 54254 40c19d 7 API calls 53904->54254 54256 41353a RegOpenKeyExA 53905->54256 53908 40f2d7 53907->53908 54255 4052fd 28 API calls 53908->54255 53913 40f328 53915 41bcef 28 API calls 53913->53915 53917 40f338 53915->53917 54259 413656 31 API calls 53917->54259 53922 40f34e 53923 401f09 11 API calls 53922->53923 53926 40f359 53923->53926 53924 40f381 DeleteFileW 53925 40f388 53924->53925 53924->53926 53925->53733 53926->53733 53926->53924 53927 40f36f Sleep 53926->53927 53927->53926 53928->53606 53929->53610 53930->53617 53931->53613 53932->53623 53933->53624 53934->53626 53935->53629 53936->53633 53937->53635 53938->53638 53939->53636 53941 44f0e2 53940->53941 53943 44f0eb 53940->53943 53945 44efd8 49 API calls 4 library calls 53941->53945 53943->53647 53944->53647 53945->53943 53947 41cc20 LoadLibraryA GetProcAddress 53946->53947 53948 41cc10 GetModuleHandleA GetProcAddress 53946->53948 53949 41cc49 44 API calls 53947->53949 53950 41cc39 LoadLibraryA GetProcAddress 53947->53950 53948->53947 53949->53652 53950->53949 54262 41b539 FindResourceA 53951->54262 53954 43bda0 _Yarn 21 API calls 53955 40f428 ctype 53954->53955 53956 4020b7 28 API calls 53955->53956 53957 40f443 53956->53957 53958 401fe2 28 API calls 53957->53958 53959 40f44e 53958->53959 53960 401fd8 11 API calls 53959->53960 53961 40f457 53960->53961 53962 43bda0 _Yarn 21 API calls 53961->53962 53963 40f468 ctype 53962->53963 54265 406e13 53963->54265 53965 40f49b 53965->53654 53967 40fb5e 53966->53967 53969 40fb65 53966->53969 54268 402163 11 API calls 53967->54268 53969->53662 54269 401fab 53970->54269 53972 40d0ae CreateMutexA GetLastError 53972->53711 54270 41c048 53973->54270 53978 401fe2 28 API calls 53979 41b390 53978->53979 53980 401fd8 11 API calls 53979->53980 53981 41b398 53980->53981 53982 4135e1 31 API calls 53981->53982 53984 41b3ee 53981->53984 53983 41b3c1 53982->53983 53985 41b3cc StrToIntA 53983->53985 53984->53718 53986 41b3e3 53985->53986 53987 41b3da 53985->53987 53989 401fd8 11 API calls 53986->53989 54279 41cffa 22 API calls 53987->54279 53989->53984 53991 41bd03 53990->53991 54280 40b93f 53991->54280 53993 41bd0b 53993->53746 53995 401f22 53994->53995 54002 401f6a 53994->54002 53996 402252 11 API calls 53995->53996 53997 401f2b 53996->53997 53998 401f6d 53997->53998 54000 401f46 53997->54000 54295 402336 53998->54295 54294 40305c 28 API calls 54000->54294 54002->53753 54004 4139a0 54003->54004 54005 406e13 28 API calls 54004->54005 54006 4139b5 54005->54006 54007 4020f6 28 API calls 54006->54007 54008 4139c5 54007->54008 54009 4137aa 14 API calls 54008->54009 54010 4139cf 54009->54010 54011 401fd8 11 API calls 54010->54011 54012 4139dc 54011->54012 54012->53807 54014 4137fa 54013->54014 54016 4137c3 54013->54016 54015 401fd8 11 API calls 54014->54015 54017 40efd9 54015->54017 54018 4137d5 RegSetValueExA RegCloseKey 54016->54018 54017->53808 54018->54014 54020 409e3d _wcslen 54019->54020 54021 409e48 54020->54021 54022 409e5f 54020->54022 54023 40da6f 32 API calls 54021->54023 54024 40da6f 32 API calls 54022->54024 54025 409e50 54023->54025 54026 409e67 54024->54026 54027 401f13 28 API calls 54025->54027 54028 401f13 28 API calls 54026->54028 54029 409e5a 54027->54029 54030 409e75 54028->54030 54033 401f09 11 API calls 54029->54033 54031 401f09 11 API calls 54030->54031 54032 409e7d 54031->54032 54314 409196 28 API calls 54032->54314 54035 409eb4 54033->54035 54299 40a144 54035->54299 54036 409e8f 54315 403014 54036->54315 54041 401f13 28 API calls 54042 409ea4 54041->54042 54043 401f09 11 API calls 54042->54043 54043->54029 54045 40417e 28 API calls 54044->54045 54046 41b6ed 54045->54046 54515 4042fc 54046->54515 54049 403014 28 API calls 54050 41b703 54049->54050 54051 401f09 11 API calls 54050->54051 54052 41b70c 54051->54052 54053 401f09 11 API calls 54052->54053 54054 40f25e 54053->54054 54054->53885 54056 40f3cd 54055->54056 54057 413a7a RegDeleteValueW 54055->54057 54056->53752 54057->54056 54059 40dd96 54058->54059 54060 41353a 3 API calls 54059->54060 54061 40dd9d 54060->54061 54062 40ddbc 54061->54062 54590 401707 54061->54590 54066 414f65 54062->54066 54064 40ddaa 54593 4138b2 RegCreateKeyA 54064->54593 54067 4020df 11 API calls 54066->54067 54068 414f79 54067->54068 54607 41b944 54068->54607 54071 4020df 11 API calls 54072 414f8f 54071->54072 54073 401e65 22 API calls 54072->54073 54074 414f9d 54073->54074 54075 43bb2c _strftime 40 API calls 54074->54075 54076 414faa 54075->54076 54077 414fbc 54076->54077 54078 414faf Sleep 54076->54078 54079 402093 28 API calls 54077->54079 54078->54077 54080 414fcb 54079->54080 54081 401e65 22 API calls 54080->54081 54082 414fd4 54081->54082 54083 4020f6 28 API calls 54082->54083 54084 414fdf 54083->54084 54085 41beac 28 API calls 54084->54085 54086 414fe7 54085->54086 54611 40489e WSAStartup 54086->54611 54088 414ff1 54089 401e65 22 API calls 54088->54089 54090 414ffa 54089->54090 54091 401e65 22 API calls 54090->54091 54152 415079 54090->54152 54092 415013 54091->54092 54094 401e65 22 API calls 54092->54094 54093 4020f6 28 API calls 54093->54152 54095 415024 54094->54095 54097 401e65 22 API calls 54095->54097 54096 41beac 28 API calls 54096->54152 54098 415035 54097->54098 54099 401e65 22 API calls 54098->54099 54101 415046 54099->54101 54100 406c59 28 API calls 54100->54152 54103 401e65 22 API calls 54101->54103 54102 401fe2 28 API calls 54102->54152 54104 415057 54103->54104 54105 401e65 22 API calls 54104->54105 54106 415069 54105->54106 54634 40473d 89 API calls 54106->54634 54108 40531e 28 API calls 54108->54152 54109 401e65 22 API calls 54109->54152 54111 4151c7 WSAGetLastError 54635 41cb72 30 API calls 54111->54635 54112 40482d 3 API calls 54112->54152 54115 404f51 105 API calls 54115->54152 54116 4048c8 97 API calls 54116->54152 54117 41b580 80 API calls 54117->54152 54118 404e26 99 API calls 54118->54152 54119 401e8d 11 API calls 54119->54152 54120 401e65 22 API calls 54121 415af2 54120->54121 54121->54120 54122 43bb2c _strftime 40 API calls 54121->54122 54123 415b0a Sleep 54122->54123 54123->54152 54124 402093 28 API calls 54124->54152 54127 409097 28 API calls 54127->54152 54128 441ed1 20 API calls 54128->54152 54129 413733 3 API calls 54129->54152 54130 4135e1 31 API calls 54130->54152 54131 40417e 28 API calls 54131->54152 54134 41bdaf 28 API calls 54134->54152 54135 41bc1f 28 API calls 54135->54152 54136 401e65 22 API calls 54137 415474 GetTickCount 54136->54137 54138 41bc1f 28 API calls 54137->54138 54138->54152 54140 41bb27 30 API calls 54140->54152 54142 402f31 28 API calls 54142->54152 54143 402ea1 28 API calls 54143->54152 54144 406383 28 API calls 54144->54152 54145 402f10 28 API calls 54145->54152 54146 404aa1 61 API calls 54146->54152 54147 401fd8 11 API calls 54147->54152 54148 404c10 130 API calls 54148->54152 54149 415a6e 54638 40b08c 85 API calls 54149->54638 54151 415aac CreateThread 54151->54152 54679 41ada8 105 API calls 54151->54679 54152->54093 54152->54096 54152->54100 54152->54102 54152->54108 54152->54109 54152->54111 54152->54112 54152->54115 54152->54116 54152->54117 54152->54118 54152->54119 54152->54121 54152->54124 54152->54127 54152->54128 54152->54129 54152->54130 54152->54131 54152->54134 54152->54135 54152->54136 54152->54140 54152->54142 54152->54143 54152->54144 54152->54145 54152->54146 54152->54147 54152->54148 54152->54149 54152->54151 54153 401f09 11 API calls 54152->54153 54612 414f24 54152->54612 54618 41b871 54152->54618 54621 4145f8 54152->54621 54624 40ddc4 54152->54624 54630 41bcd3 54152->54630 54633 41bb77 GetLastInputInfo GetTickCount 54152->54633 54636 4052fd 28 API calls 54152->54636 54637 40f90c 29 API calls 54152->54637 54153->54152 54154->53669 54155->53678 54156->53682 54159 4020df 11 API calls 54158->54159 54160 406c65 54159->54160 54161 4032a0 28 API calls 54160->54161 54162 406c82 54161->54162 54162->53703 54164 40ebdf 54163->54164 54165 4135ae RegQueryValueExA RegCloseKey 54163->54165 54164->53700 54164->53717 54165->54164 54166->53708 54167->53726 54168->53736 54169->53728 54170->53721 54171->53735 54173 401f86 11 API calls 54172->54173 54174 40da8b 54173->54174 54175 40dae0 54174->54175 54176 40daab 54174->54176 54178 40daa1 54174->54178 54179 41c048 2 API calls 54175->54179 54695 41b645 29 API calls 54176->54695 54177 40dbd4 GetLongPathNameW 54181 40417e 28 API calls 54177->54181 54178->54177 54182 40dae5 54179->54182 54184 40dbe9 54181->54184 54185 40dae9 54182->54185 54186 40db3b 54182->54186 54183 40dab4 54187 401f13 28 API calls 54183->54187 54188 40417e 28 API calls 54184->54188 54190 40417e 28 API calls 54185->54190 54189 40417e 28 API calls 54186->54189 54191 40dabe 54187->54191 54192 40dbf8 54188->54192 54193 40db49 54189->54193 54194 40daf7 54190->54194 54196 401f09 11 API calls 54191->54196 54680 40de0c 54192->54680 54199 40417e 28 API calls 54193->54199 54200 40417e 28 API calls 54194->54200 54196->54178 54202 40db5f 54199->54202 54203 40db0d 54200->54203 54205 402fa5 28 API calls 54202->54205 54206 402fa5 28 API calls 54203->54206 54204 402fa5 28 API calls 54207 40dc20 54204->54207 54208 40db6a 54205->54208 54209 40db18 54206->54209 54210 401f09 11 API calls 54207->54210 54211 401f13 28 API calls 54208->54211 54212 401f13 28 API calls 54209->54212 54214 40dc2a 54210->54214 54215 40db75 54211->54215 54213 40db23 54212->54213 54217 401f09 11 API calls 54213->54217 54218 401f09 11 API calls 54214->54218 54216 401f09 11 API calls 54215->54216 54219 40db7e 54216->54219 54220 40db2c 54217->54220 54221 40dc33 54218->54221 54223 401f09 11 API calls 54219->54223 54224 401f09 11 API calls 54220->54224 54222 401f09 11 API calls 54221->54222 54225 40dc3c 54222->54225 54223->54191 54224->54191 54226 401f09 11 API calls 54225->54226 54227 40dc45 54226->54227 54228 401f09 11 API calls 54227->54228 54229 40dc4e 54228->54229 54229->53794 54230->53805 54231->53828 54233 41377d 54232->54233 54234 413759 RegQueryValueExA RegCloseKey 54232->54234 54233->53787 54234->54233 54235->53822 54238 434563 54236->54238 54237 43bda0 _Yarn 21 API calls 54237->54238 54238->54237 54239 40f10c 54238->54239 54700 443001 7 API calls 2 library calls 54238->54700 54701 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54238->54701 54702 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54238->54702 54239->53858 54244 402093 28 API calls 54243->54244 54245 40da3a 54244->54245 54246 41bcef 28 API calls 54245->54246 54247 40da45 54246->54247 54248 40da6f 32 API calls 54247->54248 54249 40da56 54248->54249 54250 401f09 11 API calls 54249->54250 54251 40da5f 54250->54251 54252 401fd8 11 API calls 54251->54252 54253 40da67 54252->54253 54253->53892 54254->53877 54257 41355b RegQueryValueExA RegCloseKey 54256->54257 54258 40f31f 54256->54258 54257->54258 54258->53758 54258->53913 54259->53922 54260->53727 54263 41b556 LoadResource LockResource SizeofResource 54262->54263 54264 40f419 54262->54264 54263->54264 54264->53954 54266 4020b7 28 API calls 54265->54266 54267 406e27 54266->54267 54267->53965 54268->53969 54271 41b362 54270->54271 54272 41c055 GetCurrentProcess IsWow64Process 54270->54272 54274 4135e1 RegOpenKeyExA 54271->54274 54272->54271 54273 41c06c 54272->54273 54273->54271 54275 41360f RegQueryValueExA RegCloseKey 54274->54275 54276 413639 54274->54276 54275->54276 54277 402093 28 API calls 54276->54277 54278 41364e 54277->54278 54278->53978 54279->53986 54281 40b947 54280->54281 54282 402252 11 API calls 54281->54282 54283 40b952 54282->54283 54286 40b967 54283->54286 54285 40b961 54285->53993 54287 40b9a1 54286->54287 54288 40b973 54286->54288 54293 4028a4 22 API calls 54287->54293 54290 4027e6 28 API calls 54288->54290 54292 40b97d 54290->54292 54292->54285 54294->54002 54296 402347 54295->54296 54297 402252 11 API calls 54296->54297 54298 4023c7 54297->54298 54298->54002 54300 40a162 54299->54300 54301 413584 3 API calls 54300->54301 54302 40a169 54301->54302 54303 40a197 54302->54303 54304 40a17d 54302->54304 54320 409097 54303->54320 54305 40a182 54304->54305 54306 409ed6 54304->54306 54308 409097 28 API calls 54305->54308 54306->53851 54311 40a190 54308->54311 54348 40a268 29 API calls 54311->54348 54313 40a195 54313->54306 54314->54036 54483 403222 54315->54483 54317 403022 54487 403262 54317->54487 54321 4090ad 54320->54321 54322 402252 11 API calls 54321->54322 54323 4090c7 54322->54323 54324 404267 28 API calls 54323->54324 54325 4090d5 54324->54325 54326 40a1b4 54325->54326 54349 40b927 54326->54349 54329 40a205 54332 402093 28 API calls 54329->54332 54330 40a1dd 54331 402093 28 API calls 54330->54331 54333 40a1e7 54331->54333 54334 40a210 54332->54334 54335 41bcef 28 API calls 54333->54335 54336 402093 28 API calls 54334->54336 54337 40a1f5 54335->54337 54338 40a21f 54336->54338 54353 40b19f 31 API calls _Yarn 54337->54353 54340 41b580 80 API calls 54338->54340 54342 40a224 CreateThread 54340->54342 54341 40a1fc 54343 401fd8 11 API calls 54341->54343 54344 40a24b CreateThread 54342->54344 54345 40a23f CreateThread 54342->54345 54361 40a2b8 54342->54361 54343->54329 54346 401f09 11 API calls 54344->54346 54358 40a2c4 54344->54358 54345->54344 54355 40a2a2 54345->54355 54347 40a25f 54346->54347 54347->54306 54348->54313 54482 40a2ae 163 API calls 54348->54482 54350 40b930 54349->54350 54351 40a1d2 54349->54351 54354 40b9a7 28 API calls 54350->54354 54351->54329 54351->54330 54353->54341 54354->54351 54364 40a2f3 54355->54364 54381 40ad11 54358->54381 54423 40a761 54361->54423 54365 40a30c SetWindowsHookExA 54364->54365 54366 40a36e GetMessageA 54364->54366 54365->54366 54369 40a328 GetLastError 54365->54369 54367 40a380 TranslateMessage DispatchMessageA 54366->54367 54379 40a2ab 54366->54379 54367->54366 54367->54379 54370 41bc1f 28 API calls 54369->54370 54371 40a339 54370->54371 54380 4052fd 28 API calls 54371->54380 54388 40ad1f 54381->54388 54382 40a2cd 54383 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 54385 40b93f 28 API calls 54383->54385 54385->54388 54388->54382 54388->54383 54390 41bb77 GetLastInputInfo GetTickCount 54388->54390 54391 40adbf GetWindowTextW 54388->54391 54393 401f09 11 API calls 54388->54393 54394 40af17 54388->54394 54395 40b927 28 API calls 54388->54395 54397 40ae84 Sleep 54388->54397 54398 441ed1 20 API calls 54388->54398 54400 402093 28 API calls 54388->54400 54401 40ae0c 54388->54401 54406 403014 28 API calls 54388->54406 54407 406383 28 API calls 54388->54407 54408 41bcef 28 API calls 54388->54408 54409 40a671 12 API calls 54388->54409 54410 401fd8 11 API calls 54388->54410 54411 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 54388->54411 54412 401f86 54388->54412 54416 434801 23 API calls __onexit 54388->54416 54417 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 54388->54417 54418 40907f 28 API calls 54388->54418 54420 40b9b7 28 API calls 54388->54420 54421 40b783 40 API calls 2 library calls 54388->54421 54422 4052fd 28 API calls 54388->54422 54390->54388 54391->54388 54393->54388 54396 401f09 11 API calls 54394->54396 54395->54388 54396->54382 54397->54388 54398->54388 54400->54388 54401->54388 54404 409097 28 API calls 54401->54404 54419 40b19f 31 API calls _Yarn 54401->54419 54404->54401 54406->54388 54407->54388 54408->54388 54409->54388 54410->54388 54413 401f8e 54412->54413 54414 402252 11 API calls 54413->54414 54415 401f99 54414->54415 54415->54388 54416->54388 54417->54388 54418->54388 54419->54401 54420->54388 54421->54388 54424 40a776 Sleep 54423->54424 54444 40a6b0 54424->54444 54426 40a2c1 54427 40a7b6 CreateDirectoryW 54432 40a788 54427->54432 54428 40a7c7 GetFileAttributesW 54428->54432 54429 40a7de SetFileAttributesW 54429->54432 54430 4020df 11 API calls 54440 40a829 54430->54440 54432->54424 54432->54426 54432->54427 54432->54428 54432->54429 54434 401e65 22 API calls 54432->54434 54432->54440 54457 41c482 54432->54457 54433 40a858 PathFileExistsW 54433->54440 54434->54432 54436 4020b7 28 API calls 54436->54440 54437 40a961 SetFileAttributesW 54437->54432 54438 401fd8 11 API calls 54438->54440 54439 406e13 28 API calls 54439->54440 54440->54430 54440->54433 54440->54436 54440->54437 54440->54438 54440->54439 54441 401fe2 28 API calls 54440->54441 54443 401fd8 11 API calls 54440->54443 54467 41c516 CreateFileW 54440->54467 54475 41c583 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 54440->54475 54441->54440 54443->54432 54445 40a75d 54444->54445 54448 40a6c6 54444->54448 54445->54432 54446 40a6e5 CreateFileW 54447 40a6f3 GetFileSize 54446->54447 54446->54448 54447->54448 54449 40a728 FindCloseChangeNotification 54447->54449 54448->54446 54448->54449 54450 40a73a 54448->54450 54451 40a716 54448->54451 54452 40a71d Sleep 54448->54452 54449->54448 54450->54445 54454 409097 28 API calls 54450->54454 54476 40b117 84 API calls 54451->54476 54452->54449 54455 40a756 54454->54455 54456 40a1b4 124 API calls 54455->54456 54456->54445 54458 41c495 CreateFileW 54457->54458 54460 41c4d2 54458->54460 54461 41c4ce 54458->54461 54462 41c4f2 WriteFile 54460->54462 54463 41c4d9 SetFilePointer 54460->54463 54461->54432 54465 41c505 54462->54465 54466 41c507 FindCloseChangeNotification 54462->54466 54463->54462 54464 41c4e9 CloseHandle 54463->54464 54464->54461 54465->54466 54466->54461 54468 41c540 GetFileSize 54467->54468 54469 41c53c 54467->54469 54477 40244e 54468->54477 54469->54440 54471 41c554 54472 41c566 ReadFile 54471->54472 54473 41c573 54472->54473 54474 41c575 FindCloseChangeNotification 54472->54474 54473->54474 54474->54469 54475->54440 54476->54452 54478 402456 54477->54478 54480 402460 54478->54480 54481 402a51 28 API calls 54478->54481 54480->54471 54481->54480 54484 40322e 54483->54484 54493 403618 54484->54493 54486 40323b 54486->54317 54488 40326e 54487->54488 54489 402252 11 API calls 54488->54489 54490 403288 54489->54490 54491 402336 11 API calls 54490->54491 54492 403031 54491->54492 54492->54041 54494 403626 54493->54494 54495 403644 54494->54495 54496 40362c 54494->54496 54497 40365c 54495->54497 54498 40369e 54495->54498 54504 4036a6 54496->54504 54502 4027e6 28 API calls 54497->54502 54503 403642 54497->54503 54513 4028a4 22 API calls 54498->54513 54502->54503 54503->54486 54505 402888 22 API calls 54504->54505 54506 4036b9 54505->54506 54507 40372c 54506->54507 54508 4036de 54506->54508 54514 4028a4 22 API calls 54507->54514 54511 4027e6 28 API calls 54508->54511 54512 4036f0 54508->54512 54511->54512 54512->54503 54520 404353 54515->54520 54517 40430a 54518 403262 11 API calls 54517->54518 54519 404319 54518->54519 54519->54049 54521 40435f 54520->54521 54524 404371 54521->54524 54523 40436d 54523->54517 54525 40437f 54524->54525 54526 404385 54525->54526 54527 40439e 54525->54527 54588 4034e6 28 API calls 54526->54588 54528 402888 22 API calls 54527->54528 54529 4043a6 54528->54529 54531 404419 54529->54531 54532 4043bf 54529->54532 54589 4028a4 22 API calls 54531->54589 54534 4027e6 28 API calls 54532->54534 54542 40439c 54532->54542 54534->54542 54542->54523 54588->54542 54596 43ab1a 54590->54596 54594 4138f4 54593->54594 54595 4138ca RegSetValueExA RegCloseKey 54593->54595 54594->54062 54595->54594 54599 43aa9b 54596->54599 54598 40170d 54598->54064 54600 43aaaa 54599->54600 54601 43aabe 54599->54601 54605 44062d 20 API calls _Atexit 54600->54605 54604 43aaaf pre_c_initialization __alldvrm 54601->54604 54606 4489d7 11 API calls 2 library calls 54601->54606 54604->54598 54605->54604 54606->54604 54610 41b98a ctype ___scrt_get_show_window_mode 54607->54610 54608 402093 28 API calls 54609 414f84 54608->54609 54609->54071 54610->54608 54611->54088 54613 414f33 54612->54613 54614 414f3d WSASetLastError 54612->54614 54639 414dc1 29 API calls ___std_exception_copy 54613->54639 54614->54152 54616 414f38 54616->54614 54640 41b847 GlobalMemoryStatusEx 54618->54640 54620 41b886 54620->54152 54641 4145bb 54621->54641 54625 40dde0 54624->54625 54626 41353a 3 API calls 54625->54626 54628 40dde7 54626->54628 54627 40ddff 54627->54152 54628->54627 54629 413584 3 API calls 54628->54629 54629->54627 54631 4020b7 28 API calls 54630->54631 54632 41bce8 54631->54632 54632->54152 54633->54152 54634->54152 54635->54152 54637->54152 54638->54152 54639->54616 54640->54620 54644 41458e 54641->54644 54645 4145a3 ___scrt_initialize_default_local_stdio_options 54644->54645 54648 43f7ed 54645->54648 54651 43c540 54648->54651 54652 43c580 54651->54652 54653 43c568 54651->54653 54652->54653 54655 43c588 54652->54655 54673 44062d 20 API calls _Atexit 54653->54673 54674 43a837 36 API calls 2 library calls 54655->54674 54657 43c598 54675 43ccc6 20 API calls 2 library calls 54657->54675 54658 43c56d pre_c_initialization 54666 43502b 54658->54666 54661 43c610 54676 43d334 51 API calls 3 library calls 54661->54676 54662 4145b1 54662->54152 54665 43c61b 54677 43cd30 20 API calls _free 54665->54677 54667 435036 IsProcessorFeaturePresent 54666->54667 54668 435034 54666->54668 54670 435078 54667->54670 54668->54662 54678 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54670->54678 54672 43515b 54672->54662 54673->54658 54674->54657 54675->54661 54676->54665 54677->54658 54678->54672 54681 40de14 54680->54681 54682 402252 11 API calls 54681->54682 54683 40de1f 54682->54683 54684 4041d9 28 API calls 54683->54684 54685 40dc0b 54684->54685 54686 402fa5 54685->54686 54688 402fb4 54686->54688 54687 402ff6 54697 40323f 54687->54697 54688->54687 54692 402feb 54688->54692 54690 403262 11 API calls 54691 40300d 54690->54691 54691->54204 54696 403211 28 API calls 54692->54696 54694 402ff4 54694->54690 54695->54183 54696->54694 54698 4036a6 28 API calls 54697->54698 54699 40324c 54698->54699 54699->54694 54700->54238 54705 40f7fd 54703->54705 54704 413584 3 API calls 54704->54705 54705->54704 54706 40f8a1 54705->54706 54709 40f891 Sleep 54705->54709 54725 40f82f 54705->54725 54708 409097 28 API calls 54706->54708 54707 409097 28 API calls 54707->54725 54711 40f8ac 54708->54711 54709->54705 54710 41bcef 28 API calls 54710->54725 54713 41bcef 28 API calls 54711->54713 54714 40f8b8 54713->54714 54738 41384f 14 API calls 54714->54738 54717 401f09 11 API calls 54717->54725 54718 40f8cb 54719 401f09 11 API calls 54718->54719 54721 40f8d7 54719->54721 54720 402093 28 API calls 54720->54725 54722 402093 28 API calls 54721->54722 54723 40f8e8 54722->54723 54726 4137aa 14 API calls 54723->54726 54724 4137aa 14 API calls 54724->54725 54725->54707 54725->54709 54725->54710 54725->54717 54725->54720 54725->54724 54736 40d0d1 112 API calls ___scrt_get_show_window_mode 54725->54736 54737 41384f 14 API calls 54725->54737 54727 40f8fb 54726->54727 54739 41288b TerminateProcess WaitForSingleObject 54727->54739 54729 40f903 ExitProcess 54740 412829 62 API calls 54732->54740 54737->54725 54738->54718 54739->54729 54741 4129da 54742 4129ec 54741->54742 54743 4041a2 28 API calls 54742->54743 54744 4129ff 54743->54744 54745 4020f6 28 API calls 54744->54745 54746 412a0e 54745->54746 54747 4020f6 28 API calls 54746->54747 54748 412a1d 54747->54748 54749 41beac 28 API calls 54748->54749 54750 412a26 54749->54750 54751 412ace 54750->54751 54753 401e65 22 API calls 54750->54753 54752 401e8d 11 API calls 54751->54752 54754 412ad7 54752->54754 54755 412a3d 54753->54755 54756 401fd8 11 API calls 54754->54756 54757 4020f6 28 API calls 54755->54757 54758 412ae0 54756->54758 54759 412a48 54757->54759 54760 401fd8 11 API calls 54758->54760 54761 401e65 22 API calls 54759->54761 54762 412ae8 54760->54762 54763 412a53 54761->54763 54764 4020f6 28 API calls 54763->54764 54765 412a5e 54764->54765 54766 401e65 22 API calls 54765->54766 54767 412a69 54766->54767 54768 4020f6 28 API calls 54767->54768 54769 412a74 54768->54769 54770 401e65 22 API calls 54769->54770 54771 412a7f 54770->54771 54772 4020f6 28 API calls 54771->54772 54773 412a8a 54772->54773 54774 401e65 22 API calls 54773->54774 54775 412a95 54774->54775 54776 4020f6 28 API calls 54775->54776 54777 412aa0 54776->54777 54778 401e65 22 API calls 54777->54778 54779 412aae 54778->54779 54780 4020f6 28 API calls 54779->54780 54781 412ab9 54780->54781 54785 412aef GetModuleFileNameW 54781->54785 54784 404e26 99 API calls 54784->54751 54786 4020df 11 API calls 54785->54786 54787 412b1a 54786->54787 54788 4020df 11 API calls 54787->54788 54789 412b26 54788->54789 54790 4020df 11 API calls 54789->54790 54812 412b32 54790->54812 54791 40da23 32 API calls 54791->54812 54792 401fd8 11 API calls 54792->54812 54793 41ba09 43 API calls 54793->54812 54794 4185a3 31 API calls 54794->54812 54795 412c58 Sleep 54795->54812 54796 40417e 28 API calls 54796->54812 54797 4042fc 79 API calls 54797->54812 54798 40431d 28 API calls 54798->54812 54799 401f09 11 API calls 54799->54812 54800 412cfa Sleep 54800->54812 54801 403014 28 API calls 54801->54812 54802 412d9c Sleep 54802->54812 54803 41c516 32 API calls 54803->54812 54804 412dff DeleteFileW 54804->54812 54805 412e36 DeleteFileW 54805->54812 54806 412e88 Sleep 54806->54812 54807 412e72 DeleteFileW 54807->54812 54808 412f01 54809 401f09 11 API calls 54808->54809 54810 412f0d 54809->54810 54811 401f09 11 API calls 54810->54811 54813 412f19 54811->54813 54812->54791 54812->54792 54812->54793 54812->54794 54812->54795 54812->54796 54812->54797 54812->54798 54812->54799 54812->54800 54812->54801 54812->54802 54812->54803 54812->54804 54812->54805 54812->54806 54812->54807 54812->54808 54816 412ecd Sleep 54812->54816 54814 401f09 11 API calls 54813->54814 54815 412f25 54814->54815 54817 40b93f 28 API calls 54815->54817 54818 401f09 11 API calls 54816->54818 54819 412f38 54817->54819 54823 412edd 54818->54823 54821 4020f6 28 API calls 54819->54821 54820 401f09 11 API calls 54820->54823 54822 412f58 54821->54822 54932 413268 54822->54932 54823->54812 54823->54820 54825 412eff 54823->54825 54825->54815 54827 401f09 11 API calls 54828 412f6f 54827->54828 54829 4130e3 54828->54829 54830 412f8f 54828->54830 54831 41bdaf 28 API calls 54829->54831 54832 41bdaf 28 API calls 54830->54832 54833 4130ec 54831->54833 54834 412f9b 54832->54834 54835 402f31 28 API calls 54833->54835 54836 41bc1f 28 API calls 54834->54836 54837 413123 54835->54837 54838 412fb5 54836->54838 54839 402f10 28 API calls 54837->54839 54840 402f31 28 API calls 54838->54840 54841 413132 54839->54841 54842 412fe5 54840->54842 54843 402f10 28 API calls 54841->54843 54844 402f10 28 API calls 54842->54844 54845 41313e 54843->54845 54846 412ff4 54844->54846 54847 402f10 28 API calls 54845->54847 54848 402f10 28 API calls 54846->54848 54849 41314d 54847->54849 54850 413003 54848->54850 54851 402f10 28 API calls 54849->54851 54852 402f10 28 API calls 54850->54852 54853 41315c 54851->54853 54854 413012 54852->54854 54855 402f10 28 API calls 54853->54855 54856 402f10 28 API calls 54854->54856 54858 41316b 54855->54858 54857 413021 54856->54857 54860 402f10 28 API calls 54857->54860 54859 402f10 28 API calls 54858->54859 54861 41317a 54859->54861 54862 41302d 54860->54862 54863 402ea1 28 API calls 54861->54863 54864 402f10 28 API calls 54862->54864 54865 413184 54863->54865 54866 413039 54864->54866 54867 404aa1 61 API calls 54865->54867 54868 402ea1 28 API calls 54866->54868 54869 413191 54867->54869 54870 413048 54868->54870 54871 401fd8 11 API calls 54869->54871 54872 402f10 28 API calls 54870->54872 54873 41319d 54871->54873 54874 413054 54872->54874 54875 401fd8 11 API calls 54873->54875 54876 402ea1 28 API calls 54874->54876 54877 4131a9 54875->54877 54878 41305e 54876->54878 54879 401fd8 11 API calls 54877->54879 54880 404aa1 61 API calls 54878->54880 54881 4131b5 54879->54881 54882 41306b 54880->54882 54883 401fd8 11 API calls 54881->54883 54884 401fd8 11 API calls 54882->54884 54885 4131c1 54883->54885 54886 413074 54884->54886 54887 401fd8 11 API calls 54885->54887 54888 401fd8 11 API calls 54886->54888 54890 4131ca 54887->54890 54889 41307d 54888->54889 54892 401fd8 11 API calls 54889->54892 54891 401fd8 11 API calls 54890->54891 54893 4131d3 54891->54893 54894 413086 54892->54894 54895 401fd8 11 API calls 54893->54895 54896 401fd8 11 API calls 54894->54896 54897 4130d7 54895->54897 54898 41308f 54896->54898 54900 401fd8 11 API calls 54897->54900 54899 401fd8 11 API calls 54898->54899 54901 41309b 54899->54901 54902 4131e5 54900->54902 54903 401fd8 11 API calls 54901->54903 54904 401f09 11 API calls 54902->54904 54905 4130a7 54903->54905 54906 4131f1 54904->54906 54907 401fd8 11 API calls 54905->54907 54908 401fd8 11 API calls 54906->54908 54909 4130b3 54907->54909 54910 4131fd 54908->54910 54911 401fd8 11 API calls 54909->54911 54912 401fd8 11 API calls 54910->54912 54913 4130bf 54911->54913 54914 413209 54912->54914 54915 401fd8 11 API calls 54913->54915 54916 401fd8 11 API calls 54914->54916 54917 4130cb 54915->54917 54918 413215 54916->54918 54919 401fd8 11 API calls 54917->54919 54920 401fd8 11 API calls 54918->54920 54919->54897 54921 413221 54920->54921 54922 401fd8 11 API calls 54921->54922 54923 41322d 54922->54923 54924 401fd8 11 API calls 54923->54924 54925 413239 54924->54925 54926 401fd8 11 API calls 54925->54926 54927 413245 54926->54927 54928 401fd8 11 API calls 54927->54928 54929 413251 54928->54929 54930 401fd8 11 API calls 54929->54930 54931 412abe 54930->54931 54931->54784 54933 4132a6 54932->54933 54935 413277 54932->54935 54934 4132b5 54933->54934 54944 10001c5b 54933->54944 54936 40417e 28 API calls 54934->54936 54948 411d2d 54935->54948 54938 4132c1 54936->54938 54940 401fd8 11 API calls 54938->54940 54942 412f63 54940->54942 54942->54827 54945 10001c6b ___scrt_fastfail 54944->54945 54952 100012ee 54945->54952 54947 10001c87 54947->54934 54994 411d39 54948->54994 54951 411fa2 22 API calls _Yarn 54951->54933 54953 10001324 ___scrt_fastfail 54952->54953 54954 100013b7 GetEnvironmentVariableW 54953->54954 54978 100010f1 54954->54978 54957 100010f1 57 API calls 54958 10001465 54957->54958 54959 100010f1 57 API calls 54958->54959 54960 10001479 54959->54960 54961 100010f1 57 API calls 54960->54961 54962 1000148d 54961->54962 54963 100010f1 57 API calls 54962->54963 54964 100014a1 54963->54964 54965 100010f1 57 API calls 54964->54965 54966 100014b5 lstrlenW 54965->54966 54967 100014d2 54966->54967 54968 100014d9 lstrlenW 54966->54968 54967->54947 54969 100010f1 57 API calls 54968->54969 54970 10001501 lstrlenW lstrcatW 54969->54970 54971 100010f1 57 API calls 54970->54971 54972 10001539 lstrlenW lstrcatW 54971->54972 54973 100010f1 57 API calls 54972->54973 54974 1000156b lstrlenW lstrcatW 54973->54974 54975 100010f1 57 API calls 54974->54975 54976 1000159d lstrlenW lstrcatW 54975->54976 54977 100010f1 57 API calls 54976->54977 54977->54967 54979 10001118 ___scrt_fastfail 54978->54979 54980 10001129 lstrlenW 54979->54980 54991 10002c40 54980->54991 54982 10001148 lstrcatW lstrlenW 54983 10001177 lstrlenW FindFirstFileW 54982->54983 54984 10001168 lstrlenW 54982->54984 54985 100011a0 54983->54985 54986 100011e1 54983->54986 54984->54983 54987 100011c7 FindNextFileW 54985->54987 54988 100011aa 54985->54988 54986->54957 54987->54985 54990 100011da FindClose 54987->54990 54988->54987 54993 10001000 57 API calls ___scrt_fastfail 54988->54993 54990->54986 54992 10002c57 54991->54992 54992->54982 54992->54992 54993->54988 55030 4117d7 54994->55030 54996 411d57 54997 411d35 54996->54997 54998 411d6d SetLastError 54996->54998 54999 4117d7 SetLastError 54996->54999 54997->54951 54998->54997 55000 411d8a 54999->55000 55000->54997 55000->54998 55002 411dac GetNativeSystemInfo 55000->55002 55003 411df2 55002->55003 55004 411e0f 55003->55004 55005 411dff 55003->55005 55033 411cde VirtualAlloc 55004->55033 55006 411e04 SetLastError 55005->55006 55006->54997 55008 411e22 55009 411e47 GetProcessHeap HeapAlloc 55008->55009 55034 411cde VirtualAlloc 55008->55034 55010 411e70 55009->55010 55011 411e5e 55009->55011 55014 4117d7 SetLastError 55010->55014 55035 411cf5 VirtualFree 55011->55035 55017 411eb9 55014->55017 55015 411e3a 55015->55009 55016 411e43 55015->55016 55016->55006 55018 411f6b 55017->55018 55036 411cde VirtualAlloc 55017->55036 55040 4120b2 GetProcessHeap HeapFree 55018->55040 55021 411ed2 ctype 55037 4117ea SetLastError ctype ___scrt_get_show_window_mode 55021->55037 55023 411efe 55023->55018 55038 411b9a 26 API calls 55023->55038 55025 411f2b 55025->55018 55039 41198a VirtualProtect 55025->55039 55027 411f7c 55027->54997 55028 411f36 55028->55018 55028->55027 55029 411f60 SetLastError 55028->55029 55029->55018 55031 4117e6 55030->55031 55032 4117db SetLastError 55030->55032 55031->54996 55032->54996 55033->55008 55034->55015 55035->55016 55036->55021 55037->55023 55038->55025 55039->55028 55040->54997 55041 40165e 55042 401666 55041->55042 55044 401669 55041->55044 55043 4016a8 55045 43455e new 22 API calls 55043->55045 55044->55043 55046 401696 55044->55046 55047 40169c 55045->55047 55048 43455e new 22 API calls 55046->55048 55048->55047

                      Control-flow Graph

                      APIs
                      • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                      • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                      • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                      • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                      • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                      • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                      • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                      • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                      • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                      • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                      • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                      • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                      • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad$HandleModule
                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                      • API String ID: 4236061018-3687161714
                      • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                      • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                      • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                      • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 453 4181d1-4181d8 450->453 452 4184bd-4184c7 451->452 453->451 454 4181de-4181e0 453->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc Wow64GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 480 41842b-41842f 478->480 481 41840d-418413 478->481 482 4183d2-4183f5 call 436990 479->482 484 418431-41844e WriteProcessMemory 480->484 485 418454-41846b Wow64SetThreadContext 480->485 481->480 483 418415-418428 call 41853e 481->483 491 4183f7-4183fe 482->491 483->480 484->464 489 418450 484->489 485->464 490 41846d-418479 ResumeThread 485->490 489->485 490->464 493 41847b-41847d 490->493 491->478 493->452
                      APIs
                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                      • GetProcAddress.KERNEL32(00000000), ref: 00418174
                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                      • GetProcAddress.KERNEL32(00000000), ref: 00418188
                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                      • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                      • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                      • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                      • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                      • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00418328
                      • NtClose.NTDLL(?), ref: 00418332
                      • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                      • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                      • ResumeThread.KERNEL32(?), ref: 00418470
                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                      • GetCurrentProcess.KERNEL32(?), ref: 00418492
                      • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                      • NtClose.NTDLL(?), ref: 004184A3
                      • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                      • GetLastError.KERNEL32 ref: 004184B5
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`#v$ntdll
                      • API String ID: 3150337530-108836778
                      • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                      • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                      • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                      • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1563 40a2f3-40a30a 1564 40a30c-40a326 SetWindowsHookExA 1563->1564 1565 40a36e-40a37e GetMessageA 1563->1565 1564->1565 1570 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1564->1570 1566 40a380-40a398 TranslateMessage DispatchMessageA 1565->1566 1567 40a39a 1565->1567 1566->1565 1566->1567 1568 40a39c-40a3a1 1567->1568 1570->1568
                      APIs
                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                      • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                      • GetLastError.KERNEL32 ref: 0040A328
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                      • TranslateMessage.USER32(?), ref: 0040A385
                      • DispatchMessageA.USER32(?), ref: 0040A390
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                      • String ID: Keylogger initialization failure: error $`#v
                      • API String ID: 3219506041-3226811161
                      • Opcode ID: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                      • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                      • Opcode Fuzzy Hash: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                      • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1581 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1588 10001177-1000119e lstrlenW FindFirstFileW 1581->1588 1589 10001168-10001172 lstrlenW 1581->1589 1590 100011a0-100011a8 1588->1590 1591 100011e1-100011e9 1588->1591 1589->1588 1592 100011c7-100011d8 FindNextFileW 1590->1592 1593 100011aa-100011c4 call 10001000 1590->1593 1592->1590 1595 100011da-100011db FindClose 1592->1595 1593->1592 1595->1591
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                      • lstrcatW.KERNEL32(?,?), ref: 10001151
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                      • FindClose.KERNEL32(00000000), ref: 100011DB
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                      • String ID:
                      • API String ID: 1083526818-0
                      • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                      • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                      • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                      • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                      Control-flow Graph

                      APIs
                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                      • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                      • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                      Strings
                      • http://geoplugin.net/json.gp, xrefs: 0041B448
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleOpen$FileRead
                      • String ID: http://geoplugin.net/json.gp
                      • API String ID: 3121278467-91888290
                      • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                      • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                      • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                      • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1629 411d39-411d59 call 4117d7 1632 411d62-411d6b 1629->1632 1633 411d5b-411d5d 1629->1633 1635 411d7a-411d8c call 4117d7 1632->1635 1636 411d6d-411d78 SetLastError 1632->1636 1634 411f75-411f7b 1633->1634 1635->1633 1639 411d8e-411d99 1635->1639 1636->1633 1639->1636 1640 411d9b-411da4 1639->1640 1640->1636 1641 411da6-411daa 1640->1641 1641->1636 1642 411dac-411db6 1641->1642 1643 411db8-411dbb 1642->1643 1644 411dda-411ded GetNativeSystemInfo call 4117c6 1642->1644 1646 411dbd-411dc3 1643->1646 1647 411df2-411dfd call 4117c6 1644->1647 1648 411dc5-411dc8 1646->1648 1649 411dca 1646->1649 1653 411e0f-411e29 call 411cde 1647->1653 1654 411dff 1647->1654 1650 411dcd-411dd8 1648->1650 1649->1650 1650->1644 1650->1646 1660 411e47-411e5c GetProcessHeap HeapAlloc 1653->1660 1661 411e2b-411e41 call 411cde 1653->1661 1655 411e04-411e0a SetLastError 1654->1655 1657 411f72 1655->1657 1659 411f74 1657->1659 1659->1634 1662 411e70-411ebb call 4117d7 1660->1662 1663 411e5e-411e6e call 411cf5 1660->1663 1661->1660 1670 411e43-411e45 1661->1670 1671 411ec1-411f03 call 411cde call 436990 call 4117ea 1662->1671 1672 411f6b-411f6d call 4120b2 1662->1672 1663->1670 1670->1655 1671->1672 1680 411f05-411f0d 1671->1680 1672->1657 1681 411f0f-411f1c call 411aee 1680->1681 1682 411f1e-411f21 1680->1682 1683 411f24-411f2d call 411b9a 1681->1683 1682->1683 1683->1672 1688 411f2f-411f38 call 41198a 1683->1688 1688->1672 1691 411f3a-411f43 call 411abd 1688->1691 1691->1672 1694 411f45-411f4c 1691->1694 1695 411f86 1694->1695 1696 411f4e-411f54 1694->1696 1697 411f8a-411f8c 1695->1697 1698 411f81-411f84 1696->1698 1699 411f56-411f5e 1696->1699 1697->1659 1698->1697 1701 411f60-411f65 SetLastError 1699->1701 1702 411f7c-411f7f 1699->1702 1701->1672 1702->1697
                      APIs
                        • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                      • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                      • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                      • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                        • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                      • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                      • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                        • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                        • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                      • String ID:
                      • API String ID: 3950776272-0
                      • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                      • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                      • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                      • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                      APIs
                        • Part of subcall function 00413584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                        • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                        • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                      • Sleep.KERNEL32(00000BB8), ref: 0040F896
                      • ExitProcess.KERNEL32 ref: 0040F905
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseExitOpenProcessQuerySleepValue
                      • String ID: 5.1.1 Pro$override$pth_unenc
                      • API String ID: 2281282204-2344886030
                      • Opcode ID: cd607c0515279b9d97aeea635d6f29185ab9b792f25f3438d110feeae55dec5d
                      • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                      • Opcode Fuzzy Hash: cd607c0515279b9d97aeea635d6f29185ab9b792f25f3438d110feeae55dec5d
                      • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                      APIs
                      • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                      • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$EventLocalThreadTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 2532271599-1507639952
                      • Opcode ID: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                      • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                      • Opcode Fuzzy Hash: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                      • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                      APIs
                      • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                      • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Name$ComputerUser
                      • String ID:
                      • API String ID: 4229901323-0
                      • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                      • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                      • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                      • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 101 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->101 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 97 40ec27-40ec3d call 401fab call 4139e4 80->97 89 40ec47-40ec49 81->89 90 40ec4e-40ec55 81->90 93 40ef2c 89->93 94 40ec57 90->94 95 40ec59-40ec65 call 41b354 90->95 93->49 94->95 105 40ec67-40ec69 95->105 106 40ec6e-40ec72 95->106 97->81 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 101->126 105->106 108 40ecb1-40ecc4 call 401e65 call 401fab 106->108 109 40ec74-40ec7b call 407751 106->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 120 40ec87-40ec9a call 401e65 call 401fab 109->120 121 40ec7d-40ec82 call 407773 call 40729b 109->121 120->108 142 40ec9c-40eca2 120->142 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 142->108 143 40eca4-40ecaa 142->143 143->108 146 40ecac call 40729b 143->146 146->108 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 183 40ee4a-40ee54 call 409092 181->183 184 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->184 191 40ee59-40ee7d call 40247c call 434829 183->191 184->191 212 40ee8c 191->212 213 40ee7f-40ee8a call 436f10 191->213 205->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->273 287 40f017-40f019 236->287 288 40effc 236->288 273->236 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->286 286->236 306 40ef2a 286->306 289 40f01b-40f01d 287->289 290 40f01f 287->290 292 40effe-40f015 call 41ce2c CreateThread 288->292 289->292 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->93 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 357 40f194-40f1a7 call 401e65 call 401fab 346->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 404 40f293-40f29d CreateThread 403->404 405 40f29f-40f2a6 403->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f322 call 401fab call 41353a 413->416 415->418 416->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 416->427 418->416 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                      APIs
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000104), ref: 0040EA29
                        • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                      • String ID: 8SG$8SG$Access Level: $Administrator$C:\Program Files (x86)\Internet Explorer\iexplore.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-Q4NYK2$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                      • API String ID: 2830904901-1837029028
                      • Opcode ID: 3c2478c4077bf8a96bddd07e6a0b95521795c4c5746014dee21dcc47f6ccdbdb
                      • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                      • Opcode Fuzzy Hash: 3c2478c4077bf8a96bddd07e6a0b95521795c4c5746014dee21dcc47f6ccdbdb
                      • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 612 415220-415246 call 402093 * 2 call 41b580 606->612 613 41524b-415260 call 404f51 call 4048c8 606->613 629 415ade-415af0 call 404e26 call 4021fa 607->629 612->629 628 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 613->628 613->629 694 4153bb-4153c8 call 405aa6 628->694 695 4153cd-4153f4 call 401fab call 4135e1 628->695 643 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 629->643 644 415b18-415b20 call 401e8d 629->644 643->644 644->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-4154c0 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 695->702 701->702 725 4154c5-415a51 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 702->725 948 415a53-415a5a 725->948 949 415a65-415a6c 725->949 948->949 950 415a5c-415a5e 948->950 951 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->951 952 415a6e-415a73 call 40b08c 949->952 950->949 963 415aac-415ab8 CreateThread 951->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 951->964 952->951 963->964 964->629
                      APIs
                      • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                      • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                      • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$ErrorLastLocalTime
                      • String ID: | $%I64u$5.1.1 Pro$8SG$C:\Program Files (x86)\Internet Explorer\iexplore.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-Q4NYK2$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                      • API String ID: 524882891-688453967
                      • Opcode ID: b362ccec59c57c4b1d50d3c298bd530babcfa4533fd49a7ace90c29049f6c656
                      • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                      • Opcode Fuzzy Hash: b362ccec59c57c4b1d50d3c298bd530babcfa4533fd49a7ace90c29049f6c656
                      • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 971 412aef-412b38 GetModuleFileNameW call 4020df * 3 978 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 971->978 1003 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 978->1003 1026 412c66 1003->1026 1027 412c58-412c60 Sleep 1003->1027 1028 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412d08 1028->1051 1052 412cfa-412d02 Sleep 1028->1052 1053 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412daa-412dcf 1053->1076 1077 412d9c-412da4 Sleep 1053->1077 1078 412dd3-412def call 401f04 call 41c516 1076->1078 1077->1053 1077->1076 1083 412df1-412e00 call 401f04 DeleteFileW 1078->1083 1084 412e06-412e22 call 401f04 call 41c516 1078->1084 1083->1084 1091 412e24-412e3d call 401f04 DeleteFileW 1084->1091 1092 412e3f 1084->1092 1093 412e43-412e5f call 401f04 call 41c516 1091->1093 1092->1093 1100 412e61-412e73 call 401f04 DeleteFileW 1093->1100 1101 412e79-412e7b 1093->1101 1100->1101 1103 412e88-412e93 Sleep 1101->1103 1104 412e7d-412e7f 1101->1104 1103->1078 1107 412e99-412eab call 406b63 1103->1107 1104->1103 1106 412e81-412e86 1104->1106 1106->1103 1106->1107 1110 412f01-412f20 call 401f09 * 3 1107->1110 1111 412ead-412ebb call 406b63 1107->1111 1122 412f25-412f5e call 40b93f call 401f04 call 4020f6 call 413268 1110->1122 1111->1110 1117 412ebd-412ecb call 406b63 1111->1117 1117->1110 1123 412ecd-412ef9 Sleep call 401f09 * 3 1117->1123 1138 412f63-412f89 call 401f09 call 405b05 1122->1138 1123->978 1137 412eff 1123->1137 1137->1122 1143 4130e3-4131dc call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1143 1144 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1144 1213 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                        • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                        • Part of subcall function 004185A3: FindCloseChangeNotification.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                        • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                      • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                      • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                      • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                      • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                      • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                      • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                      • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                      • Sleep.KERNEL32(00000064), ref: 00412ECF
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$File$Delete$Close$ChangeCurrentFindHandleModuleNameNotificationProcesssend
                      • String ID: /stext "$0TG$0TG$NG$NG
                      • API String ID: 1879926576-2576077980
                      • Opcode ID: 47107b35a7d8cc4a2ec20942570f826f190484eceb7e356a240751147ef39244
                      • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                      • Opcode Fuzzy Hash: 47107b35a7d8cc4a2ec20942570f826f190484eceb7e356a240751147ef39244
                      • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                      Control-flow Graph

                      APIs
                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                        • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                        • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                        • Part of subcall function 100010F1: FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                        • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                      • lstrlenW.KERNEL32(?), ref: 100014C5
                      • lstrlenW.KERNEL32(?), ref: 100014E0
                      • lstrlenW.KERNEL32(?,?), ref: 1000150F
                      • lstrcatW.KERNEL32(00000000), ref: 10001521
                      • lstrlenW.KERNEL32(?,?), ref: 10001547
                      • lstrcatW.KERNEL32(00000000), ref: 10001553
                      • lstrlenW.KERNEL32(?,?), ref: 10001579
                      • lstrcatW.KERNEL32(00000000), ref: 10001585
                      • lstrlenW.KERNEL32(?,?), ref: 100015AB
                      • lstrcatW.KERNEL32(00000000), ref: 100015B7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                      • String ID: )$Foxmail$ProgramFiles
                      • API String ID: 672098462-2938083778
                      • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                      • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                      • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                      • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                      Control-flow Graph

                      APIs
                      • Sleep.KERNEL32(00001388), ref: 0040A77B
                        • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                        • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                        • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                        • Part of subcall function 0040A6B0: FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                      • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$AttributesCreate$Sleep$ChangeCloseDirectoryExistsFindNotificationPathSize
                      • String ID: 8SG$8SG$pQG$pQG$PG$PG
                      • API String ID: 110482706-1152054767
                      • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                      • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                      • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                      • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                      Control-flow Graph

                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                      • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                      • closesocket.WS2_32(000000FF), ref: 00404E5A
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                      • String ID:
                      • API String ID: 2403171778-0
                      • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                      • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                      • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                      • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                      Control-flow Graph

                      APIs
                      • __Init_thread_footer.LIBCMT ref: 0040AD73
                      • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                      • GetForegroundWindow.USER32 ref: 0040AD84
                      • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                      • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                      • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                        • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                      • String ID: [${ User has been idle for $ minutes }$]
                      • API String ID: 911427763-3954389425
                      • Opcode ID: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                      • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                      • Opcode Fuzzy Hash: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                      • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1481 40da6f-40da94 call 401f86 1484 40da9a 1481->1484 1485 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1481->1485 1487 40dae0-40dae7 call 41c048 1484->1487 1488 40daa1-40daa6 1484->1488 1489 40db93-40db98 1484->1489 1490 40dad6-40dadb 1484->1490 1491 40dba9 1484->1491 1492 40db9a-40dba7 call 43c11f 1484->1492 1493 40daab-40dab9 call 41b645 call 401f13 1484->1493 1494 40dacc-40dad1 1484->1494 1495 40db8c-40db91 1484->1495 1507 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1487->1507 1508 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1487->1508 1497 40dbae-40dbb3 call 43c11f 1488->1497 1489->1497 1490->1497 1491->1497 1492->1491 1509 40dbb4-40dbb9 call 409092 1492->1509 1515 40dabe 1493->1515 1494->1497 1495->1497 1497->1509 1520 40dac2-40dac7 call 401f09 1507->1520 1508->1515 1509->1485 1515->1520 1520->1485
                      APIs
                      • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: LongNamePath
                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                      • API String ID: 82841172-425784914
                      • Opcode ID: e449d481ed2360d16fb1fd9d50703ad25ac73fcf6fdc62031a2b222bc8cf01a2
                      • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                      • Opcode Fuzzy Hash: e449d481ed2360d16fb1fd9d50703ad25ac73fcf6fdc62031a2b222bc8cf01a2
                      • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1615 41c482-41c493 1616 41c495-41c498 1615->1616 1617 41c4ab-41c4b2 1615->1617 1618 41c4a1-41c4a9 1616->1618 1619 41c49a-41c49f 1616->1619 1620 41c4b3-41c4cc CreateFileW 1617->1620 1618->1620 1619->1620 1621 41c4d2-41c4d7 1620->1621 1622 41c4ce-41c4d0 1620->1622 1624 41c4f2-41c503 WriteFile 1621->1624 1625 41c4d9-41c4e7 SetFilePointer 1621->1625 1623 41c510-41c515 1622->1623 1627 41c505 1624->1627 1628 41c507-41c50e FindCloseChangeNotification 1624->1628 1625->1624 1626 41c4e9-41c4f0 CloseHandle 1625->1626 1626->1622 1627->1628 1628->1623
                      APIs
                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                      • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                      • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C508
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Close$ChangeCreateFindHandleNotificationPointerWrite
                      • String ID: xpF
                      • API String ID: 1087594267-354647465
                      • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                      • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                      • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                      • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                      • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                      • FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$ChangeCloseCreateFindNotificationSizeSleep
                      • String ID: XQG
                      • API String ID: 4068920109-3606453820
                      • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                      • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                      • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                      • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CountEventTick
                      • String ID: !D@$NG
                      • API String ID: 180926312-2721294649
                      • Opcode ID: 2e28ce07c5613c4d381e21303a44e131e666f55ac99c737731ccfaa5f0de9137
                      • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                      • Opcode Fuzzy Hash: 2e28ce07c5613c4d381e21303a44e131e666f55ac99c737731ccfaa5f0de9137
                      • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                        • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                        • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread$LocalTimewsprintf
                      • String ID: Offline Keylogger Started
                      • API String ID: 465354869-4114347211
                      • Opcode ID: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                      • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                      • Opcode Fuzzy Hash: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                      • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                      • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137E1
                      • RegCloseKey.ADVAPI32(?,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137EC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: pth_unenc
                      • API String ID: 1818849710-4028850238
                      • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                      • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                      • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                      • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                      • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                      • FindCloseChangeNotification.KERNEL32(00000000,?,00000000), ref: 00404DDB
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                      • String ID:
                      • API String ID: 2579639479-0
                      • Opcode ID: e2c7dcd9189a3044f1cf6e3ebfe82ec704a9a5fd688f20b61e04b54ec391fab7
                      • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                      • Opcode Fuzzy Hash: e2c7dcd9189a3044f1cf6e3ebfe82ec704a9a5fd688f20b61e04b54ec391fab7
                      • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C576
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$ChangeCloseCreateFindNotificationReadSize
                      • String ID:
                      • API String ID: 2135649906-0
                      • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                      • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                      • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                      • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                      APIs
                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                      • GetLastError.KERNEL32 ref: 0040D0BE
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateErrorLastMutex
                      • String ID: Rmc-Q4NYK2
                      • API String ID: 1925916568-1405525919
                      • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                      • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                      • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                      • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                      APIs
                      • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                      • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: EventObjectSingleWaitsend
                      • String ID:
                      • API String ID: 3963590051-0
                      • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                      • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                      • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                      • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                      APIs
                      • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                      • RegCloseKey.KERNEL32(?), ref: 004135CD
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                      • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                      • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                      • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                      • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                      • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID:
                      • API String ID: 1818849710-0
                      • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                      • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                      • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                      • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcslen
                      • String ID: pQG
                      • API String ID: 176396367-3769108836
                      • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                      • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                      • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                      • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID: @
                      • API String ID: 1890195054-2766056989
                      • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                      • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                      • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                      • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                      APIs
                      • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                        • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEventStartupsocket
                      • String ID:
                      • API String ID: 1953588214-0
                      • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                      • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                      • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                      • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                      • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                      • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                      • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                      APIs
                      • GetForegroundWindow.USER32 ref: 0041BB49
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$ForegroundText
                      • String ID:
                      • API String ID: 29597999-0
                      • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                      • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                      • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                      • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                      APIs
                        • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                        • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418174
                        • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                        • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418188
                        • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                        • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 0041819C
                        • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                        • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 004181B0
                        • Part of subcall function 0041812A: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                        • Part of subcall function 0041812A: VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                      • FindCloseChangeNotification.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                      • CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Handle$AddressModuleProc$Close$AllocChangeCreateFindNotificationProcessVirtual
                      • String ID:
                      • API String ID: 1932035736-0
                      • Opcode ID: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                      • Instruction ID: c73268819cb60d4ae5e82c4b87b0b0ed6d20300d6cd2269ac6e8254bb02e1260
                      • Opcode Fuzzy Hash: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                      • Instruction Fuzzy Hash: 4FD05E76C4120CFFCB006BA4AC0E8AEB77CFB09211B50116AEC2442252AA369D188A64
                      APIs
                      • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Startup
                      • String ID:
                      • API String ID: 724789610-0
                      • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                      • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                      • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                      • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                      APIs
                      • std::_Deallocate.LIBCONCRT ref: 00402E2B
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Deallocatestd::_
                      • String ID:
                      • API String ID: 1323251999-0
                      • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                      • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                      • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                      • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                      APIs
                      • HeapAlloc.KERNEL32(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocHeap
                      • String ID:
                      • API String ID: 4292702814-0
                      • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                      • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                      • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                      • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 00407CF4
                      • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                      • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                        • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                        • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                        • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                        • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                        • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                      • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                      • DeleteFileA.KERNEL32(?), ref: 0040868D
                        • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                        • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                        • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                        • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                      • Sleep.KERNEL32(000007D0), ref: 00408733
                      • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                        • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                      • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                      • API String ID: 1067849700-181434739
                      • Opcode ID: 4d772f473d58b898a1702a7892fd434dfb4fb5fc46d670783877a38790a29eab
                      • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                      • Opcode Fuzzy Hash: 4d772f473d58b898a1702a7892fd434dfb4fb5fc46d670783877a38790a29eab
                      • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 004056E6
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • __Init_thread_footer.LIBCMT ref: 00405723
                      • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                      • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                      • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                      • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                      • CloseHandle.KERNEL32 ref: 00405A23
                      • CloseHandle.KERNEL32 ref: 00405A2B
                      • CloseHandle.KERNEL32 ref: 00405A3D
                      • CloseHandle.KERNEL32 ref: 00405A45
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                      • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                      • API String ID: 2994406822-18413064
                      • Opcode ID: d553f2449c2979ff0ae95e436ff0a57947edcdfd549df44bd767c5865e61b2ea
                      • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                      • Opcode Fuzzy Hash: d553f2449c2979ff0ae95e436ff0a57947edcdfd549df44bd767c5865e61b2ea
                      • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                      APIs
                      • GetCurrentProcessId.KERNEL32 ref: 00412141
                        • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                        • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                        • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                      • CloseHandle.KERNEL32(00000000), ref: 00412190
                      • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                      • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                      • API String ID: 3018269243-13974260
                      • Opcode ID: 6f6ea8f196ec80a9856fd270324b20fc6a6e58725ca2898ac7e18136c01e6e8c
                      • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                      • Opcode Fuzzy Hash: 6f6ea8f196ec80a9856fd270324b20fc6a6e58725ca2898ac7e18136c01e6e8c
                      • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                      • FindClose.KERNEL32(00000000), ref: 0040BC04
                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                      • FindClose.KERNEL32(00000000), ref: 0040BD4D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                      • API String ID: 1164774033-3681987949
                      • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                      • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                      • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                      • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                      APIs
                      • OpenClipboard.USER32 ref: 004168FD
                      • EmptyClipboard.USER32 ref: 0041690B
                      • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                      • GlobalLock.KERNEL32(00000000), ref: 00416934
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                      • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                      • CloseClipboard.USER32 ref: 00416990
                      • OpenClipboard.USER32 ref: 00416997
                      • GetClipboardData.USER32(0000000D), ref: 004169A7
                      • GlobalLock.KERNEL32(00000000), ref: 004169B0
                      • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                      • CloseClipboard.USER32 ref: 004169BF
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                      • String ID: !D@
                      • API String ID: 3520204547-604454484
                      • Opcode ID: ce93ee74c9c1bf56c688529f46a7cb91fb9eb40c72a7842ec529c6657c9cd233
                      • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                      • Opcode Fuzzy Hash: ce93ee74c9c1bf56c688529f46a7cb91fb9eb40c72a7842ec529c6657c9cd233
                      • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                      • FindClose.KERNEL32(00000000), ref: 0040BE04
                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                      • FindClose.KERNEL32(00000000), ref: 0040BEEA
                      • FindClose.KERNEL32(00000000), ref: 0040BF0B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$File$FirstNext
                      • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 3527384056-432212279
                      • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                      • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                      • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                      • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                      APIs
                      • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                      • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                      • CloseHandle.KERNEL32(00000000), ref: 0041349A
                      • CloseHandle.KERNEL32(?), ref: 004134A0
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                      • String ID:
                      • API String ID: 297527592-0
                      • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                      • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                      • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                      • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4F4
                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                      • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                      • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                      • API String ID: 3756808967-1743721670
                      • Opcode ID: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                      • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                      • Opcode Fuzzy Hash: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                      • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0$1$2$3$4$5$6$7$VG
                      • API String ID: 0-1861860590
                      • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                      • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                      • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                      • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                      APIs
                      • _wcslen.LIBCMT ref: 0040755C
                      • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Object_wcslen
                      • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                      • API String ID: 240030777-3166923314
                      • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                      • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                      • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                      • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                      APIs
                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                      • GetLastError.KERNEL32 ref: 0041A84C
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                      • String ID:
                      • API String ID: 3587775597-0
                      • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                      • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                      • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                      • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                      • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                      • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                      • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                      • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                      • String ID: JD$JD$JD
                      • API String ID: 745075371-3517165026
                      • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                      • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                      • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                      • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                      • FindClose.KERNEL32(00000000), ref: 0040C4B8
                      • FindClose.KERNEL32(00000000), ref: 0040C4E3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 1164774033-405221262
                      • Opcode ID: db36566fedf6bac1efbe0509ba0d37d449c306ac76c2810c026643bd9d72ced7
                      • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                      • Opcode Fuzzy Hash: db36566fedf6bac1efbe0509ba0d37d449c306ac76c2810c026643bd9d72ced7
                      • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                        • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                      • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                      • String ID:
                      • API String ID: 2341273852-0
                      • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                      • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                      • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                      • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$CreateFirstNext
                      • String ID: 8SG$PXG$PXG$NG$PG
                      • API String ID: 341183262-3812160132
                      • Opcode ID: c087b143b2eecbbb95827771f04cdf66ce9840cb658637ffd46fa1b49b84b59a
                      • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                      • Opcode Fuzzy Hash: c087b143b2eecbbb95827771f04cdf66ce9840cb658637ffd46fa1b49b84b59a
                      • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                      APIs
                      • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                      • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                      • GetKeyState.USER32(00000010), ref: 0040A46E
                      • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                      • ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                      • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                      • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A535
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                      • String ID:
                      • API String ID: 1888522110-0
                      • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                      • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                      • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                      • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                      APIs
                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                      • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressCloseCreateLibraryLoadProcsend
                      • String ID: SHDeleteKeyW$Shlwapi.dll
                      • API String ID: 2127411465-314212984
                      • Opcode ID: 0c8a6a9b43b4b8375db90e21eebaf671e93d6ad401b5272071a3ce153951cead
                      • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                      • Opcode Fuzzy Hash: 0c8a6a9b43b4b8375db90e21eebaf671e93d6ad401b5272071a3ce153951cead
                      • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                      APIs
                      • _free.LIBCMT ref: 00449292
                      • _free.LIBCMT ref: 004492B6
                      • _free.LIBCMT ref: 0044943D
                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                      • _free.LIBCMT ref: 00449609
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                      • String ID:
                      • API String ID: 314583886-0
                      • Opcode ID: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                      • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                      • Opcode Fuzzy Hash: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                      • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                      APIs
                        • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                        • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                        • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                        • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                        • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                      • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                      • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                      • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                      • String ID: !D@$PowrProf.dll$SetSuspendState
                      • API String ID: 1589313981-2876530381
                      • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                      • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                      • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                      • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                      • GetLastError.KERNEL32 ref: 0040BA93
                      Strings
                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                      • UserProfile, xrefs: 0040BA59
                      • [Chrome StoredLogins not found], xrefs: 0040BAAD
                      • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • API String ID: 2018770650-1062637481
                      • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                      • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                      • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                      • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                      APIs
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                      • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                      • GetLastError.KERNEL32 ref: 004179D8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                      • String ID: SeShutdownPrivilege
                      • API String ID: 3534403312-3733053543
                      • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                      • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                      • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                      • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                      APIs
                      • __EH_prolog.LIBCMT ref: 00409293
                        • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,02D8E590,00000010), ref: 004048E0
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                      • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                      • FindClose.KERNEL32(00000000), ref: 004093FC
                        • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                        • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                        • Part of subcall function 00404E26: FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                      • FindClose.KERNEL32(00000000), ref: 004095F4
                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                      • String ID:
                      • API String ID: 2435342581-0
                      • Opcode ID: d7b7c75514d4f24992d8f28b773c28ca64d9545e220b0236645419fa31a27552
                      • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                      • Opcode Fuzzy Hash: d7b7c75514d4f24992d8f28b773c28ca64d9545e220b0236645419fa31a27552
                      • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ManagerStart
                      • String ID:
                      • API String ID: 276877138-0
                      • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                      • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                      • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                      • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                      APIs
                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                      • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP
                      • API String ID: 2299586839-711371036
                      • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                      • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                      • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                      • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                      APIs
                      • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                      • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                      • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                      • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID: SETTINGS
                      • API String ID: 3473537107-594951305
                      • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                      • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                      • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                      • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                      APIs
                      • __EH_prolog.LIBCMT ref: 004096A5
                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                      • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstH_prologNext
                      • String ID:
                      • API String ID: 1157919129-0
                      • Opcode ID: 7f3627810d7b5bd363ad7d620a46e187a9fd69728971481f0cdcfb4c2c124207
                      • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                      • Opcode Fuzzy Hash: 7f3627810d7b5bd363ad7d620a46e187a9fd69728971481f0cdcfb4c2c124207
                      • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                      APIs
                      • __EH_prolog.LIBCMT ref: 0040884C
                      • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                      • String ID:
                      • API String ID: 1771804793-0
                      • Opcode ID: ec9c60c0984909d8cd4645444dd457f9d8bf9c0522e2e7366979e8a6a318d365
                      • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                      • Opcode Fuzzy Hash: ec9c60c0984909d8cd4645444dd457f9d8bf9c0522e2e7366979e8a6a318d365
                      • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadExecuteFileShell
                      • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$open
                      • API String ID: 2825088817-263617989
                      • Opcode ID: 3a5601be90bfcf9403cf486027a1477961f0db699fc121fab8fe00e6325dec52
                      • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                      • Opcode Fuzzy Hash: 3a5601be90bfcf9403cf486027a1477961f0db699fc121fab8fe00e6325dec52
                      • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$FirstNextsend
                      • String ID: XPG$XPG
                      • API String ID: 4113138495-1962359302
                      • Opcode ID: 562ca0bb57ca7d4d558dd8b0be646ea354c0205c4ea5a34c8fb1197adbe306b9
                      • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                      • Opcode Fuzzy Hash: 562ca0bb57ca7d4d558dd8b0be646ea354c0205c4ea5a34c8fb1197adbe306b9
                      • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                      APIs
                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                        • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                        • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137E1
                        • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(?,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137EC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateInfoParametersSystemValue
                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                      • API String ID: 4127273184-3576401099
                      • Opcode ID: 0770bf726c9befaa45485f0dd67d4366664ca8a7637528448030d37bd09e249f
                      • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                      • Opcode Fuzzy Hash: 0770bf726c9befaa45485f0dd67d4366664ca8a7637528448030d37bd09e249f
                      • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                      • _wcschr.LIBVCRUNTIME ref: 00451ECA
                      • _wcschr.LIBVCRUNTIME ref: 00451ED8
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                      • String ID:
                      • API String ID: 4212172061-0
                      • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                      • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                      • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                      • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                      • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID: p'E$JD
                      • API String ID: 1084509184-908320845
                      • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                      • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                      • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                      • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorInfoLastLocale$_free$_abort
                      • String ID:
                      • API String ID: 2829624132-0
                      • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                      • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                      • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                      • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                      • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                      • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                      • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                      • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                      • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                      • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                      APIs
                      • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,00000000), ref: 004338DA
                      • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Crypt$Context$AcquireRandomRelease
                      • String ID:
                      • API String ID: 1815803762-0
                      • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                      • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                      • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                      • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                      • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                      • ExitProcess.KERNEL32 ref: 10004AEE
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                      • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                      • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                      • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                      • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                      • ExitProcess.KERNEL32 ref: 0044338F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                      • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                      • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                      • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                      APIs
                      • OpenClipboard.USER32(00000000), ref: 0040B74C
                      • GetClipboardData.USER32(0000000D), ref: 0040B758
                      • CloseClipboard.USER32 ref: 0040B760
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$CloseDataOpen
                      • String ID:
                      • API String ID: 2058664381-0
                      • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                      • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                      • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                      • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                      APIs
                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                      • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                      • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpenResume
                      • String ID:
                      • API String ID: 3614150671-0
                      • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                      • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                      • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                      • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                      APIs
                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                      • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                      • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpenSuspend
                      • String ID:
                      • API String ID: 1999457699-0
                      • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                      • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                      • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                      • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID: MZ@
                      • API String ID: 2325560087-2978689999
                      • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                      • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                      • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                      • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                      • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                      • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                      • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                      • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                      • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                      • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                      • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID: JD
                      • API String ID: 1084509184-2669065882
                      • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                      • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                      • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                      • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: GetLocaleInfoEx
                      • API String ID: 2299586839-2904428671
                      • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                      • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                      • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                      • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$InfoLocale_abort
                      • String ID:
                      • API String ID: 1663032902-0
                      • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                      • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                      • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                      • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$InfoLocale_abort_free
                      • String ID:
                      • API String ID: 2692324296-0
                      • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                      • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                      • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                      • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                      APIs
                        • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                      • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalEnterEnumLocalesSectionSystem
                      • String ID:
                      • API String ID: 1272433827-0
                      • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                      • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                      • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                      • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                      • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                      • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                      • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                      • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                      APIs
                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.1 Pro), ref: 0040F920
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                      • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                      • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                      • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                      • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                      • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                      • Instruction Fuzzy Hash:
                      APIs
                      • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                      • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                        • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                      • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                      • DeleteDC.GDI32(00000000), ref: 00418F65
                      • DeleteDC.GDI32(00000000), ref: 00418F68
                      • DeleteObject.GDI32(00000000), ref: 00418F6B
                      • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                      • DeleteDC.GDI32(00000000), ref: 00418F9D
                      • DeleteDC.GDI32(00000000), ref: 00418FA0
                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                      • GetCursorInfo.USER32(?), ref: 00418FE2
                      • GetIconInfo.USER32(?,?), ref: 00418FF8
                      • DeleteObject.GDI32(?), ref: 00419027
                      • DeleteObject.GDI32(?), ref: 00419034
                      • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                      • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                      • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                      • DeleteDC.GDI32(?), ref: 004191B7
                      • DeleteDC.GDI32(00000000), ref: 004191BA
                      • DeleteObject.GDI32(00000000), ref: 004191BD
                      • GlobalFree.KERNEL32(?), ref: 004191C8
                      • DeleteObject.GDI32(00000000), ref: 0041927C
                      • GlobalFree.KERNEL32(?), ref: 00419283
                      • DeleteDC.GDI32(?), ref: 00419293
                      • DeleteDC.GDI32(00000000), ref: 0041929E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                      • String ID: DISPLAY
                      • API String ID: 4256916514-865373369
                      • Opcode ID: b81785b538983269000155a5db9ce9f88dc46a30689f781578aa582ea0c925e1
                      • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                      • Opcode Fuzzy Hash: b81785b538983269000155a5db9ce9f88dc46a30689f781578aa582ea0c925e1
                      • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                      APIs
                        • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                        • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                        • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                        • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                      • ExitProcess.KERNEL32 ref: 0040D80B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                      • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                      • API String ID: 1861856835-1447701601
                      • Opcode ID: 43ff098f5ef092d6b19484895b584d4af101932854e669fcd5a020824382b8c4
                      • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                      • Opcode Fuzzy Hash: 43ff098f5ef092d6b19484895b584d4af101932854e669fcd5a020824382b8c4
                      • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                      APIs
                        • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                        • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                        • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                        • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                      • ExitProcess.KERNEL32 ref: 0040D454
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                      • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                      • API String ID: 3797177996-2483056239
                      • Opcode ID: 548b5ecf8db026f03dc736ce08a56b29b88c6f1b79b5bf954f2dbd2885c23ff6
                      • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                      • Opcode Fuzzy Hash: 548b5ecf8db026f03dc736ce08a56b29b88c6f1b79b5bf954f2dbd2885c23ff6
                      • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                      APIs
                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                      • ExitProcess.KERNEL32(00000000), ref: 004124DB
                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                      • CloseHandle.KERNEL32(00000000), ref: 00412576
                      • GetCurrentProcessId.KERNEL32 ref: 0041257C
                      • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                      • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                      • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                      • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                        • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                      • Sleep.KERNEL32(000001F4), ref: 004126BD
                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                      • CloseHandle.KERNEL32(00000000), ref: 004126E4
                      • GetCurrentProcessId.KERNEL32 ref: 004126EA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                      • String ID: .exe$8SG$WDH$exepath$open$temp_
                      • API String ID: 2649220323-436679193
                      • Opcode ID: 4de65e87239deceda2419c6e22f4a35cea52a01b2b97f48f14606854e77c6627
                      • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                      • Opcode Fuzzy Hash: 4de65e87239deceda2419c6e22f4a35cea52a01b2b97f48f14606854e77c6627
                      • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                      APIs
                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                      • SetEvent.KERNEL32 ref: 0041B2AA
                      • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                      • CloseHandle.KERNEL32 ref: 0041B2CB
                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                      • API String ID: 738084811-2094122233
                      • Opcode ID: 2c03ece1c9f6520a230c4351422b5f5e56bad15b297533a01e06060e4a679983
                      • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                      • Opcode Fuzzy Hash: 2c03ece1c9f6520a230c4351422b5f5e56bad15b297533a01e06060e4a679983
                      • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                      APIs
                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                      • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                      • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                      • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Write$Create
                      • String ID: RIFF$WAVE$data$fmt
                      • API String ID: 1602526932-4212202414
                      • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                      • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                      • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                      • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000001,00407688,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                      • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                      • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                      • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                      • GetProcAddress.KERNEL32(00000000), ref: 00407308
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                      • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                      • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                      • GetProcAddress.KERNEL32(00000000), ref: 00407330
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                      • API String ID: 1646373207-2422700265
                      • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                      • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                      • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                      • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                      APIs
                        • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                        • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                        • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                      • _strlen.LIBCMT ref: 10001855
                      • _strlen.LIBCMT ref: 10001869
                      • _strlen.LIBCMT ref: 1000188B
                      • _strlen.LIBCMT ref: 100018AE
                      • _strlen.LIBCMT ref: 100018C8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _strlen$File$CopyCreateDelete
                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                      • API String ID: 3296212668-3023110444
                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                      • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                      • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                      APIs
                      • _wcslen.LIBCMT ref: 0040CE42
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                      • CopyFileW.KERNEL32(C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                      • _wcslen.LIBCMT ref: 0040CF21
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                      • CopyFileW.KERNEL32(C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000000,00000000), ref: 0040CFBF
                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                      • _wcslen.LIBCMT ref: 0040D001
                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                      • ExitProcess.KERNEL32 ref: 0040D09D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                      • String ID: 6$C:\Program Files (x86)\Internet Explorer\iexplore.exe$del$open
                      • API String ID: 1579085052-3424723665
                      • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                      • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                      • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                      • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                      APIs
                      • lstrlenW.KERNEL32(?), ref: 0041C0C7
                      • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                      • lstrlenW.KERNEL32(?), ref: 0041C0F8
                      • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                      • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                      • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                      • _wcslen.LIBCMT ref: 0041C1CC
                      • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                      • GetLastError.KERNEL32 ref: 0041C204
                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                      • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                      • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                      • GetLastError.KERNEL32 ref: 0041C261
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                      • String ID: ?
                      • API String ID: 3941738427-1684325040
                      • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                      • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                      • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                      • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID: %m$~$Gon~$~F@7$~dra
                      • API String ID: 4218353326-230879103
                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                      • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                      • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$EnvironmentVariable$_wcschr
                      • String ID:
                      • API String ID: 3899193279-0
                      • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                      • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                      • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                      • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                      APIs
                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                      • LoadLibraryA.KERNEL32(?), ref: 00414E52
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                      • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                      • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                      • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                      • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                      • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                      • API String ID: 2490988753-744132762
                      • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                      • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                      • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                      • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                      APIs
                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                      • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumOpen
                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                      • API String ID: 1332880857-3714951968
                      • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                      • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                      • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                      • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                      APIs
                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                      • GetCursorPos.USER32(?), ref: 0041D67A
                      • SetForegroundWindow.USER32(?), ref: 0041D683
                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                      • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                      • ExitProcess.KERNEL32 ref: 0041D6F6
                      • CreatePopupMenu.USER32 ref: 0041D6FC
                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                      • String ID: Close
                      • API String ID: 1657328048-3535843008
                      • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                      • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                      • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                      • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$Info
                      • String ID:
                      • API String ID: 2509303402-0
                      • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                      • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                      • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                      • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                      • __aulldiv.LIBCMT ref: 00408D88
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                      • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                      • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                      • CloseHandle.KERNEL32(00000000), ref: 00409037
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                      • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                      • API String ID: 3086580692-2582957567
                      • Opcode ID: de3b9eb2538a316234a75c1278faba6395a61c65d4bec0c081602335da47b1a3
                      • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                      • Opcode Fuzzy Hash: de3b9eb2538a316234a75c1278faba6395a61c65d4bec0c081602335da47b1a3
                      • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 10007D06
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                      • _free.LIBCMT ref: 10007CFB
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 10007D1D
                      • _free.LIBCMT ref: 10007D32
                      • _free.LIBCMT ref: 10007D3D
                      • _free.LIBCMT ref: 10007D5F
                      • _free.LIBCMT ref: 10007D72
                      • _free.LIBCMT ref: 10007D80
                      • _free.LIBCMT ref: 10007D8B
                      • _free.LIBCMT ref: 10007DC3
                      • _free.LIBCMT ref: 10007DCA
                      • _free.LIBCMT ref: 10007DE7
                      • _free.LIBCMT ref: 10007DFF
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                      • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                      • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                      • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 0045138A
                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                      • _free.LIBCMT ref: 0045137F
                        • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                      • _free.LIBCMT ref: 004513A1
                      • _free.LIBCMT ref: 004513B6
                      • _free.LIBCMT ref: 004513C1
                      • _free.LIBCMT ref: 004513E3
                      • _free.LIBCMT ref: 004513F6
                      • _free.LIBCMT ref: 00451404
                      • _free.LIBCMT ref: 0045140F
                      • _free.LIBCMT ref: 00451447
                      • _free.LIBCMT ref: 0045144E
                      • _free.LIBCMT ref: 0045146B
                      • _free.LIBCMT ref: 00451483
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                      • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                      • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                      • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                      APIs
                      • __EH_prolog.LIBCMT ref: 0041A04A
                      • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                      • Sleep.KERNEL32(000003E8), ref: 0041A18E
                      • GetLocalTime.KERNEL32(?), ref: 0041A196
                      • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                      • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                      • API String ID: 489098229-1431523004
                      • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                      • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                      • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                      • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                      APIs
                        • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                        • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                        • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                        • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                        • Part of subcall function 00413733: RegCloseKey.ADVAPI32(00000000), ref: 00413773
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                      • ExitProcess.KERNEL32 ref: 0040D9FF
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                      • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                      • API String ID: 1913171305-3159800282
                      • Opcode ID: a4fb6af2ecdea82f0758ce5941ea4683ae6061986c6ab4d64259d1998a9f706f
                      • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                      • Opcode Fuzzy Hash: a4fb6af2ecdea82f0758ce5941ea4683ae6061986c6ab4d64259d1998a9f706f
                      • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                      APIs
                      • connect.WS2_32(FFFFFFFF,02D8E590,00000010), ref: 004048E0
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                      • WSAGetLastError.WS2_32 ref: 00404A21
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                      • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                      • API String ID: 994465650-2151626615
                      • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                      • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                      • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                      • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                      • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                      • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                      • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                      APIs
                        • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                      • GetLastError.KERNEL32 ref: 00455D6F
                      • __dosmaperr.LIBCMT ref: 00455D76
                      • GetFileType.KERNEL32(00000000), ref: 00455D82
                      • GetLastError.KERNEL32 ref: 00455D8C
                      • __dosmaperr.LIBCMT ref: 00455D95
                      • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                      • CloseHandle.KERNEL32(?), ref: 00455EFF
                      • GetLastError.KERNEL32 ref: 00455F31
                      • __dosmaperr.LIBCMT ref: 00455F38
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                      • String ID: H
                      • API String ID: 4237864984-2852464175
                      • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                      • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                      • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                      • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: \&G$\&G$`&G
                      • API String ID: 269201875-253610517
                      • Opcode ID: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                      • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                      • Opcode Fuzzy Hash: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                      • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 65535$udp
                      • API String ID: 0-1267037602
                      • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                      • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                      • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                      • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                      • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                      • __dosmaperr.LIBCMT ref: 0043A926
                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                      • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                      • __dosmaperr.LIBCMT ref: 0043A963
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                      • __dosmaperr.LIBCMT ref: 0043A9B7
                      • _free.LIBCMT ref: 0043A9C3
                      • _free.LIBCMT ref: 0043A9CA
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                      • String ID:
                      • API String ID: 2441525078-0
                      • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                      • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                      • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                      • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 004054BF
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                      • TranslateMessage.USER32(?), ref: 0040557E
                      • DispatchMessageA.USER32(?), ref: 00405589
                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                      • String ID: CloseChat$DisplayMessage$GetMessage
                      • API String ID: 2956720200-749203953
                      • Opcode ID: b0584bf81bdfb6a734ca5f5c99f1b49844c5bd06d0e238ccd178acea79b46c1f
                      • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                      • Opcode Fuzzy Hash: b0584bf81bdfb6a734ca5f5c99f1b49844c5bd06d0e238ccd178acea79b46c1f
                      • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                      APIs
                        • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                      • CloseHandle.KERNEL32(00000000), ref: 00417E20
                      • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                      • String ID: 0VG$0VG$<$@$Temp
                      • API String ID: 1704390241-2575729100
                      • Opcode ID: 4b7f8cd3b948c291148204035172dec6d2523c2284085d2f262cb134f2b68ba4
                      • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                      • Opcode Fuzzy Hash: 4b7f8cd3b948c291148204035172dec6d2523c2284085d2f262cb134f2b68ba4
                      • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                      APIs
                      • OpenClipboard.USER32 ref: 0041697C
                      • EmptyClipboard.USER32 ref: 0041698A
                      • CloseClipboard.USER32 ref: 00416990
                      • OpenClipboard.USER32 ref: 00416997
                      • GetClipboardData.USER32(0000000D), ref: 004169A7
                      • GlobalLock.KERNEL32(00000000), ref: 004169B0
                      • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                      • CloseClipboard.USER32 ref: 004169BF
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                      • String ID: !D@
                      • API String ID: 2172192267-604454484
                      • Opcode ID: 124cd0a3c28bad7f2eddfd16fb00f29a6e960e9c60e0d37767ec50555d8d84dc
                      • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                      • Opcode Fuzzy Hash: 124cd0a3c28bad7f2eddfd16fb00f29a6e960e9c60e0d37767ec50555d8d84dc
                      • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                      • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                      • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                      • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                      APIs
                      • _free.LIBCMT ref: 100059EA
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 100059F6
                      • _free.LIBCMT ref: 10005A01
                      • _free.LIBCMT ref: 10005A0C
                      • _free.LIBCMT ref: 10005A17
                      • _free.LIBCMT ref: 10005A22
                      • _free.LIBCMT ref: 10005A2D
                      • _free.LIBCMT ref: 10005A38
                      • _free.LIBCMT ref: 10005A43
                      • _free.LIBCMT ref: 10005A51
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                      • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                      • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                      • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                      APIs
                      • _free.LIBCMT ref: 004481B5
                        • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                      • _free.LIBCMT ref: 004481C1
                      • _free.LIBCMT ref: 004481CC
                      • _free.LIBCMT ref: 004481D7
                      • _free.LIBCMT ref: 004481E2
                      • _free.LIBCMT ref: 004481ED
                      • _free.LIBCMT ref: 004481F8
                      • _free.LIBCMT ref: 00448203
                      • _free.LIBCMT ref: 0044820E
                      • _free.LIBCMT ref: 0044821C
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                      • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                      • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                      • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Eventinet_ntoa
                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                      • API String ID: 3578746661-3604713145
                      • Opcode ID: 790f602656e0a07de5136622625fcf768cc33824afeb3fb9f429a6ff71473f5a
                      • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                      • Opcode Fuzzy Hash: 790f602656e0a07de5136622625fcf768cc33824afeb3fb9f429a6ff71473f5a
                      • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                      APIs
                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DecodePointer
                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                      • API String ID: 3527080286-3064271455
                      • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                      • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                      • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                      • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                      • Sleep.KERNEL32(00000064), ref: 0041755C
                      • DeleteFileW.KERNEL32(00000000), ref: 00417590
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CreateDeleteExecuteShellSleep
                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                      • API String ID: 1462127192-2001430897
                      • Opcode ID: ee0de8fb4d00aa338543d80a524ce508d01dc225db8f99869f985e8c7060f26e
                      • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                      • Opcode Fuzzy Hash: ee0de8fb4d00aa338543d80a524ce508d01dc225db8f99869f985e8c7060f26e
                      • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                      APIs
                      • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                      • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Program Files (x86)\Internet Explorer\iexplore.exe), ref: 004074D9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CurrentProcess
                      • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                      • API String ID: 2050909247-4242073005
                      • Opcode ID: 6ceb9103d77b1bc27c300794ecf0ee90de48fd3161816cd50b459a1cb4f425b3
                      • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                      • Opcode Fuzzy Hash: 6ceb9103d77b1bc27c300794ecf0ee90de48fd3161816cd50b459a1cb4f425b3
                      • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                      APIs
                      • _strftime.LIBCMT ref: 00401D50
                        • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                      • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                      • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                      • API String ID: 3809562944-243156785
                      • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                      • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                      • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                      • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                      • int.LIBCPMT ref: 00410EBC
                        • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                        • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                      • std::_Facet_Register.LIBCPMT ref: 00410EFC
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                      • __Init_thread_footer.LIBCMT ref: 00410F64
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                      • String ID: ,kG$0kG
                      • API String ID: 3815856325-2015055088
                      • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                      • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                      • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                      • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                      APIs
                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                      • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                      • waveInStart.WINMM ref: 00401CFE
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                      • String ID: dMG$|MG$PG
                      • API String ID: 1356121797-532278878
                      • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                      • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                      • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                      • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                        • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                        • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                        • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                      • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                      • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                      • TranslateMessage.USER32(?), ref: 0041D57A
                      • DispatchMessageA.USER32(?), ref: 0041D584
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                      • String ID: Remcos
                      • API String ID: 1970332568-165870891
                      • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                      • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                      • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                      • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                      • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                      • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                      • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                      APIs
                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                      • __alloca_probe_16.LIBCMT ref: 00453F6A
                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                      • __alloca_probe_16.LIBCMT ref: 00454014
                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                        • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                      • __freea.LIBCMT ref: 00454083
                      • __freea.LIBCMT ref: 0045408F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
                      • String ID:
                      • API String ID: 3256262068-0
                      • Opcode ID: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                      • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                      • Opcode Fuzzy Hash: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                      • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                      APIs
                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                      • String ID:
                      • API String ID: 1454806937-0
                      • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                      • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                      • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                      • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                      APIs
                        • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                      • _memcmp.LIBVCRUNTIME ref: 004454A4
                      • _free.LIBCMT ref: 00445515
                      • _free.LIBCMT ref: 0044552E
                      • _free.LIBCMT ref: 00445560
                      • _free.LIBCMT ref: 00445569
                      • _free.LIBCMT ref: 00445575
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorLast$_abort_memcmp
                      • String ID: C
                      • API String ID: 1679612858-1037565863
                      • Opcode ID: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                      • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                      • Opcode Fuzzy Hash: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                      • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: tcp$udp
                      • API String ID: 0-3725065008
                      • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                      • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                      • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                      • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 004018BE
                      • ExitThread.KERNEL32 ref: 004018F6
                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                      • String ID: PkG$XMG$NG$NG
                      • API String ID: 1649129571-3151166067
                      • Opcode ID: d9077903f33f7baf6a50ed51b1f7109498bb3518c0097fb9c19528683c5ee08e
                      • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                      • Opcode Fuzzy Hash: d9077903f33f7baf6a50ed51b1f7109498bb3518c0097fb9c19528683c5ee08e
                      • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                      APIs
                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                        • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                        • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                      • String ID: .part
                      • API String ID: 1303771098-3499674018
                      • Opcode ID: 5922a264bb35c099248986da03093c4fefe1965b3922d4a6e3cdb8ec9196d8c8
                      • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                      • Opcode Fuzzy Hash: 5922a264bb35c099248986da03093c4fefe1965b3922d4a6e3cdb8ec9196d8c8
                      • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                      APIs
                      • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                      • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                      • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                      • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$Window$AllocOutputShow
                      • String ID: Remcos v$5.1.1 Pro$CONOUT$
                      • API String ID: 4067487056-3820604032
                      • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                      • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                      • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                      • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                      • __alloca_probe_16.LIBCMT ref: 0044AD5B
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                      • __alloca_probe_16.LIBCMT ref: 0044AE40
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                      • __freea.LIBCMT ref: 0044AEB0
                        • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                      • __freea.LIBCMT ref: 0044AEB9
                      • __freea.LIBCMT ref: 0044AEDE
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
                      • String ID:
                      • API String ID: 2597970681-0
                      • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                      • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                      • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                      • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                      APIs
                      • SendInput.USER32 ref: 00419A25
                      • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                      • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                        • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: InputSend$Virtual
                      • String ID:
                      • API String ID: 1167301434-0
                      • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                      • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                      • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                      • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16_free
                      • String ID: a/p$am/pm$h{D
                      • API String ID: 2936374016-2303565833
                      • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                      • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                      • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                      • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                      APIs
                        • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                      • _free.LIBCMT ref: 00444E87
                      • _free.LIBCMT ref: 00444E9E
                      • _free.LIBCMT ref: 00444EBD
                      • _free.LIBCMT ref: 00444ED8
                      • _free.LIBCMT ref: 00444EEF
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$AllocHeap
                      • String ID: KED
                      • API String ID: 1835388192-2133951994
                      • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                      • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                      • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                      • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                      APIs
                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Enum$InfoQueryValue
                      • String ID: [regsplt]$xUG$TG
                      • API String ID: 3554306468-1165877943
                      • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                      • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                      • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                      • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                      APIs
                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                      • __fassign.LIBCMT ref: 1000954F
                      • __fassign.LIBCMT ref: 1000956A
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                      • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                      • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                      • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                      • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                      • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                      APIs
                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                      • __fassign.LIBCMT ref: 0044B4F9
                      • __fassign.LIBCMT ref: 0044B514
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                      • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                      • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                      • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                      • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                      APIs
                      • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                        • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                        • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumInfoOpenQuerysend
                      • String ID: xUG$NG$NG$TG
                      • API String ID: 3114080316-2811732169
                      • Opcode ID: b1b7949ef61a35ba4cc61443280690e5e60ed18a3bf0cde03ddb3230cdfb3c59
                      • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                      • Opcode Fuzzy Hash: b1b7949ef61a35ba4cc61443280690e5e60ed18a3bf0cde03ddb3230cdfb3c59
                      • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 1000339B
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                      • _ValidateLocalCookies.LIBCMT ref: 10003431
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                      • _ValidateLocalCookies.LIBCMT ref: 100034B1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                      • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                      • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                      • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                      APIs
                        • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                        • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                        • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                        • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                        • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                      • _wcslen.LIBCMT ref: 0041B7F4
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                      • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                      • API String ID: 3286818993-122982132
                      • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                      • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                      • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                      • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                      APIs
                        • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                        • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                        • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                      • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                      • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                      • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                      • API String ID: 1133728706-4073444585
                      • Opcode ID: 8aa536b655b49c567f456496866440e9e8ed1ceb43545f59c0e2dc1ef41ea5ae
                      • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                      • Opcode Fuzzy Hash: 8aa536b655b49c567f456496866440e9e8ed1ceb43545f59c0e2dc1ef41ea5ae
                      • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                      • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                      • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                      • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                      APIs
                        • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                      • _free.LIBCMT ref: 100092AB
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 100092B6
                      • _free.LIBCMT ref: 100092C1
                      • _free.LIBCMT ref: 10009315
                      • _free.LIBCMT ref: 10009320
                      • _free.LIBCMT ref: 1000932B
                      • _free.LIBCMT ref: 10009336
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                      • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                      • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                      APIs
                        • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                      • _free.LIBCMT ref: 00450FC8
                        • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                      • _free.LIBCMT ref: 00450FD3
                      • _free.LIBCMT ref: 00450FDE
                      • _free.LIBCMT ref: 00451032
                      • _free.LIBCMT ref: 0045103D
                      • _free.LIBCMT ref: 00451048
                      • _free.LIBCMT ref: 00451053
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                      • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                      • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                      • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                      • int.LIBCPMT ref: 004111BE
                        • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                        • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                      • std::_Facet_Register.LIBCPMT ref: 004111FE
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                      • String ID: (mG
                      • API String ID: 2536120697-4059303827
                      • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                      • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                      • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                      • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                      APIs
                        • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                        • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                        • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                        • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                        • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                      • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseCurrentOpenQueryValueWow64
                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                      • API String ID: 782494840-2070987746
                      • Opcode ID: 1d23e91a93135cd0a196f52473a709fa0820314a79694e3c0578829edae83f52
                      • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                      • Opcode Fuzzy Hash: 1d23e91a93135cd0a196f52473a709fa0820314a79694e3c0578829edae83f52
                      • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                      APIs
                      • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                      • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                      • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                      • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                      • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                      APIs
                      • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe), ref: 0040760B
                        • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                        • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                      • CoUninitialize.OLE32 ref: 00407664
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: InitializeObjectUninitialize_wcslen
                      • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                      • API String ID: 3851391207-2922778296
                      • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                      • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                      • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                      • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                      • GetLastError.KERNEL32 ref: 0040BB22
                      Strings
                      • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                      • UserProfile, xrefs: 0040BAE8
                      • [Chrome Cookies not found], xrefs: 0040BB3C
                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      • API String ID: 2018770650-304995407
                      • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                      • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                      • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                      • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                      APIs
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                      • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                      • Sleep.KERNEL32(00002710), ref: 0041AE98
                      • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: PlaySound$HandleLocalModuleSleepTime
                      • String ID: Alarm triggered$`#v
                      • API String ID: 614609389-3049340936
                      • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                      • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                      • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                      • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                      APIs
                      • __allrem.LIBCMT ref: 0043ACE9
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                      • __allrem.LIBCMT ref: 0043AD1C
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                      • __allrem.LIBCMT ref: 0043AD51
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 1992179935-0
                      • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                      • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                      • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                      • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                      • __freea.LIBCMT ref: 10008A08
                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                      • __freea.LIBCMT ref: 10008A11
                      • __freea.LIBCMT ref: 10008A36
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                      • String ID:
                      • API String ID: 1414292761-0
                      • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                      • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                      • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                      • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                      APIs
                      • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                        • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: H_prologSleep
                      • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                      • API String ID: 3469354165-3054508432
                      • Opcode ID: f6e6aff78ee3d63b896406be8bff1fcc4d34bb4dcc7fb7aecf71b36556b6c806
                      • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                      • Opcode Fuzzy Hash: f6e6aff78ee3d63b896406be8bff1fcc4d34bb4dcc7fb7aecf71b36556b6c806
                      • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: __cftoe
                      • String ID:
                      • API String ID: 4189289331-0
                      • Opcode ID: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                      • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                      • Opcode Fuzzy Hash: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                      • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                      APIs
                      • _strlen.LIBCMT ref: 10001607
                      • _strcat.LIBCMT ref: 1000161D
                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                      • lstrcatW.KERNEL32(?,?), ref: 1000165A
                      • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                      • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: lstrcatlstrlen$_strcat_strlen
                      • String ID:
                      • API String ID: 1922816806-0
                      • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                      • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                      • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                      • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                      APIs
                      • lstrcatW.KERNEL32(?,?), ref: 10001038
                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: lstrlen$AttributesFilelstrcat
                      • String ID:
                      • API String ID: 3594823470-0
                      • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                      • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                      • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                      • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                      • String ID:
                      • API String ID: 493672254-0
                      • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                      • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                      • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                      • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                      APIs
                      • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                      • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                      • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                      • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                      • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                      APIs
                      • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                      • _free.LIBCMT ref: 10005B2D
                      • _free.LIBCMT ref: 10005B55
                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                      • _abort.LIBCMT ref: 10005B74
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                      • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                      • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                      • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                      APIs
                      • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                      • _free.LIBCMT ref: 004482CC
                      • _free.LIBCMT ref: 004482F4
                      • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                      • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                      • _abort.LIBCMT ref: 00448313
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                      • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                      • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                      • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                      • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                      • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                      • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                      • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                      • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                      • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                      • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                      • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                      • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                      • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                      • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                      APIs
                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                      • API String ID: 4036392271-1520055953
                      • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                      • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                      • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                      • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                      APIs
                      • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                      • GetLastError.KERNEL32 ref: 0041D611
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ClassCreateErrorLastRegisterWindow
                      • String ID: 0$MsgWindowClass
                      • API String ID: 2877667751-2410386613
                      • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                      • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                      • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                      • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                      APIs
                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                      • CloseHandle.KERNEL32(?), ref: 004077E5
                      • CloseHandle.KERNEL32(?), ref: 004077EA
                      Strings
                      • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreateProcess
                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                      • API String ID: 2922976086-4183131282
                      • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                      • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                      • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                      • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                      Strings
                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe, xrefs: 004076FF
                      • Rmc-Q4NYK2, xrefs: 00407715
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$Rmc-Q4NYK2
                      • API String ID: 0-3781275143
                      • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                      • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                      • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                      • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                      • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                      • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                      • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                      • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                      • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                      • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                      • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                      • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                      • String ID: KeepAlive | Disabled
                      • API String ID: 2993684571-305739064
                      • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                      • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                      • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                      • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                      APIs
                      • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                      • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                      Strings
                      • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$AttributeText$BufferHandleInfoScreen
                      • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                      • API String ID: 3024135584-2418719853
                      • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                      • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                      • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                      • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                      APIs
                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                      • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: GetCursorInfo$User32.dll$`#v
                      • API String ID: 1646373207-1032071883
                      • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                      • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                      • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                      • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                      • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                      • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                      • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                      APIs
                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                      • _free.LIBCMT ref: 0044943D
                        • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                      • _free.LIBCMT ref: 00449609
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                      • String ID:
                      • API String ID: 1286116820-0
                      • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                      • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                      • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                      • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                      APIs
                        • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                        • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                      • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                        • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                        • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                      • String ID:
                      • API String ID: 2180151492-0
                      • Opcode ID: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                      • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                      • Opcode Fuzzy Hash: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                      • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                      • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                      • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                      • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                      • __alloca_probe_16.LIBCMT ref: 00451231
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                      • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                      • __freea.LIBCMT ref: 0045129D
                        • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                      • String ID:
                      • API String ID: 1857427562-0
                      • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                      • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                      • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                      • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                      • _free.LIBCMT ref: 100071B8
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                      • String ID:
                      • API String ID: 336800556-0
                      • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                      • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                      • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                      • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                        • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                      • _free.LIBCMT ref: 0044F43F
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
                      • String ID:
                      • API String ID: 2278895681-0
                      • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                      • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                      • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                      • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                      • _free.LIBCMT ref: 10005BB4
                      • _free.LIBCMT ref: 10005BDB
                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                      • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                      • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                      • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                      APIs
                      • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                      • _free.LIBCMT ref: 00448353
                      • _free.LIBCMT ref: 0044837A
                      • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                      • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                      • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                      • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                      • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                      APIs
                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                      • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpen$FileImageName
                      • String ID:
                      • API String ID: 2951400881-0
                      • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                      • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                      • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                      • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                      • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                      • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: lstrlen$lstrcat
                      • String ID:
                      • API String ID: 493641738-0
                      • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                      • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                      • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                      • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                      APIs
                      • _free.LIBCMT ref: 100091D0
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 100091E2
                      • _free.LIBCMT ref: 100091F4
                      • _free.LIBCMT ref: 10009206
                      • _free.LIBCMT ref: 10009218
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                      • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                      • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                      • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                      APIs
                      • _free.LIBCMT ref: 00450A54
                        • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                      • _free.LIBCMT ref: 00450A66
                      • _free.LIBCMT ref: 00450A78
                      • _free.LIBCMT ref: 00450A8A
                      • _free.LIBCMT ref: 00450A9C
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                      • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                      • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                      • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                      APIs
                      • _free.LIBCMT ref: 1000536F
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 10005381
                      • _free.LIBCMT ref: 10005394
                      • _free.LIBCMT ref: 100053A5
                      • _free.LIBCMT ref: 100053B6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                      • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                      • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                      • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                      APIs
                      • _free.LIBCMT ref: 00444106
                        • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                      • _free.LIBCMT ref: 00444118
                      • _free.LIBCMT ref: 0044412B
                      • _free.LIBCMT ref: 0044413C
                      • _free.LIBCMT ref: 0044414D
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                      • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                      • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                      • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                      APIs
                      • _strpbrk.LIBCMT ref: 0044E7B8
                      • _free.LIBCMT ref: 0044E8D5
                        • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                        • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                        • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                      • String ID: *?$.
                      • API String ID: 2812119850-3972193922
                      • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                      • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                      • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                      • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                      APIs
                      • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                        • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,02D8E590,00000010), ref: 004048E0
                        • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateFileKeyboardLayoutNameconnectsend
                      • String ID: XQG$NG$PG
                      • API String ID: 1634807452-3565412412
                      • Opcode ID: 28a7afc0bd753dac092c7382b654cb076ed49f863eb27a30cdd711f0d2f031c4
                      • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                      • Opcode Fuzzy Hash: 28a7afc0bd753dac092c7382b654cb076ed49f863eb27a30cdd711f0d2f031c4
                      • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000104), ref: 10004C1D
                      • _free.LIBCMT ref: 10004CE8
                      • _free.LIBCMT ref: 10004CF2
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      • API String ID: 2506810119-908218840
                      • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                      • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                      • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                      • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000104), ref: 00443515
                      • _free.LIBCMT ref: 004435E0
                      • _free.LIBCMT ref: 004435EA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      • API String ID: 2506810119-908218840
                      • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                      • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                      • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                      • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                        • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                        • Part of subcall function 004185A3: FindCloseChangeNotification.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                        • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                      • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseFile$ChangeCreateCurrentFindHandleModuleNameNotificationProcessSleep
                      • String ID: /sort "Visit Time" /stext "$0NG
                      • API String ID: 1769719543-3219657780
                      • Opcode ID: 10959af9620b1db9aaafbf669d1fc69cf3904a369373ebc58f3d02013c0c07e1
                      • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                      • Opcode Fuzzy Hash: 10959af9620b1db9aaafbf669d1fc69cf3904a369373ebc58f3d02013c0c07e1
                      • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                      APIs
                      • _wcslen.LIBCMT ref: 00416330
                        • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                        • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                        • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                        • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcslen$CloseCreateValue
                      • String ID: !D@$okmode$PG
                      • API String ID: 3411444782-3370592832
                      • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                      • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                      • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                      • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                      APIs
                        • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                      Strings
                      • User Data\Default\Network\Cookies, xrefs: 0040C63E
                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                      • API String ID: 1174141254-1980882731
                      • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                      • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                      • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                      • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                      APIs
                        • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                      Strings
                      • User Data\Default\Network\Cookies, xrefs: 0040C70D
                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                      • API String ID: 1174141254-1980882731
                      • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                      • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                      • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                      • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                      APIs
                      • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                      • wsprintfW.USER32 ref: 0040B22E
                        • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: EventLocalTimewsprintf
                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                      • API String ID: 1497725170-1359877963
                      • Opcode ID: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                      • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                      • Opcode Fuzzy Hash: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                      • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                      APIs
                        • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                        • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                      • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread$LocalTime$wsprintf
                      • String ID: Online Keylogger Started
                      • API String ID: 112202259-1258561607
                      • Opcode ID: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                      • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                      • Opcode Fuzzy Hash: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                      • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                      APIs
                      • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                      • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: CryptUnprotectData$crypt32
                      • API String ID: 2574300362-2380590389
                      • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                      • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                      • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                      • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                      • CloseHandle.KERNEL32(?), ref: 004051CA
                      • SetEvent.KERNEL32(?), ref: 004051D9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandleObjectSingleWait
                      • String ID: Connection Timeout
                      • API String ID: 2055531096-499159329
                      • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                      • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                      • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                      • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8Throw
                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                      • API String ID: 2005118841-1866435925
                      • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                      • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                      • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                      • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                      APIs
                      • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                      • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,004752D8), ref: 00413888
                      • RegCloseKey.ADVAPI32(004752D8,?,0040F85E,pth_unenc,004752D8), ref: 00413893
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: pth_unenc
                      • API String ID: 1818849710-4028850238
                      • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                      • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                      • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                      • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                        • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                        • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                      • String ID: bad locale name
                      • API String ID: 3628047217-1405518554
                      • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                      • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                      • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                      • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                      • ShowWindow.USER32(00000009), ref: 00416C9C
                      • SetForegroundWindow.USER32 ref: 00416CA8
                        • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                        • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                        • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                        • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                      • String ID: !D@
                      • API String ID: 186401046-604454484
                      • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                      • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                      • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                      • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: /C $cmd.exe$open
                      • API String ID: 587946157-3896048727
                      • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                      • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                      • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                      • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                      APIs
                      • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                      • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                      • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: TerminateThread$HookUnhookWindows
                      • String ID: pth_unenc
                      • API String ID: 3123878439-4028850238
                      • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                      • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                      • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                      • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                      APIs
                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                      • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetLastInputInfo$User32.dll
                      • API String ID: 2574300362-1519888992
                      • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                      • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                      • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                      • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: __alldvrm$_strrchr
                      • String ID:
                      • API String ID: 1036877536-0
                      • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                      • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                      • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                      • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                      • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                      • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                      • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                      • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                      • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                      • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                      • __freea.LIBCMT ref: 100087D5
                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                      • String ID:
                      • API String ID: 2652629310-0
                      • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                      • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                      • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                      • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                      APIs
                      Strings
                      • Cleared browsers logins and cookies., xrefs: 0040C130
                      • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                      • API String ID: 3472027048-1236744412
                      • Opcode ID: a47e4bd4ae33be5e820a28766d0f4a2dce9b4040214cbf81c2be40245d386c07
                      • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                      • Opcode Fuzzy Hash: a47e4bd4ae33be5e820a28766d0f4a2dce9b4040214cbf81c2be40245d386c07
                      • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                      APIs
                      • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                      • EnumDisplayDevicesW.USER32(?), ref: 00419560
                      • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                      • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DisplayEnum$Devices$Monitors
                      • String ID:
                      • API String ID: 1432082543-0
                      • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                      • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                      • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                      • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                      APIs
                        • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                        • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                        • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                      • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                      • Sleep.KERNEL32(00000064), ref: 0040A638
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$SleepText$ForegroundLength
                      • String ID: [ $ ]
                      • API String ID: 3309952895-93608704
                      • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                      • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                      • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                      • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                      APIs
                      • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                        • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID:
                      • API String ID: 1646373207-0
                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                      • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                      • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: SystemTimes$Sleep__aulldiv
                      • String ID:
                      • API String ID: 188215759-0
                      • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                      • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                      • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                      • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                      • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                      • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                      • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                      • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                      • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                      • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                      • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                      • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                      • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                      • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                      • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                      • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                      • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                      • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                      APIs
                      • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                        • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                      • _UnwindNestedFrames.LIBCMT ref: 00439911
                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                      • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                      • String ID:
                      • API String ID: 2633735394-0
                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                      • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                      • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                      APIs
                      • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                      • GetSystemMetrics.USER32(0000004D), ref: 00419431
                      • GetSystemMetrics.USER32(0000004E), ref: 00419437
                      • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: MetricsSystem
                      • String ID:
                      • API String ID: 4116985748-0
                      • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                      • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                      • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                      • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                      APIs
                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                        • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                      • String ID:
                      • API String ID: 1761009282-0
                      • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                      • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                      • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                      • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                      APIs
                      • _free.LIBCMT ref: 1000655C
                        • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                        • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                        • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                      • String ID: *?$.
                      • API String ID: 2667617558-3972193922
                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                      • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                      • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                      APIs
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                        • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                      • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                        • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                        • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                      • String ID: image/jpeg
                      • API String ID: 1291196975-3785015651
                      • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                      • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                      • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                      • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                      APIs
                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                      • __Init_thread_footer.LIBCMT ref: 0040B7D2
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Init_thread_footer__onexit
                      • String ID: [End of clipboard]$[Text copied to clipboard]
                      • API String ID: 1881088180-3686566968
                      • Opcode ID: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                      • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                      • Opcode Fuzzy Hash: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                      • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                      APIs
                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ACP$OCP
                      • API String ID: 0-711371036
                      • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                      • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                      • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                      • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                      APIs
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                        • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                        • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                        • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                      • String ID: image/png
                      • API String ID: 1291196975-2966254431
                      • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                      • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                      • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                      • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                      APIs
                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 481472006-1507639952
                      • Opcode ID: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                      • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                      • Opcode Fuzzy Hash: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                      • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                      APIs
                      • Sleep.KERNEL32 ref: 0041667B
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadFileSleep
                      • String ID: !D@
                      • API String ID: 1931167962-604454484
                      • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                      • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                      • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                      • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID: : $Se.
                      • API String ID: 4218353326-4089948878
                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                      • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                      • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                      APIs
                      • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: | $%02i:%02i:%02i:%03i
                      • API String ID: 481472006-2430845779
                      • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                      • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                      • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                      • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: alarm.wav$hYG
                      • API String ID: 1174141254-2782910960
                      • Opcode ID: 726a765a4b293393dbd46d4367af021be8b9293aa4481f2794ee9f7b4d79c493
                      • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                      • Opcode Fuzzy Hash: 726a765a4b293393dbd46d4367af021be8b9293aa4481f2794ee9f7b4d79c493
                      • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                      APIs
                        • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                        • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                      • CloseHandle.KERNEL32(?), ref: 0040B0EF
                      • UnhookWindowsHookEx.USER32 ref: 0040B102
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                      • String ID: Online Keylogger Stopped
                      • API String ID: 1623830855-1496645233
                      • Opcode ID: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                      • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                      • Opcode Fuzzy Hash: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                      • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                        • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3359785162.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 0000000A.00000002.3359752890.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3359785162.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_10000000_iexplore.jbxd
                      Similarity
                      • API ID: Exception@8Throw$ExceptionRaise
                      • String ID: Unknown exception
                      • API String ID: 3476068407-410509341
                      • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                      • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                      • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                      • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                      APIs
                      • waveInPrepareHeader.WINMM(02D88590,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                      • waveInAddBuffer.WINMM(02D88590,00000020,?,00000000,00401A15), ref: 0040185F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$BufferHeaderPrepare
                      • String ID: XMG
                      • API String ID: 2315374483-813777761
                      • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                      • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                      • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                      • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                      APIs
                      • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocaleValid
                      • String ID: IsValidLocaleName$kKD
                      • API String ID: 1901932003-3269126172
                      • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                      • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                      • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                      • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                      • API String ID: 1174141254-4188645398
                      • Opcode ID: 2b6c0150b8fccbbffc8f0b3b989992b7109110bbcbfb9973898c57e16d168baa
                      • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                      • Opcode Fuzzy Hash: 2b6c0150b8fccbbffc8f0b3b989992b7109110bbcbfb9973898c57e16d168baa
                      • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                      • API String ID: 1174141254-2800177040
                      • Opcode ID: be2ac72381ba667652cb8157c7eab32d159168f8a730a51bc7883fbde0610272
                      • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                      • Opcode Fuzzy Hash: be2ac72381ba667652cb8157c7eab32d159168f8a730a51bc7883fbde0610272
                      • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: AppData$\Opera Software\Opera Stable\
                      • API String ID: 1174141254-1629609700
                      • Opcode ID: e9aef06425b09f93b4b18eec61b32618902fb8755f3519ca0ccc41cb67e29c85
                      • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                      • Opcode Fuzzy Hash: e9aef06425b09f93b4b18eec61b32618902fb8755f3519ca0ccc41cb67e29c85
                      • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                      APIs
                      • GetKeyState.USER32(00000011), ref: 0040B686
                        • Part of subcall function 0040A41B: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                        • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                        • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                        • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                        • Part of subcall function 0040A41B: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                        • Part of subcall function 0040A41B: ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                        • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                        • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                      • String ID: [AltL]$[AltR]
                      • API String ID: 2738857842-2658077756
                      • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                      • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                      • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                      • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: !D@$open
                      • API String ID: 587946157-1586967515
                      • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                      • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                      • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                      • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                      APIs
                      • GetKeyState.USER32(00000012), ref: 0040B6E0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: State
                      • String ID: [CtrlL]$[CtrlR]
                      • API String ID: 1649606143-2446555240
                      • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                      • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                      • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                      • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                      APIs
                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                      • __Init_thread_footer.LIBCMT ref: 00410F64
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: Init_thread_footer__onexit
                      • String ID: ,kG$0kG
                      • API String ID: 1881088180-2015055088
                      • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                      • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                      • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                      • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A6C
                      • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteOpenValue
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                      • API String ID: 2654517830-1051519024
                      • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                      • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                      • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                      • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                      APIs
                      • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                      • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteDirectoryFileRemove
                      • String ID: pth_unenc
                      • API String ID: 3325800564-4028850238
                      • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                      • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                      • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                      • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                      APIs
                      • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                      • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ObjectProcessSingleTerminateWait
                      • String ID: pth_unenc
                      • API String ID: 1872346434-4028850238
                      • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                      • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                      • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                      • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                      • GetLastError.KERNEL32 ref: 00440D85
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 1717984340-0
                      • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                      • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                      • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                      • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                      APIs
                      • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411F2B), ref: 00411BC7
                      • IsBadReadPtr.KERNEL32(?,00000014,00411F2B), ref: 00411C93
                      • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                      • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3356195585.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 0000000A.00000002.3356195585.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 0000000A.00000002.3356195585.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_400000_iexplore.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastRead
                      • String ID:
                      • API String ID: 4100373531-0
                      • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                      • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                      • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                      • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                      Execution Graph

                      Execution Coverage:5.7%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:78
                      execution_graph 40260 441819 40263 430737 40260->40263 40262 441825 40264 430756 40263->40264 40276 43076d 40263->40276 40265 430774 40264->40265 40266 43075f 40264->40266 40278 43034a memcpy 40265->40278 40277 4169a7 11 API calls 40266->40277 40269 4307ce 40270 430819 memset 40269->40270 40279 415b2c 11 API calls 40269->40279 40270->40276 40271 43077e 40271->40269 40274 4307fa 40271->40274 40271->40276 40273 4307e9 40273->40270 40273->40276 40280 4169a7 11 API calls 40274->40280 40276->40262 40277->40276 40278->40271 40279->40273 40280->40276 37672 442ec6 19 API calls 37846 4152c6 malloc 37847 4152e2 37846->37847 37848 4152ef 37846->37848 37850 416760 11 API calls 37848->37850 37850->37847 37851 4466f4 37870 446904 37851->37870 37853 446700 GetModuleHandleA 37856 446710 __set_app_type __p__fmode __p__commode 37853->37856 37855 4467a4 37857 4467ac __setusermatherr 37855->37857 37858 4467b8 37855->37858 37856->37855 37857->37858 37871 4468f0 _controlfp 37858->37871 37860 4467bd _initterm __wgetmainargs _initterm 37862 44681e GetStartupInfoW 37860->37862 37863 446810 37860->37863 37864 446866 GetModuleHandleA 37862->37864 37872 41276d 37864->37872 37868 446896 exit 37869 44689d _cexit 37868->37869 37869->37863 37870->37853 37871->37860 37873 41277d 37872->37873 37915 4044a4 LoadLibraryW 37873->37915 37875 412785 37907 412789 37875->37907 37923 414b81 37875->37923 37878 4127c8 37929 412465 memset ??2@YAPAXI 37878->37929 37880 4127ea 37941 40ac21 37880->37941 37885 412813 37960 40dd07 memset 37885->37960 37886 412827 37965 40db69 memset 37886->37965 37889 412822 37987 4125b6 ??3@YAXPAX DeleteObject 37889->37987 37891 40ada2 _wcsicmp 37892 41283d 37891->37892 37892->37889 37895 412863 CoInitialize 37892->37895 37970 41268e 37892->37970 37894 412966 37988 40b1ab ??3@YAXPAX ??3@YAXPAX 37894->37988 37986 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37895->37986 37899 41296f 37989 40b633 37899->37989 37902 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37906 412957 37902->37906 37912 4128ca 37902->37912 37906->37889 37907->37868 37907->37869 37908 4128d0 TranslateAcceleratorW 37909 412941 GetMessageW 37908->37909 37908->37912 37909->37906 37909->37908 37910 412909 IsDialogMessageW 37910->37909 37910->37912 37911 4128fd IsDialogMessageW 37911->37909 37911->37910 37912->37908 37912->37910 37912->37911 37913 41292b TranslateMessage DispatchMessageW 37912->37913 37914 41291f IsDialogMessageW 37912->37914 37913->37909 37914->37909 37914->37913 37916 4044cf GetProcAddress 37915->37916 37919 4044f7 37915->37919 37917 4044e8 FreeLibrary 37916->37917 37920 4044df 37916->37920 37918 4044f3 37917->37918 37917->37919 37918->37919 37921 404507 MessageBoxW 37919->37921 37922 40451e 37919->37922 37920->37917 37921->37875 37922->37875 37924 414b8a 37923->37924 37925 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37923->37925 37993 40a804 memset 37924->37993 37925->37878 37928 414b9e GetProcAddress 37928->37925 37930 4124e0 37929->37930 37931 412505 ??2@YAPAXI 37930->37931 37932 41251c 37931->37932 37934 412521 37931->37934 38015 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37932->38015 38004 444722 37934->38004 37940 41259b wcscpy 37940->37880 38020 40b1ab ??3@YAXPAX ??3@YAXPAX 37941->38020 37945 40ad4b 37955 40ad76 37945->37955 38026 40a9ce 37945->38026 37946 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37953 40ac5c 37946->37953 37948 40acf0 37948->37953 38025 4099f4 malloc memcpy ??3@YAXPAX 37948->38025 37949 40ace7 ??3@YAXPAX 37949->37953 37953->37945 37953->37946 37953->37948 37953->37949 37953->37955 38024 40a8d0 7 API calls 37953->38024 38021 40aa04 37955->38021 37956 40ada2 37957 40adc9 37956->37957 37958 40adaa 37956->37958 37957->37885 37957->37886 37958->37957 37959 40adb3 _wcsicmp 37958->37959 37959->37957 37959->37958 38034 40dce0 37960->38034 37962 40dd3a GetModuleHandleW 38039 40dba7 37962->38039 37966 40dce0 3 API calls 37965->37966 37967 40db99 37966->37967 38111 40dae1 37967->38111 38125 402f3a 37970->38125 37972 412766 37972->37889 37972->37895 37973 4126d3 _wcsicmp 37974 4126a8 37973->37974 37974->37972 37974->37973 37976 41270a 37974->37976 38159 4125f8 7 API calls 37974->38159 37976->37972 38128 411ac5 37976->38128 37986->37902 37987->37894 37988->37899 37990 40b640 37989->37990 37991 40b639 ??3@YAXPAX 37989->37991 37992 40b1ab ??3@YAXPAX ??3@YAXPAX 37990->37992 37991->37990 37992->37907 37994 40a83b GetSystemDirectoryW 37993->37994 37995 40a84c wcscpy 37993->37995 37994->37995 38000 409719 wcslen 37995->38000 37998 40a881 LoadLibraryW 37999 40a886 37998->37999 37999->37925 37999->37928 38001 409724 38000->38001 38002 409739 wcscat LoadLibraryW 38000->38002 38001->38002 38003 40972c wcscat 38001->38003 38002->37998 38002->37999 38003->38002 38005 444732 38004->38005 38006 444728 DeleteObject 38004->38006 38016 409cc3 38005->38016 38006->38005 38008 412551 38009 4010f9 38008->38009 38010 401130 38009->38010 38011 401134 GetModuleHandleW LoadIconW 38010->38011 38012 401107 wcsncat 38010->38012 38013 40a7be 38011->38013 38012->38010 38014 40a7d2 38013->38014 38014->37940 38014->38014 38015->37934 38019 409bfd memset wcscpy 38016->38019 38018 409cdb CreateFontIndirectW 38018->38008 38019->38018 38020->37953 38022 40aa14 38021->38022 38023 40aa0a ??3@YAXPAX 38021->38023 38022->37956 38023->38022 38024->37953 38025->37948 38027 40a9e7 38026->38027 38028 40a9dc ??3@YAXPAX 38026->38028 38033 4099f4 malloc memcpy ??3@YAXPAX 38027->38033 38029 40a9f3 38028->38029 38032 40a8d0 7 API calls 38029->38032 38031 40a9f2 38031->38029 38032->37955 38033->38031 38058 409bca GetModuleFileNameW 38034->38058 38036 40dce6 wcsrchr 38037 40dcf5 38036->38037 38038 40dcf9 wcscat 38036->38038 38037->38038 38038->37962 38059 44db70 38039->38059 38043 40dbfd 38062 4447d9 38043->38062 38046 40dc34 wcscpy wcscpy 38088 40d6f5 38046->38088 38047 40dc1f wcscpy 38047->38046 38050 40d6f5 3 API calls 38051 40dc73 38050->38051 38052 40d6f5 3 API calls 38051->38052 38053 40dc89 38052->38053 38054 40d6f5 3 API calls 38053->38054 38055 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38054->38055 38094 40da80 38055->38094 38058->38036 38060 40dbb4 memset memset 38059->38060 38061 409bca GetModuleFileNameW 38060->38061 38061->38043 38064 4447f4 38062->38064 38063 40dc1b 38063->38046 38063->38047 38064->38063 38065 444807 ??2@YAPAXI 38064->38065 38066 44481f 38065->38066 38067 444873 _snwprintf 38066->38067 38068 4448ab wcscpy 38066->38068 38101 44474a 8 API calls 38067->38101 38070 4448bb 38068->38070 38102 44474a 8 API calls 38070->38102 38071 4448a7 38071->38068 38071->38070 38073 4448cd 38103 44474a 8 API calls 38073->38103 38075 4448e2 38104 44474a 8 API calls 38075->38104 38077 4448f7 38105 44474a 8 API calls 38077->38105 38079 44490c 38106 44474a 8 API calls 38079->38106 38081 444921 38107 44474a 8 API calls 38081->38107 38083 444936 38108 44474a 8 API calls 38083->38108 38085 44494b 38109 44474a 8 API calls 38085->38109 38087 444960 ??3@YAXPAX 38087->38063 38089 44db70 38088->38089 38090 40d702 memset GetPrivateProfileStringW 38089->38090 38091 40d752 38090->38091 38092 40d75c WritePrivateProfileStringW 38090->38092 38091->38092 38093 40d758 38091->38093 38092->38093 38093->38050 38095 44db70 38094->38095 38096 40da8d memset 38095->38096 38097 40daac LoadStringW 38096->38097 38098 40dac6 38097->38098 38098->38097 38100 40dade 38098->38100 38110 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38098->38110 38100->37889 38101->38071 38102->38073 38103->38075 38104->38077 38105->38079 38106->38081 38107->38083 38108->38085 38109->38087 38110->38098 38121 409b98 GetFileAttributesW 38111->38121 38113 40daea 38114 40db63 38113->38114 38115 40daef wcscpy wcscpy GetPrivateProfileIntW 38113->38115 38114->37891 38122 40d65d GetPrivateProfileStringW 38115->38122 38117 40db3e 38123 40d65d GetPrivateProfileStringW 38117->38123 38119 40db4f 38124 40d65d GetPrivateProfileStringW 38119->38124 38121->38113 38122->38117 38123->38119 38124->38114 38160 40eaff 38125->38160 38129 411ae2 memset 38128->38129 38130 411b8f 38128->38130 38201 409bca GetModuleFileNameW 38129->38201 38142 411a8b 38130->38142 38132 411b0a wcsrchr 38133 411b22 wcscat 38132->38133 38134 411b1f 38132->38134 38202 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38133->38202 38134->38133 38136 411b67 38203 402afb 38136->38203 38140 411b7f 38259 40ea13 SendMessageW memset SendMessageW 38140->38259 38143 402afb 27 API calls 38142->38143 38144 411ac0 38143->38144 38145 4110dc 38144->38145 38146 41113e 38145->38146 38151 4110f0 38145->38151 38284 40969c LoadCursorW SetCursor 38146->38284 38148 411143 38285 4032b4 38148->38285 38303 444a54 38148->38303 38149 4110f7 _wcsicmp 38149->38151 38150 411157 38152 40ada2 _wcsicmp 38150->38152 38151->38146 38151->38149 38306 410c46 10 API calls 38151->38306 38155 411167 38152->38155 38153 4111af 38155->38153 38156 4111a6 qsort 38155->38156 38156->38153 38159->37974 38161 40eb10 38160->38161 38174 40e8e0 38161->38174 38164 40eb6c memcpy memcpy 38165 40ebe1 38164->38165 38168 40ebb7 38164->38168 38165->38164 38166 40ebf2 ??2@YAPAXI ??2@YAPAXI 38165->38166 38167 40ec2e ??2@YAPAXI 38166->38167 38171 40ec65 38166->38171 38167->38171 38168->38165 38170 40d134 16 API calls 38168->38170 38170->38168 38171->38171 38184 40ea7f 38171->38184 38173 402f49 38173->37974 38175 40e8f2 38174->38175 38176 40e8eb ??3@YAXPAX 38174->38176 38177 40e900 38175->38177 38178 40e8f9 ??3@YAXPAX 38175->38178 38176->38175 38179 40e911 38177->38179 38180 40e90a ??3@YAXPAX 38177->38180 38178->38177 38181 40e931 ??2@YAPAXI ??2@YAPAXI 38179->38181 38182 40e921 ??3@YAXPAX 38179->38182 38183 40e92a ??3@YAXPAX 38179->38183 38180->38179 38181->38164 38182->38183 38183->38181 38185 40aa04 ??3@YAXPAX 38184->38185 38186 40ea88 38185->38186 38187 40aa04 ??3@YAXPAX 38186->38187 38188 40ea90 38187->38188 38189 40aa04 ??3@YAXPAX 38188->38189 38190 40ea98 38189->38190 38191 40aa04 ??3@YAXPAX 38190->38191 38192 40eaa0 38191->38192 38193 40a9ce 4 API calls 38192->38193 38194 40eab3 38193->38194 38195 40a9ce 4 API calls 38194->38195 38196 40eabd 38195->38196 38197 40a9ce 4 API calls 38196->38197 38198 40eac7 38197->38198 38199 40a9ce 4 API calls 38198->38199 38200 40ead1 38199->38200 38200->38173 38201->38132 38202->38136 38260 40b2cc 38203->38260 38205 402b0a 38206 40b2cc 27 API calls 38205->38206 38207 402b23 38206->38207 38208 40b2cc 27 API calls 38207->38208 38209 402b3a 38208->38209 38210 40b2cc 27 API calls 38209->38210 38211 402b54 38210->38211 38212 40b2cc 27 API calls 38211->38212 38213 402b6b 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402b82 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402b99 38216->38217 38218 40b2cc 27 API calls 38217->38218 38219 402bb0 38218->38219 38220 40b2cc 27 API calls 38219->38220 38221 402bc7 38220->38221 38222 40b2cc 27 API calls 38221->38222 38223 402bde 38222->38223 38224 40b2cc 27 API calls 38223->38224 38225 402bf5 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402c0c 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402c23 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402c3a 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402c51 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402c68 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402c7f 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402c99 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402cb3 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402cd5 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402cf0 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402d0b 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402d26 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402d3e 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402d59 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402d78 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402d93 38256->38257 38258 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38257->38258 38258->38140 38259->38130 38263 40b58d 38260->38263 38262 40b2d1 38262->38205 38264 40b5a4 GetModuleHandleW FindResourceW 38263->38264 38265 40b62e 38263->38265 38266 40b5c2 LoadResource 38264->38266 38268 40b5e7 38264->38268 38265->38262 38267 40b5d0 SizeofResource LockResource 38266->38267 38266->38268 38267->38268 38268->38265 38276 40afcf 38268->38276 38270 40b608 memcpy 38279 40b4d3 memcpy 38270->38279 38272 40b61e 38280 40b3c1 18 API calls 38272->38280 38274 40b626 38281 40b04b 38274->38281 38277 40b04b ??3@YAXPAX 38276->38277 38278 40afd7 ??2@YAPAXI 38277->38278 38278->38270 38279->38272 38280->38274 38282 40b051 ??3@YAXPAX 38281->38282 38283 40b05f 38281->38283 38282->38283 38283->38265 38284->38148 38286 4032c4 38285->38286 38287 40b633 ??3@YAXPAX 38286->38287 38288 403316 38287->38288 38307 44553b 38288->38307 38292 403480 38503 40368c 15 API calls 38292->38503 38294 403489 38295 40b633 ??3@YAXPAX 38294->38295 38296 403495 38295->38296 38296->38150 38297 4033a9 memset memcpy 38298 4033ec wcscmp 38297->38298 38299 40333c 38297->38299 38298->38299 38299->38292 38299->38297 38299->38298 38501 4028e7 11 API calls 38299->38501 38502 40f508 6 API calls 38299->38502 38301 403421 _wcsicmp 38301->38299 38304 444a64 FreeLibrary 38303->38304 38305 444a83 38303->38305 38304->38305 38305->38150 38306->38151 38308 445548 38307->38308 38309 445599 38308->38309 38504 40c768 38308->38504 38310 4455a8 memset 38309->38310 38317 4457f2 38309->38317 38587 403988 38310->38587 38321 445854 38317->38321 38691 403e2d memset memset memset memset memset 38317->38691 38318 445672 38598 403fbe memset memset memset memset memset 38318->38598 38319 4458bb memset memset 38325 414c2e 16 API calls 38319->38325 38370 4458aa 38321->38370 38714 403c9c memset memset memset memset memset 38321->38714 38323 44595e memset memset 38330 414c2e 16 API calls 38323->38330 38324 4455e5 38324->38318 38333 44560f 38324->38333 38326 4458f9 38325->38326 38331 40b2cc 27 API calls 38326->38331 38328 445a00 memset memset 38737 414c2e 38328->38737 38329 445b22 38335 445bca 38329->38335 38336 445b38 memset memset memset 38329->38336 38340 44599c 38330->38340 38341 445909 38331->38341 38332 44557a 38367 44558c 38332->38367 38786 41366b FreeLibrary 38332->38786 38344 4087b3 338 API calls 38333->38344 38334 445849 38801 40b1ab ??3@YAXPAX ??3@YAXPAX 38334->38801 38342 445c8b memset memset 38335->38342 38409 445cf0 38335->38409 38345 445bd4 38336->38345 38346 445b98 38336->38346 38349 40b2cc 27 API calls 38340->38349 38350 409d1f 6 API calls 38341->38350 38353 414c2e 16 API calls 38342->38353 38343 44589f 38802 40b1ab ??3@YAXPAX ??3@YAXPAX 38343->38802 38351 445621 38344->38351 38359 414c2e 16 API calls 38345->38359 38346->38345 38355 445ba2 38346->38355 38352 4459ac 38349->38352 38363 445919 38350->38363 38787 4454bf 20 API calls 38351->38787 38365 409d1f 6 API calls 38352->38365 38366 445cc9 38353->38366 38874 4099c6 wcslen 38355->38874 38356 4456b2 38789 40b1ab ??3@YAXPAX ??3@YAXPAX 38356->38789 38358 40b2cc 27 API calls 38371 445a4f 38358->38371 38373 445be2 38359->38373 38360 403335 38500 4452e5 45 API calls 38360->38500 38361 445d3d 38393 40b2cc 27 API calls 38361->38393 38362 445d88 memset memset memset 38376 414c2e 16 API calls 38362->38376 38803 409b98 GetFileAttributesW 38363->38803 38364 445823 38364->38334 38375 4087b3 338 API calls 38364->38375 38377 4459bc 38365->38377 38378 409d1f 6 API calls 38366->38378 38571 444b06 38367->38571 38368 445879 38368->38343 38389 4087b3 338 API calls 38368->38389 38370->38319 38394 44594a 38370->38394 38752 409d1f wcslen wcslen 38371->38752 38382 40b2cc 27 API calls 38373->38382 38375->38364 38386 445dde 38376->38386 38870 409b98 GetFileAttributesW 38377->38870 38388 445ce1 38378->38388 38379 445bb3 38877 445403 memset 38379->38877 38380 445680 38380->38356 38621 4087b3 memset 38380->38621 38383 445bf3 38382->38383 38392 409d1f 6 API calls 38383->38392 38384 445928 38384->38394 38804 40b6ef 38384->38804 38395 40b2cc 27 API calls 38386->38395 38894 409b98 GetFileAttributesW 38388->38894 38389->38368 38403 445c07 38392->38403 38404 445d54 _wcsicmp 38393->38404 38394->38323 38408 4459ed 38394->38408 38407 445def 38395->38407 38396 4459cb 38396->38408 38417 40b6ef 252 API calls 38396->38417 38400 40b2cc 27 API calls 38401 445a94 38400->38401 38757 40ae18 38401->38757 38402 44566d 38402->38317 38672 413d4c 38402->38672 38413 445389 258 API calls 38403->38413 38414 445d71 38404->38414 38479 445d67 38404->38479 38406 445665 38788 40b1ab ??3@YAXPAX ??3@YAXPAX 38406->38788 38415 409d1f 6 API calls 38407->38415 38408->38328 38408->38329 38409->38360 38409->38361 38409->38362 38410 445389 258 API calls 38410->38335 38419 445c17 38413->38419 38895 445093 23 API calls 38414->38895 38422 445e03 38415->38422 38417->38408 38418 4456d8 38424 40b2cc 27 API calls 38418->38424 38425 40b2cc 27 API calls 38419->38425 38421 44563c 38421->38406 38427 4087b3 338 API calls 38421->38427 38896 409b98 GetFileAttributesW 38422->38896 38423 40b6ef 252 API calls 38423->38360 38429 4456e2 38424->38429 38430 445c23 38425->38430 38426 445d83 38426->38360 38427->38421 38790 413fa6 _wcsicmp _wcsicmp 38429->38790 38434 409d1f 6 API calls 38430->38434 38432 445e12 38439 445e6b 38432->38439 38445 40b2cc 27 API calls 38432->38445 38437 445c37 38434->38437 38435 445aa1 38438 445b17 38435->38438 38453 445ab2 memset 38435->38453 38466 409d1f 6 API calls 38435->38466 38764 40add4 38435->38764 38769 445389 38435->38769 38778 40ae51 38435->38778 38436 4456eb 38441 4456fd memset memset memset memset 38436->38441 38442 4457ea 38436->38442 38443 445389 258 API calls 38437->38443 38871 40aebe 38438->38871 38898 445093 23 API calls 38439->38898 38791 409c70 wcscpy wcsrchr 38441->38791 38794 413d29 38442->38794 38448 445c47 38443->38448 38449 445e33 38445->38449 38455 40b2cc 27 API calls 38448->38455 38456 409d1f 6 API calls 38449->38456 38451 445e7e 38452 445f67 38451->38452 38461 40b2cc 27 API calls 38452->38461 38457 40b2cc 27 API calls 38453->38457 38459 445c53 38455->38459 38460 445e47 38456->38460 38457->38435 38458 409c70 2 API calls 38462 44577e 38458->38462 38463 409d1f 6 API calls 38459->38463 38897 409b98 GetFileAttributesW 38460->38897 38465 445f73 38461->38465 38467 409c70 2 API calls 38462->38467 38468 445c67 38463->38468 38470 409d1f 6 API calls 38465->38470 38466->38435 38471 44578d 38467->38471 38472 445389 258 API calls 38468->38472 38469 445e56 38469->38439 38475 445e83 memset 38469->38475 38473 445f87 38470->38473 38471->38442 38478 40b2cc 27 API calls 38471->38478 38472->38335 38901 409b98 GetFileAttributesW 38473->38901 38477 40b2cc 27 API calls 38475->38477 38480 445eab 38477->38480 38481 4457a8 38478->38481 38479->38360 38479->38423 38482 409d1f 6 API calls 38480->38482 38483 409d1f 6 API calls 38481->38483 38484 445ebf 38482->38484 38485 4457b8 38483->38485 38486 40ae18 9 API calls 38484->38486 38793 409b98 GetFileAttributesW 38485->38793 38496 445ef5 38486->38496 38488 4457c7 38488->38442 38490 4087b3 338 API calls 38488->38490 38489 40ae51 9 API calls 38489->38496 38490->38442 38491 445f5c 38493 40aebe FindClose 38491->38493 38492 40add4 2 API calls 38492->38496 38493->38452 38494 40b2cc 27 API calls 38494->38496 38495 409d1f 6 API calls 38495->38496 38496->38489 38496->38491 38496->38492 38496->38494 38496->38495 38498 445f3a 38496->38498 38899 409b98 GetFileAttributesW 38496->38899 38900 445093 23 API calls 38498->38900 38500->38299 38501->38301 38502->38299 38503->38294 38505 40c775 38504->38505 38902 40b1ab ??3@YAXPAX ??3@YAXPAX 38505->38902 38507 40c788 38903 40b1ab ??3@YAXPAX ??3@YAXPAX 38507->38903 38509 40c790 38904 40b1ab ??3@YAXPAX ??3@YAXPAX 38509->38904 38511 40c798 38512 40aa04 ??3@YAXPAX 38511->38512 38513 40c7a0 38512->38513 38905 40c274 memset 38513->38905 38518 40a8ab 9 API calls 38519 40c7c3 38518->38519 38520 40a8ab 9 API calls 38519->38520 38521 40c7d0 38520->38521 38934 40c3c3 38521->38934 38525 40c877 38534 40bdb0 38525->38534 38526 40c86c 38962 4053fe 39 API calls 38526->38962 38528 40c7e5 38528->38525 38528->38526 38959 40a706 wcslen memcpy 38528->38959 38961 40c634 49 API calls 38528->38961 38530 40c813 _wcslwr 38960 40c634 49 API calls 38530->38960 38532 40c829 wcslen 38532->38528 39148 404363 38534->39148 38537 40bf5d 39168 40440c 38537->39168 38539 40bdee 38539->38537 38542 40b2cc 27 API calls 38539->38542 38540 40bddf CredEnumerateW 38540->38539 38543 40be02 wcslen 38542->38543 38543->38537 38545 40be1e 38543->38545 38544 40be26 _wcsncoll 38544->38545 38545->38537 38545->38544 38548 40be7d memset 38545->38548 38549 40bea7 memcpy 38545->38549 38550 40bf11 wcschr 38545->38550 38551 40b2cc 27 API calls 38545->38551 38553 40bf43 LocalFree 38545->38553 39171 40bd5d 28 API calls 38545->39171 39172 404423 38545->39172 38548->38545 38548->38549 38549->38545 38549->38550 38550->38545 38552 40bef6 _wcsnicmp 38551->38552 38552->38545 38552->38550 38553->38545 38554 4135f7 39185 4135e0 38554->39185 38557 40b2cc 27 API calls 38558 41360d 38557->38558 38559 40a804 8 API calls 38558->38559 38560 413613 38559->38560 38561 41361b 38560->38561 38562 41363e 38560->38562 38563 40b273 27 API calls 38561->38563 38564 4135e0 FreeLibrary 38562->38564 38565 413625 GetProcAddress 38563->38565 38566 413643 38564->38566 38565->38562 38567 413648 38565->38567 38566->38332 38568 413658 38567->38568 38569 4135e0 FreeLibrary 38567->38569 38568->38332 38570 413666 38569->38570 38570->38332 39188 4449b9 38571->39188 38574 444c1f 38574->38309 38575 4449b9 42 API calls 38577 444b4b 38575->38577 38576 444c15 38579 4449b9 42 API calls 38576->38579 38577->38576 39209 444972 GetVersionExW 38577->39209 38579->38574 38580 444b99 memcmp 38585 444b8c 38580->38585 38581 444c0b 39213 444a85 42 API calls 38581->39213 38585->38580 38585->38581 39210 444aa5 42 API calls 38585->39210 39211 40a7a0 GetVersionExW 38585->39211 39212 444a85 42 API calls 38585->39212 38588 40399d 38587->38588 39214 403a16 38588->39214 38590 403a09 39228 40b1ab ??3@YAXPAX ??3@YAXPAX 38590->39228 38592 403a12 wcsrchr 38592->38324 38593 4039a3 38593->38590 38596 4039f4 38593->38596 39225 40a02c CreateFileW 38593->39225 38596->38590 38597 4099c6 2 API calls 38596->38597 38597->38590 38599 414c2e 16 API calls 38598->38599 38600 404048 38599->38600 38601 414c2e 16 API calls 38600->38601 38602 404056 38601->38602 38603 409d1f 6 API calls 38602->38603 38604 404073 38603->38604 38605 409d1f 6 API calls 38604->38605 38606 40408e 38605->38606 38607 409d1f 6 API calls 38606->38607 38608 4040a6 38607->38608 38609 403af5 20 API calls 38608->38609 38610 4040ba 38609->38610 38611 403af5 20 API calls 38610->38611 38612 4040cb 38611->38612 39255 40414f memset 38612->39255 38614 404140 39269 40b1ab ??3@YAXPAX ??3@YAXPAX 38614->39269 38616 4040ec memset 38619 4040e0 38616->38619 38617 404148 38617->38380 38618 4099c6 2 API calls 38618->38619 38619->38614 38619->38616 38619->38618 38620 40a8ab 9 API calls 38619->38620 38620->38619 39282 40a6e6 WideCharToMultiByte 38621->39282 38623 4087ed 39283 4095d9 memset 38623->39283 38626 408953 38626->38380 38627 408809 memset memset memset memset memset 38628 40b2cc 27 API calls 38627->38628 38629 4088a1 38628->38629 38630 409d1f 6 API calls 38629->38630 38631 4088b1 38630->38631 38632 40b2cc 27 API calls 38631->38632 38633 4088c0 38632->38633 38634 409d1f 6 API calls 38633->38634 38635 4088d0 38634->38635 38636 40b2cc 27 API calls 38635->38636 38637 4088df 38636->38637 38638 409d1f 6 API calls 38637->38638 38639 4088ef 38638->38639 38640 40b2cc 27 API calls 38639->38640 38641 4088fe 38640->38641 38642 409d1f 6 API calls 38641->38642 38643 40890e 38642->38643 38644 40b2cc 27 API calls 38643->38644 38645 40891d 38644->38645 38646 409d1f 6 API calls 38645->38646 38647 40892d 38646->38647 39302 409b98 GetFileAttributesW 38647->39302 38649 40893e 38650 408943 38649->38650 38651 408958 38649->38651 39303 407fdf 75 API calls 38650->39303 39304 409b98 GetFileAttributesW 38651->39304 38654 408964 38655 408969 38654->38655 38656 40897b 38654->38656 39305 4082c7 199 API calls 38655->39305 39306 409b98 GetFileAttributesW 38656->39306 38659 408987 38660 4089a1 38659->38660 38661 40898c 38659->38661 39308 409b98 GetFileAttributesW 38660->39308 39307 408560 29 API calls 38661->39307 38664 4089ad 38665 4089b2 38664->38665 38666 4089c7 38664->38666 38673 40b633 ??3@YAXPAX 38672->38673 38674 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38673->38674 38675 413f00 Process32NextW 38674->38675 38676 413da5 OpenProcess 38675->38676 38677 413f17 FindCloseChangeNotification 38675->38677 38678 413df3 memset 38676->38678 38686 413eb0 38676->38686 38677->38418 39582 413f27 38678->39582 38680 413ec8 38680->38686 39587 4099f4 malloc memcpy ??3@YAXPAX 38680->39587 38681 413ebf ??3@YAXPAX 38681->38686 38682 413e1f 38684 413e6a 38682->38684 38685 413e37 GetModuleHandleW 38682->38685 39585 413959 14 API calls 38684->39585 39586 413ca4 GetModuleHandleW GetProcAddress 38684->39586 38685->38682 38688 413e46 GetProcAddress 38685->38688 38686->38675 38686->38680 38686->38681 38688->38682 38690 413ea2 CloseHandle 38690->38686 38692 414c2e 16 API calls 38691->38692 38693 403eb7 38692->38693 38694 414c2e 16 API calls 38693->38694 38695 403ec5 38694->38695 38696 409d1f 6 API calls 38695->38696 38697 403ee2 38696->38697 38698 409d1f 6 API calls 38697->38698 38699 403efd 38698->38699 38700 409d1f 6 API calls 38699->38700 38701 403f15 38700->38701 38702 403af5 20 API calls 38701->38702 38703 403f29 38702->38703 38704 403af5 20 API calls 38703->38704 38705 403f3a 38704->38705 38706 40414f 33 API calls 38705->38706 38707 403f4f 38706->38707 38708 403faf 38707->38708 38710 403f5b memset 38707->38710 38712 4099c6 2 API calls 38707->38712 38713 40a8ab 9 API calls 38707->38713 39593 40b1ab ??3@YAXPAX ??3@YAXPAX 38708->39593 38710->38707 38711 403fb7 38711->38364 38712->38707 38713->38707 38715 414c2e 16 API calls 38714->38715 38716 403d26 38715->38716 38717 414c2e 16 API calls 38716->38717 38718 403d34 38717->38718 38719 409d1f 6 API calls 38718->38719 38720 403d51 38719->38720 38721 409d1f 6 API calls 38720->38721 38722 403d6c 38721->38722 38723 409d1f 6 API calls 38722->38723 38724 403d84 38723->38724 38725 403af5 20 API calls 38724->38725 38726 403d98 38725->38726 38727 403af5 20 API calls 38726->38727 38728 403da9 38727->38728 38729 40414f 33 API calls 38728->38729 38730 403dbe 38729->38730 38731 403e1e 38730->38731 38732 403dca memset 38730->38732 38735 4099c6 2 API calls 38730->38735 38736 40a8ab 9 API calls 38730->38736 39594 40b1ab ??3@YAXPAX ??3@YAXPAX 38731->39594 38732->38730 38734 403e26 38734->38368 38735->38730 38736->38730 38738 414b81 9 API calls 38737->38738 38739 414c40 38738->38739 38740 414c73 memset 38739->38740 39595 409cea 38739->39595 38741 414c94 38740->38741 39598 414592 RegOpenKeyExW 38741->39598 38744 414c64 38744->38358 38746 414cc1 38747 414cf4 wcscpy 38746->38747 39599 414bb0 wcscpy 38746->39599 38747->38744 38749 414cd2 39600 4145ac RegQueryValueExW 38749->39600 38751 414ce9 RegCloseKey 38751->38747 38753 409d62 38752->38753 38754 409d43 wcscpy 38752->38754 38753->38400 38755 409719 2 API calls 38754->38755 38756 409d51 wcscat 38755->38756 38756->38753 38758 40aebe FindClose 38757->38758 38759 40ae21 38758->38759 38760 4099c6 2 API calls 38759->38760 38761 40ae35 38760->38761 38762 409d1f 6 API calls 38761->38762 38763 40ae49 38762->38763 38763->38435 38765 40ade0 38764->38765 38766 40ae0f 38764->38766 38765->38766 38767 40ade7 wcscmp 38765->38767 38766->38435 38767->38766 38768 40adfe wcscmp 38767->38768 38768->38766 38770 40ae18 9 API calls 38769->38770 38776 4453c4 38770->38776 38771 40ae51 9 API calls 38771->38776 38772 4453f3 38774 40aebe FindClose 38772->38774 38773 40add4 2 API calls 38773->38776 38775 4453fe 38774->38775 38775->38435 38776->38771 38776->38772 38776->38773 38777 445403 253 API calls 38776->38777 38777->38776 38779 40ae7b FindNextFileW 38778->38779 38780 40ae5c FindFirstFileW 38778->38780 38781 40ae94 38779->38781 38782 40ae8f 38779->38782 38780->38781 38784 40aeb6 38781->38784 38785 409d1f 6 API calls 38781->38785 38783 40aebe FindClose 38782->38783 38783->38781 38784->38435 38785->38784 38786->38367 38787->38421 38788->38402 38789->38402 38790->38436 38792 409c89 38791->38792 38792->38458 38793->38488 38795 413d39 38794->38795 38796 413d2f FreeLibrary 38794->38796 38797 40b633 ??3@YAXPAX 38795->38797 38796->38795 38798 413d42 38797->38798 38799 40b633 ??3@YAXPAX 38798->38799 38800 413d4a 38799->38800 38800->38317 38801->38321 38802->38370 38803->38384 38805 44db70 38804->38805 38806 40b6fc memset 38805->38806 38807 409c70 2 API calls 38806->38807 38808 40b732 wcsrchr 38807->38808 38809 40b743 38808->38809 38810 40b746 memset 38808->38810 38809->38810 38811 40b2cc 27 API calls 38810->38811 38812 40b76f 38811->38812 38813 409d1f 6 API calls 38812->38813 38814 40b783 38813->38814 39601 409b98 GetFileAttributesW 38814->39601 38816 40b792 38817 40b7c2 38816->38817 38818 409c70 2 API calls 38816->38818 39602 40bb98 38817->39602 38820 40b7a5 38818->38820 38822 40b2cc 27 API calls 38820->38822 38826 40b7b2 38822->38826 38823 40b837 FindCloseChangeNotification 38825 40b83e memset 38823->38825 38824 40b817 39636 409a45 GetTempPathW 38824->39636 39635 40a6e6 WideCharToMultiByte 38825->39635 38829 409d1f 6 API calls 38826->38829 38829->38817 38830 40b827 CopyFileW 38830->38825 38831 40b866 38832 444432 121 API calls 38831->38832 38833 40b879 38832->38833 38834 40bad5 38833->38834 38835 40b273 27 API calls 38833->38835 38836 40baeb 38834->38836 38837 40bade DeleteFileW 38834->38837 38838 40b89a 38835->38838 38839 40b04b ??3@YAXPAX 38836->38839 38837->38836 38840 438552 134 API calls 38838->38840 38841 40baf3 38839->38841 38842 40b8a4 38840->38842 38841->38394 38843 40bacd 38842->38843 38845 4251c4 137 API calls 38842->38845 38844 443d90 111 API calls 38843->38844 38844->38834 38868 40b8b8 38845->38868 38846 40bac6 39648 424f26 123 API calls 38846->39648 38847 40b8bd memset 39639 425413 17 API calls 38847->39639 38850 425413 17 API calls 38850->38868 38853 40a71b MultiByteToWideChar 38853->38868 38854 40a734 MultiByteToWideChar 38854->38868 38857 40b9b5 memcmp 38857->38868 38858 4099c6 2 API calls 38858->38868 38859 404423 37 API calls 38859->38868 38861 40bb3e memset memcpy 39649 40a734 MultiByteToWideChar 38861->39649 38862 4251c4 137 API calls 38862->38868 38865 40bb88 LocalFree 38865->38868 38868->38846 38868->38847 38868->38850 38868->38853 38868->38854 38868->38857 38868->38858 38868->38859 38868->38861 38868->38862 38869 40ba5f memcmp 38868->38869 39640 4253ef 16 API calls 38868->39640 39641 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38868->39641 39642 4253af 17 API calls 38868->39642 39643 4253cf 17 API calls 38868->39643 39644 447280 memset 38868->39644 39645 447960 memset memcpy memcpy memcpy 38868->39645 39646 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38868->39646 39647 447920 memcpy memcpy memcpy 38868->39647 38869->38868 38870->38396 38872 40aed1 38871->38872 38873 40aec7 FindClose 38871->38873 38872->38329 38873->38872 38875 4099d7 38874->38875 38876 4099da memcpy 38874->38876 38875->38876 38876->38379 38878 40b2cc 27 API calls 38877->38878 38879 44543f 38878->38879 38880 409d1f 6 API calls 38879->38880 38881 44544f 38880->38881 39738 409b98 GetFileAttributesW 38881->39738 38883 44545e 38884 445476 38883->38884 38885 40b6ef 252 API calls 38883->38885 38886 40b2cc 27 API calls 38884->38886 38885->38884 38887 445482 38886->38887 38888 409d1f 6 API calls 38887->38888 38889 445492 38888->38889 39739 409b98 GetFileAttributesW 38889->39739 38891 4454a1 38892 4454b9 38891->38892 38893 40b6ef 252 API calls 38891->38893 38892->38410 38893->38892 38894->38409 38895->38426 38896->38432 38897->38469 38898->38451 38899->38496 38900->38496 38901->38479 38902->38507 38903->38509 38904->38511 38906 414c2e 16 API calls 38905->38906 38907 40c2ae 38906->38907 38963 40c1d3 38907->38963 38912 40c3be 38929 40a8ab 38912->38929 38913 40afcf 2 API calls 38914 40c2fd FindFirstUrlCacheEntryW 38913->38914 38915 40c3b6 38914->38915 38916 40c31e wcschr 38914->38916 38917 40b04b ??3@YAXPAX 38915->38917 38918 40c331 38916->38918 38919 40c35e FindNextUrlCacheEntryW 38916->38919 38917->38912 38920 40a8ab 9 API calls 38918->38920 38919->38916 38921 40c373 GetLastError 38919->38921 38924 40c33e wcschr 38920->38924 38922 40c3ad FindCloseUrlCache 38921->38922 38923 40c37e 38921->38923 38922->38915 38925 40afcf 2 API calls 38923->38925 38924->38919 38926 40c34f 38924->38926 38927 40c391 FindNextUrlCacheEntryW 38925->38927 38928 40a8ab 9 API calls 38926->38928 38927->38916 38927->38922 38928->38919 39079 40a97a 38929->39079 38932 40a8cc 38932->38518 39085 40b1ab ??3@YAXPAX ??3@YAXPAX 38934->39085 38936 40c3dd 38937 40b2cc 27 API calls 38936->38937 38938 40c3e7 38937->38938 39086 414592 RegOpenKeyExW 38938->39086 38940 40c3f4 38941 40c50e 38940->38941 38942 40c3ff 38940->38942 38956 405337 38941->38956 38943 40a9ce 4 API calls 38942->38943 38944 40c418 memset 38943->38944 39087 40aa1d 38944->39087 38947 40c471 38949 40c47a _wcsupr 38947->38949 38948 40c505 RegCloseKey 38948->38941 39089 40a8d0 7 API calls 38949->39089 38951 40c498 39090 40a8d0 7 API calls 38951->39090 38953 40c4ac memset 38954 40aa1d 38953->38954 38955 40c4e4 RegEnumValueW 38954->38955 38955->38948 38955->38949 39091 405220 38956->39091 38959->38530 38960->38532 38961->38528 38962->38525 38964 40ae18 9 API calls 38963->38964 38970 40c210 38964->38970 38965 40ae51 9 API calls 38965->38970 38966 40c264 38967 40aebe FindClose 38966->38967 38969 40c26f 38967->38969 38968 40add4 2 API calls 38968->38970 38975 40e5ed memset memset 38969->38975 38970->38965 38970->38966 38970->38968 38971 40c231 _wcsicmp 38970->38971 38972 40c1d3 35 API calls 38970->38972 38971->38970 38973 40c248 38971->38973 38972->38970 38988 40c084 22 API calls 38973->38988 38976 414c2e 16 API calls 38975->38976 38977 40e63f 38976->38977 38978 409d1f 6 API calls 38977->38978 38979 40e658 38978->38979 38989 409b98 GetFileAttributesW 38979->38989 38981 40e667 38982 40e680 38981->38982 38984 409d1f 6 API calls 38981->38984 38990 409b98 GetFileAttributesW 38982->38990 38984->38982 38985 40e68f 38986 40c2d8 38985->38986 38991 40e4b2 38985->38991 38986->38912 38986->38913 38988->38970 38989->38981 38990->38985 39012 40e01e 38991->39012 38993 40e593 38995 40e5b0 38993->38995 38996 40e59c DeleteFileW 38993->38996 38994 40e521 38994->38993 39035 40e175 38994->39035 38997 40b04b ??3@YAXPAX 38995->38997 38996->38995 38998 40e5bb 38997->38998 39000 40e5c4 CloseHandle 38998->39000 39001 40e5cc 38998->39001 39000->39001 39003 40b633 ??3@YAXPAX 39001->39003 39002 40e573 39004 40e584 39002->39004 39005 40e57c FindCloseChangeNotification 39002->39005 39006 40e5db 39003->39006 39078 40b1ab ??3@YAXPAX ??3@YAXPAX 39004->39078 39005->39004 39009 40b633 ??3@YAXPAX 39006->39009 39008 40e540 39008->39002 39055 40e2ab 39008->39055 39010 40e5e3 39009->39010 39010->38986 39013 406214 22 API calls 39012->39013 39014 40e03c 39013->39014 39015 40e16b 39014->39015 39016 40dd85 72 API calls 39014->39016 39015->38994 39017 40e06b 39016->39017 39017->39015 39018 40afcf ??2@YAPAXI ??3@YAXPAX 39017->39018 39019 40e08d OpenProcess 39018->39019 39020 40e0a4 GetCurrentProcess DuplicateHandle 39019->39020 39024 40e152 39019->39024 39021 40e0d0 GetFileSize 39020->39021 39022 40e14a CloseHandle 39020->39022 39025 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39021->39025 39022->39024 39023 40e160 39027 40b04b ??3@YAXPAX 39023->39027 39024->39023 39026 406214 22 API calls 39024->39026 39028 40e0ea 39025->39028 39026->39023 39027->39015 39029 4096dc CreateFileW 39028->39029 39030 40e0f1 CreateFileMappingW 39029->39030 39031 40e140 CloseHandle CloseHandle 39030->39031 39032 40e10b MapViewOfFile 39030->39032 39031->39022 39033 40e13b FindCloseChangeNotification 39032->39033 39034 40e11f WriteFile UnmapViewOfFile 39032->39034 39033->39031 39034->39033 39036 40e18c 39035->39036 39037 406b90 11 API calls 39036->39037 39038 40e19f 39037->39038 39039 40e1a7 memset 39038->39039 39040 40e299 39038->39040 39045 40e1e8 39039->39045 39041 4069a3 ??3@YAXPAX ??3@YAXPAX 39040->39041 39042 40e2a4 39041->39042 39042->39008 39043 406e8f 13 API calls 39043->39045 39044 406b53 SetFilePointerEx ReadFile 39044->39045 39045->39043 39045->39044 39046 40e283 39045->39046 39047 40dd50 _wcsicmp 39045->39047 39051 40742e 8 API calls 39045->39051 39052 40aae3 wcslen wcslen _memicmp 39045->39052 39053 40e244 _snwprintf 39045->39053 39048 40e291 39046->39048 39049 40e288 ??3@YAXPAX 39046->39049 39047->39045 39050 40aa04 ??3@YAXPAX 39048->39050 39049->39048 39050->39040 39051->39045 39052->39045 39054 40a8d0 7 API calls 39053->39054 39054->39045 39056 40e2c2 39055->39056 39057 406b90 11 API calls 39056->39057 39068 40e2d3 39057->39068 39058 40e4a0 39059 4069a3 ??3@YAXPAX ??3@YAXPAX 39058->39059 39061 40e4ab 39059->39061 39060 406e8f 13 API calls 39060->39068 39061->39008 39062 406b53 SetFilePointerEx ReadFile 39062->39068 39063 40e489 39064 40aa04 ??3@YAXPAX 39063->39064 39065 40e491 39064->39065 39065->39058 39066 40e497 ??3@YAXPAX 39065->39066 39066->39058 39067 40dd50 _wcsicmp 39067->39068 39068->39058 39068->39060 39068->39062 39068->39063 39068->39067 39069 40dd50 _wcsicmp 39068->39069 39072 40742e 8 API calls 39068->39072 39073 40e3e0 memcpy 39068->39073 39074 40e3b3 wcschr 39068->39074 39075 40e3fb memcpy 39068->39075 39076 40e416 memcpy 39068->39076 39077 40e431 memcpy 39068->39077 39070 40e376 memset 39069->39070 39071 40aa29 6 API calls 39070->39071 39071->39068 39072->39068 39073->39068 39074->39068 39075->39068 39076->39068 39077->39068 39078->38993 39081 40a980 39079->39081 39080 40a8bb 39080->38932 39084 40a8d0 7 API calls 39080->39084 39081->39080 39082 40a995 _wcsicmp 39081->39082 39083 40a99c wcscmp 39081->39083 39082->39081 39083->39081 39084->38932 39085->38936 39086->38940 39088 40aa23 RegEnumValueW 39087->39088 39088->38947 39088->38948 39089->38951 39090->38953 39092 405335 39091->39092 39093 40522a 39091->39093 39092->38528 39094 40b2cc 27 API calls 39093->39094 39095 405234 39094->39095 39096 40a804 8 API calls 39095->39096 39097 40523a 39096->39097 39136 40b273 39097->39136 39099 405248 _mbscpy _mbscat GetProcAddress 39100 40b273 27 API calls 39099->39100 39101 405279 39100->39101 39139 405211 GetProcAddress 39101->39139 39103 405282 39104 40b273 27 API calls 39103->39104 39105 40528f 39104->39105 39140 405211 GetProcAddress 39105->39140 39107 405298 39108 40b273 27 API calls 39107->39108 39109 4052a5 39108->39109 39141 405211 GetProcAddress 39109->39141 39111 4052ae 39112 40b273 27 API calls 39111->39112 39113 4052bb 39112->39113 39142 405211 GetProcAddress 39113->39142 39115 4052c4 39116 40b273 27 API calls 39115->39116 39117 4052d1 39116->39117 39143 405211 GetProcAddress 39117->39143 39119 4052da 39120 40b273 27 API calls 39119->39120 39121 4052e7 39120->39121 39144 405211 GetProcAddress 39121->39144 39123 4052f0 39124 40b273 27 API calls 39123->39124 39125 4052fd 39124->39125 39145 405211 GetProcAddress 39125->39145 39127 405306 39128 40b273 27 API calls 39127->39128 39129 405313 39128->39129 39146 405211 GetProcAddress 39129->39146 39131 40531c 39132 40b273 27 API calls 39131->39132 39133 405329 39132->39133 39147 405211 GetProcAddress 39133->39147 39135 405332 39135->39092 39137 40b58d 27 API calls 39136->39137 39138 40b18c 39137->39138 39138->39099 39139->39103 39140->39107 39141->39111 39142->39115 39143->39119 39144->39123 39145->39127 39146->39131 39147->39135 39149 40440c FreeLibrary 39148->39149 39150 40436d 39149->39150 39151 40a804 8 API calls 39150->39151 39152 404377 39151->39152 39153 404383 39152->39153 39154 404405 39152->39154 39155 40b273 27 API calls 39153->39155 39154->38537 39154->38539 39154->38540 39156 40438d GetProcAddress 39155->39156 39157 40b273 27 API calls 39156->39157 39158 4043a7 GetProcAddress 39157->39158 39159 40b273 27 API calls 39158->39159 39160 4043ba GetProcAddress 39159->39160 39161 40b273 27 API calls 39160->39161 39162 4043ce GetProcAddress 39161->39162 39163 40b273 27 API calls 39162->39163 39164 4043e2 GetProcAddress 39163->39164 39165 4043f1 39164->39165 39166 4043f7 39165->39166 39167 40440c FreeLibrary 39165->39167 39166->39154 39167->39154 39169 404413 FreeLibrary 39168->39169 39170 40441e 39168->39170 39169->39170 39170->38554 39171->38545 39173 40442e 39172->39173 39174 40447e 39172->39174 39175 40b2cc 27 API calls 39173->39175 39174->38545 39176 404438 39175->39176 39177 40a804 8 API calls 39176->39177 39178 40443e 39177->39178 39179 404445 39178->39179 39180 404467 39178->39180 39181 40b273 27 API calls 39179->39181 39180->39174 39182 404475 FreeLibrary 39180->39182 39183 40444f GetProcAddress 39181->39183 39182->39174 39183->39180 39184 404460 39183->39184 39184->39180 39186 4135f6 39185->39186 39187 4135eb FreeLibrary 39185->39187 39186->38557 39187->39186 39189 4449c4 39188->39189 39190 444a52 39188->39190 39191 40b2cc 27 API calls 39189->39191 39190->38574 39190->38575 39192 4449cb 39191->39192 39193 40a804 8 API calls 39192->39193 39194 4449d1 39193->39194 39195 40b273 27 API calls 39194->39195 39196 4449dc GetProcAddress 39195->39196 39197 40b273 27 API calls 39196->39197 39198 4449f3 GetProcAddress 39197->39198 39199 40b273 27 API calls 39198->39199 39200 444a04 GetProcAddress 39199->39200 39201 40b273 27 API calls 39200->39201 39202 444a15 GetProcAddress 39201->39202 39203 40b273 27 API calls 39202->39203 39204 444a26 GetProcAddress 39203->39204 39205 40b273 27 API calls 39204->39205 39206 444a37 GetProcAddress 39205->39206 39207 40b273 27 API calls 39206->39207 39208 444a48 GetProcAddress 39207->39208 39208->39190 39209->38585 39210->38585 39211->38585 39212->38585 39213->38576 39215 403a29 39214->39215 39229 403bed memset memset 39215->39229 39217 403ae7 39242 40b1ab ??3@YAXPAX ??3@YAXPAX 39217->39242 39218 403a3f memset 39224 403a2f 39218->39224 39220 403aef 39220->38593 39221 409b98 GetFileAttributesW 39221->39224 39222 40a8d0 7 API calls 39222->39224 39223 409d1f 6 API calls 39223->39224 39224->39217 39224->39218 39224->39221 39224->39222 39224->39223 39226 40a051 GetFileTime FindCloseChangeNotification 39225->39226 39227 4039ca CompareFileTime 39225->39227 39226->39227 39227->38593 39228->38592 39230 414c2e 16 API calls 39229->39230 39231 403c38 39230->39231 39232 409719 2 API calls 39231->39232 39233 403c3f wcscat 39232->39233 39234 414c2e 16 API calls 39233->39234 39235 403c61 39234->39235 39236 409719 2 API calls 39235->39236 39237 403c68 wcscat 39236->39237 39243 403af5 39237->39243 39240 403af5 20 API calls 39241 403c95 39240->39241 39241->39224 39242->39220 39244 403b02 39243->39244 39245 40ae18 9 API calls 39244->39245 39253 403b37 39245->39253 39246 403bdb 39248 40aebe FindClose 39246->39248 39247 40add4 wcscmp wcscmp 39247->39253 39249 403be6 39248->39249 39249->39240 39250 40ae18 9 API calls 39250->39253 39251 40ae51 9 API calls 39251->39253 39252 40aebe FindClose 39252->39253 39253->39246 39253->39247 39253->39250 39253->39251 39253->39252 39254 40a8d0 7 API calls 39253->39254 39254->39253 39256 409d1f 6 API calls 39255->39256 39257 404190 39256->39257 39270 409b98 GetFileAttributesW 39257->39270 39259 40419c 39260 4041a7 6 API calls 39259->39260 39261 40435c 39259->39261 39263 40424f 39260->39263 39261->38619 39263->39261 39264 40425e memset 39263->39264 39266 409d1f 6 API calls 39263->39266 39267 40a8ab 9 API calls 39263->39267 39271 414842 39263->39271 39264->39263 39265 404296 wcscpy 39264->39265 39265->39263 39266->39263 39268 4042b6 memset memset _snwprintf wcscpy 39267->39268 39268->39263 39269->38617 39270->39259 39274 41443e 39271->39274 39273 414866 39273->39263 39275 41444b 39274->39275 39276 414451 39275->39276 39277 4144a3 GetPrivateProfileStringW 39275->39277 39278 414491 39276->39278 39279 414455 wcschr 39276->39279 39277->39273 39280 414495 WritePrivateProfileStringW 39278->39280 39279->39278 39281 414463 _snwprintf 39279->39281 39280->39273 39281->39280 39282->38623 39284 40b2cc 27 API calls 39283->39284 39285 409615 39284->39285 39286 409d1f 6 API calls 39285->39286 39287 409625 39286->39287 39312 409b98 GetFileAttributesW 39287->39312 39289 409634 39290 409648 39289->39290 39313 4091b8 memset 39289->39313 39292 40b2cc 27 API calls 39290->39292 39294 408801 39290->39294 39293 40965d 39292->39293 39295 409d1f 6 API calls 39293->39295 39294->38626 39294->38627 39296 40966d 39295->39296 39365 409b98 GetFileAttributesW 39296->39365 39298 40967c 39298->39294 39299 409681 39298->39299 39366 409529 72 API calls 39299->39366 39301 409690 39301->39294 39302->38649 39303->38626 39304->38654 39305->38626 39306->38659 39307->38660 39308->38664 39312->39289 39367 40a6e6 WideCharToMultiByte 39313->39367 39315 409202 39368 444432 39315->39368 39318 40b273 27 API calls 39319 409236 39318->39319 39414 438552 39319->39414 39322 409383 39324 40b273 27 API calls 39322->39324 39326 409399 39324->39326 39325 409254 39327 40937b 39325->39327 39435 4253cf 17 API calls 39325->39435 39328 438552 134 API calls 39326->39328 39439 424f26 123 API calls 39327->39439 39346 4093a3 39328->39346 39331 409267 39436 4253cf 17 API calls 39331->39436 39332 4094ff 39443 443d90 39332->39443 39335 4251c4 137 API calls 39335->39346 39336 409273 39437 4253af 17 API calls 39336->39437 39337 409507 39345 40951d 39337->39345 39463 408f2f 77 API calls 39337->39463 39339 4093df 39442 424f26 123 API calls 39339->39442 39340 40927f 39438 4253af 17 API calls 39340->39438 39343 4253cf 17 API calls 39343->39346 39345->39290 39346->39332 39346->39335 39346->39339 39346->39343 39348 4093e4 39346->39348 39440 4253af 17 API calls 39348->39440 39355 4093ed 39441 4253af 17 API calls 39355->39441 39358 4093f9 39358->39339 39359 409409 memcmp 39358->39359 39359->39339 39360 409421 memcmp 39359->39360 39361 4094a4 memcmp 39360->39361 39362 409435 39360->39362 39361->39339 39364 4094b8 memcpy memcpy 39361->39364 39362->39339 39363 409442 memcpy memcpy memcpy 39362->39363 39363->39339 39364->39339 39365->39298 39366->39301 39367->39315 39464 4438b5 39368->39464 39370 44444c 39376 409215 39370->39376 39478 415a6d 39370->39478 39373 444486 39375 4444b9 memcpy 39373->39375 39413 4444a4 39373->39413 39374 44469e 39374->39376 39378 443d90 111 API calls 39374->39378 39482 415258 39375->39482 39376->39318 39376->39345 39378->39376 39379 444524 39380 444541 39379->39380 39381 44452a 39379->39381 39485 444316 39380->39485 39519 416935 39381->39519 39385 444316 18 API calls 39386 444563 39385->39386 39387 444316 18 API calls 39386->39387 39388 44456f 39387->39388 39389 444316 18 API calls 39388->39389 39390 44457f 39389->39390 39390->39413 39499 432d4e 39390->39499 39393 444316 18 API calls 39394 4445b0 39393->39394 39503 41eed2 39394->39503 39532 4442e6 11 API calls 39413->39532 39533 438460 39414->39533 39416 409240 39416->39322 39417 4251c4 39416->39417 39545 424f07 39417->39545 39419 4251e4 39420 4251f7 39419->39420 39421 4251e8 39419->39421 39553 4250f8 39420->39553 39552 4446ea 11 API calls 39421->39552 39423 4251f2 39423->39325 39425 425209 39428 425249 39425->39428 39431 4250f8 127 API calls 39425->39431 39432 425287 39425->39432 39561 4384e9 135 API calls 39425->39561 39562 424f74 124 API calls 39425->39562 39428->39432 39563 424ff0 13 API calls 39428->39563 39431->39425 39565 415c7d 16 API calls 39432->39565 39433 425266 39433->39432 39564 415be9 memcpy 39433->39564 39435->39331 39436->39336 39437->39340 39439->39322 39440->39355 39441->39358 39442->39332 39444 443da3 39443->39444 39445 443db6 39443->39445 39566 41707a 39444->39566 39445->39337 39447 443da8 39448 443dbc 39447->39448 39449 443dac 39447->39449 39571 4300e8 39448->39571 39579 4446ea 11 API calls 39449->39579 39452 443de0 39454 443dce 39454->39452 39458 443e22 39454->39458 39455 443e5a 39458->39455 39463->39345 39465 4438d0 39464->39465 39476 4438c9 39464->39476 39466 415378 memcpy memcpy 39465->39466 39467 4438d5 39466->39467 39468 4154e2 10 API calls 39467->39468 39469 443906 39467->39469 39467->39476 39468->39469 39470 443970 memset 39469->39470 39469->39476 39473 44398b 39470->39473 39471 4439a0 39472 415700 10 API calls 39471->39472 39471->39476 39474 4439c0 39472->39474 39473->39471 39475 41975c 10 API calls 39473->39475 39474->39476 39477 418981 10 API calls 39474->39477 39475->39471 39476->39370 39477->39476 39479 415a77 39478->39479 39480 415a8d 39479->39480 39481 415a7e memset 39479->39481 39480->39373 39481->39480 39483 4438b5 11 API calls 39482->39483 39484 41525d 39483->39484 39484->39379 39486 444328 39485->39486 39487 444423 39486->39487 39488 44434e 39486->39488 39489 4446ea 11 API calls 39487->39489 39490 432d4e memset memset memcpy 39488->39490 39496 444381 39489->39496 39491 44435a 39490->39491 39493 444375 39491->39493 39498 44438b 39491->39498 39492 432d4e memset memset memcpy 39494 4443ec 39492->39494 39495 416935 16 API calls 39493->39495 39494->39496 39497 416935 16 API calls 39494->39497 39495->39496 39496->39385 39497->39496 39498->39492 39500 432d65 39499->39500 39501 432d58 39499->39501 39500->39393 39502 432cc4 memset memset memcpy 39501->39502 39502->39500 39504 41eee2 39503->39504 39505 415a6d memset 39504->39505 39506 41ef23 39505->39506 39520 41693e 39519->39520 39526 41698e 39519->39526 39521 41694c 39520->39521 39522 422fd1 memset 39520->39522 39523 4165a0 11 API calls 39521->39523 39521->39526 39522->39521 39524 416972 39523->39524 39525 422b84 15 API calls 39524->39525 39524->39526 39525->39526 39526->39413 39532->39374 39534 41703f 11 API calls 39533->39534 39535 43847a 39534->39535 39536 43848a 39535->39536 39537 43847e 39535->39537 39539 438270 134 API calls 39536->39539 39538 4446ea 11 API calls 39537->39538 39541 438488 39538->39541 39540 4384aa 39539->39540 39540->39541 39542 424f26 123 API calls 39540->39542 39541->39416 39543 4384bb 39542->39543 39544 438270 134 API calls 39543->39544 39544->39541 39546 424f1f 39545->39546 39547 424f0c 39545->39547 39549 424eea 11 API calls 39546->39549 39548 416760 11 API calls 39547->39548 39550 424f18 39548->39550 39551 424f24 39549->39551 39550->39419 39551->39419 39552->39423 39554 425108 39553->39554 39560 42510d 39553->39560 39555 424f74 124 API calls 39554->39555 39555->39560 39556 42569b 125 API calls 39557 42516e 39556->39557 39559 415c7d 16 API calls 39557->39559 39558 425115 39558->39425 39559->39558 39560->39556 39560->39558 39561->39425 39562->39425 39563->39433 39564->39432 39565->39423 39567 417085 39566->39567 39568 4170ab 39566->39568 39567->39568 39569 416760 11 API calls 39567->39569 39568->39447 39570 4170a4 39569->39570 39570->39447 39572 430128 39571->39572 39575 4300fa 39571->39575 39574 430196 memset 39572->39574 39573 432f8c memset 39573->39575 39576 4301bc 39574->39576 39578 4301de 39574->39578 39575->39572 39575->39573 39575->39578 39577 4301c9 memcpy 39576->39577 39576->39578 39577->39578 39578->39454 39579->39445 39588 413f4f 39582->39588 39585->38684 39586->38690 39587->38680 39589 413f2f 39588->39589 39590 413f54 39588->39590 39589->38682 39591 40a804 8 API calls 39590->39591 39592 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39591->39592 39592->39589 39593->38711 39594->38734 39596 409cf9 GetVersionExW 39595->39596 39597 409d0a 39595->39597 39596->39597 39597->38740 39597->38744 39598->38746 39599->38749 39600->38751 39601->38816 39603 40bba5 39602->39603 39650 40cc26 39603->39650 39606 40bd4b 39671 40cc0c 39606->39671 39611 40b2cc 27 API calls 39612 40bbef 39611->39612 39678 40ccf0 _wcsicmp 39612->39678 39614 40bbf5 39614->39606 39679 40ccb4 6 API calls 39614->39679 39616 40bc26 39617 40cf04 17 API calls 39616->39617 39618 40bc2e 39617->39618 39619 40bd43 39618->39619 39620 40b2cc 27 API calls 39618->39620 39621 40cc0c 4 API calls 39619->39621 39622 40bc40 39620->39622 39621->39606 39680 40ccf0 _wcsicmp 39622->39680 39624 40bc46 39624->39619 39625 40bc61 memset memset WideCharToMultiByte 39624->39625 39681 40103c strlen 39625->39681 39627 40bcc0 39628 40b273 27 API calls 39627->39628 39629 40bcd0 memcmp 39628->39629 39629->39619 39630 40bce2 39629->39630 39631 404423 37 API calls 39630->39631 39632 40bd10 39631->39632 39632->39619 39633 40bd3a LocalFree 39632->39633 39634 40bd1f memcpy 39632->39634 39633->39619 39634->39633 39635->38831 39637 409a74 GetTempFileNameW 39636->39637 39638 409a66 GetWindowsDirectoryW 39636->39638 39637->38830 39638->39637 39639->38868 39640->38868 39641->38868 39642->38868 39643->38868 39644->38868 39645->38868 39646->38868 39647->38868 39648->38843 39649->38865 39682 4096c3 CreateFileW 39650->39682 39652 40cc34 39653 40cc3d GetFileSize 39652->39653 39661 40bbca 39652->39661 39654 40afcf 2 API calls 39653->39654 39655 40cc64 39654->39655 39683 40a2ef ReadFile 39655->39683 39657 40cc71 39684 40ab4a MultiByteToWideChar 39657->39684 39659 40cc95 FindCloseChangeNotification 39660 40b04b ??3@YAXPAX 39659->39660 39660->39661 39661->39606 39662 40cf04 39661->39662 39663 40b633 ??3@YAXPAX 39662->39663 39664 40cf14 39663->39664 39690 40b1ab ??3@YAXPAX ??3@YAXPAX 39664->39690 39666 40bbdd 39666->39606 39666->39611 39667 40cf1b 39667->39666 39669 40cfef 39667->39669 39691 40cd4b 39667->39691 39670 40cd4b 14 API calls 39669->39670 39670->39666 39672 40b633 ??3@YAXPAX 39671->39672 39673 40cc15 39672->39673 39674 40aa04 ??3@YAXPAX 39673->39674 39675 40cc1d 39674->39675 39737 40b1ab ??3@YAXPAX ??3@YAXPAX 39675->39737 39677 40b7d4 memset CreateFileW 39677->38823 39677->38824 39678->39614 39679->39616 39680->39624 39681->39627 39682->39652 39683->39657 39685 40ab93 39684->39685 39686 40ab6b 39684->39686 39685->39659 39687 40a9ce 4 API calls 39686->39687 39688 40ab74 39687->39688 39689 40ab7c MultiByteToWideChar 39688->39689 39689->39685 39690->39667 39692 40cd7b 39691->39692 39725 40aa29 6 API calls 39692->39725 39694 40cef5 39695 40aa04 ??3@YAXPAX 39694->39695 39696 40cefd 39695->39696 39696->39667 39697 40cd89 39697->39694 39726 40aa29 6 API calls 39697->39726 39699 40ce1d 39727 40aa29 6 API calls 39699->39727 39701 40ce3e 39702 40ce6a 39701->39702 39728 40abb7 wcslen memmove 39701->39728 39703 40ce9f 39702->39703 39731 40abb7 wcslen memmove 39702->39731 39734 40a8d0 7 API calls 39703->39734 39707 40ce56 39729 40aa71 wcslen 39707->39729 39708 40ce8b 39732 40aa71 wcslen 39708->39732 39709 40ceb5 39735 40a8d0 7 API calls 39709->39735 39712 40ce5e 39730 40abb7 wcslen memmove 39712->39730 39713 40ce93 39733 40abb7 wcslen memmove 39713->39733 39717 40cecb 39736 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39717->39736 39719 40cedd 39720 40aa04 ??3@YAXPAX 39719->39720 39721 40cee5 39720->39721 39722 40aa04 ??3@YAXPAX 39721->39722 39723 40ceed 39722->39723 39724 40aa04 ??3@YAXPAX 39723->39724 39724->39694 39725->39697 39726->39699 39727->39701 39728->39707 39729->39712 39730->39702 39731->39708 39732->39713 39733->39703 39734->39709 39735->39717 39736->39719 39737->39677 39738->38883 39739->38891 37669 44dea5 37670 44deb5 FreeLibrary 37669->37670 37671 44dec3 37669->37671 37670->37671 39749 4148b6 FindResourceW 39750 4148cf SizeofResource 39749->39750 39753 4148f9 39749->39753 39751 4148e0 LoadResource 39750->39751 39750->39753 39752 4148ee LockResource 39751->39752 39751->39753 39752->39753 37845 415304 ??3@YAXPAX 39754 441b3f 39764 43a9f6 39754->39764 39756 441b61 39937 4386af memset 39756->39937 39758 44189a 39759 4418e2 39758->39759 39763 442bd4 39758->39763 39760 4418ea 39759->39760 39938 4414a9 12 API calls 39759->39938 39763->39760 39939 441409 memset 39763->39939 39765 43aa20 39764->39765 39766 43aadf 39764->39766 39765->39766 39767 43aa34 memset 39765->39767 39766->39756 39768 43aa56 39767->39768 39769 43aa4d 39767->39769 39940 43a6e7 39768->39940 39948 42c02e memset 39769->39948 39774 43aad3 39950 4169a7 11 API calls 39774->39950 39775 43aaae 39775->39766 39775->39774 39790 43aae5 39775->39790 39776 43ac18 39779 43ac47 39776->39779 39952 42bbd5 memcpy memcpy memcpy memset memcpy 39776->39952 39780 43aca8 39779->39780 39953 438eed 16 API calls 39779->39953 39784 43acd5 39780->39784 39955 4233ae 11 API calls 39780->39955 39783 43ac87 39954 4233c5 16 API calls 39783->39954 39956 423426 11 API calls 39784->39956 39788 43ace1 39957 439811 163 API calls 39788->39957 39789 43a9f6 161 API calls 39789->39790 39790->39766 39790->39776 39790->39789 39951 439bbb 22 API calls 39790->39951 39792 43acfd 39797 43ad2c 39792->39797 39958 438eed 16 API calls 39792->39958 39794 43ad19 39959 4233c5 16 API calls 39794->39959 39796 43ad58 39960 44081d 163 API calls 39796->39960 39797->39796 39800 43add9 39797->39800 39964 423426 11 API calls 39800->39964 39801 43ae3a memset 39802 43ae73 39801->39802 39965 42e1c0 147 API calls 39802->39965 39803 43adab 39962 438c4e 163 API calls 39803->39962 39804 43ad6c 39804->39766 39804->39803 39961 42370b memset memcpy memset 39804->39961 39808 43adcc 39963 440f84 12 API calls 39808->39963 39809 43ae96 39966 42e1c0 147 API calls 39809->39966 39812 43aea8 39813 43aec1 39812->39813 39967 42e199 147 API calls 39812->39967 39814 43af00 39813->39814 39968 42e1c0 147 API calls 39813->39968 39814->39766 39818 43af1a 39814->39818 39819 43b3d9 39814->39819 39969 438eed 16 API calls 39818->39969 39824 43b3f6 39819->39824 39828 43b4c8 39819->39828 39820 43b60f 39820->39766 40028 4393a5 17 API calls 39820->40028 39823 43af2f 39970 4233c5 16 API calls 39823->39970 40010 432878 12 API calls 39824->40010 39826 43af51 39971 423426 11 API calls 39826->39971 39834 43b4f2 39828->39834 40016 42bbd5 memcpy memcpy memcpy memset memcpy 39828->40016 39830 43af7d 39972 423426 11 API calls 39830->39972 40017 43a76c 21 API calls 39834->40017 39835 43b529 40018 44081d 163 API calls 39835->40018 39836 43b462 40012 423330 11 API calls 39836->40012 39837 43af94 39973 423330 11 API calls 39837->39973 39841 43afca 39974 423330 11 API calls 39841->39974 39842 43b47e 39846 43b497 39842->39846 40013 42374a memcpy memset memcpy memcpy memcpy 39842->40013 39843 43b544 39847 43b55c 39843->39847 40019 42c02e memset 39843->40019 39844 43b428 39844->39836 40011 432b60 16 API calls 39844->40011 40014 4233ae 11 API calls 39846->40014 40020 43a87a 163 API calls 39847->40020 39849 43afdb 39975 4233ae 11 API calls 39849->39975 39854 43b56c 39858 43b58a 39854->39858 40021 423330 11 API calls 39854->40021 39855 43b4b1 40015 423399 11 API calls 39855->40015 39857 43afee 39976 44081d 163 API calls 39857->39976 40022 440f84 12 API calls 39858->40022 39859 43b4c1 40024 42db80 163 API calls 39859->40024 39864 43b592 40023 43a82f 16 API calls 39864->40023 39867 43b5b4 40025 438c4e 163 API calls 39867->40025 39869 43b5cf 40026 42c02e memset 39869->40026 39871 43b005 39871->39766 39875 43b01f 39871->39875 39977 42d836 163 API calls 39871->39977 39872 43b1ef 39987 4233c5 16 API calls 39872->39987 39875->39872 39985 423330 11 API calls 39875->39985 39986 42d71d 163 API calls 39875->39986 39876 43b212 39988 423330 11 API calls 39876->39988 39878 43b087 39978 4233ae 11 API calls 39878->39978 39879 43add4 39879->39820 40027 438f86 16 API calls 39879->40027 39882 43b22a 39989 42ccb5 11 API calls 39882->39989 39885 43b23f 39990 4233ae 11 API calls 39885->39990 39886 43b10f 39981 423330 11 API calls 39886->39981 39888 43b257 39991 4233ae 11 API calls 39888->39991 39892 43b129 39982 4233ae 11 API calls 39892->39982 39893 43b26e 39992 4233ae 11 API calls 39893->39992 39896 43b09a 39896->39886 39979 42cc15 19 API calls 39896->39979 39980 4233ae 11 API calls 39896->39980 39897 43b282 39993 43a87a 163 API calls 39897->39993 39899 43b13c 39983 440f84 12 API calls 39899->39983 39901 43b29d 39994 423330 11 API calls 39901->39994 39904 43b15f 39984 4233ae 11 API calls 39904->39984 39905 43b2af 39906 43b2b8 39905->39906 39907 43b2ce 39905->39907 39995 4233ae 11 API calls 39906->39995 39996 440f84 12 API calls 39907->39996 39911 43b2c9 39998 4233ae 11 API calls 39911->39998 39912 43b2da 39997 42370b memset memcpy memset 39912->39997 39915 43b2f9 39999 423330 11 API calls 39915->39999 39917 43b30b 40000 423330 11 API calls 39917->40000 39919 43b325 40001 423399 11 API calls 39919->40001 39921 43b332 40002 4233ae 11 API calls 39921->40002 39923 43b354 40003 423399 11 API calls 39923->40003 39925 43b364 40004 43a82f 16 API calls 39925->40004 39927 43b370 40005 42db80 163 API calls 39927->40005 39929 43b380 40006 438c4e 163 API calls 39929->40006 39931 43b39e 40007 423399 11 API calls 39931->40007 39933 43b3ae 40008 43a76c 21 API calls 39933->40008 39935 43b3c3 40009 423399 11 API calls 39935->40009 39937->39758 39938->39760 39939->39763 39941 43a6f5 39940->39941 39942 43a765 39940->39942 39941->39942 40029 42a115 39941->40029 39942->39766 39949 4397fd memset 39942->39949 39946 43a73d 39946->39942 39947 42a115 147 API calls 39946->39947 39947->39942 39948->39768 39949->39775 39950->39766 39951->39790 39952->39779 39953->39783 39954->39780 39955->39784 39956->39788 39957->39792 39958->39794 39959->39797 39960->39804 39961->39803 39962->39808 39963->39879 39964->39801 39965->39809 39966->39812 39967->39813 39968->39813 39969->39823 39970->39826 39971->39830 39972->39837 39973->39841 39974->39849 39975->39857 39976->39871 39977->39878 39978->39896 39979->39896 39980->39896 39981->39892 39982->39899 39983->39904 39984->39875 39985->39875 39986->39875 39987->39876 39988->39882 39989->39885 39990->39888 39991->39893 39992->39897 39993->39901 39994->39905 39995->39911 39996->39912 39997->39911 39998->39915 39999->39917 40000->39919 40001->39921 40002->39923 40003->39925 40004->39927 40005->39929 40006->39931 40007->39933 40008->39935 40009->39879 40010->39844 40011->39836 40012->39842 40013->39846 40014->39855 40015->39859 40016->39834 40017->39835 40018->39843 40019->39847 40020->39854 40021->39858 40022->39864 40023->39859 40024->39867 40025->39869 40026->39879 40027->39820 40028->39766 40030 42a175 40029->40030 40032 42a122 40029->40032 40030->39942 40035 42b13b 147 API calls 40030->40035 40032->40030 40033 42a115 147 API calls 40032->40033 40036 43a174 40032->40036 40060 42a0a8 147 API calls 40032->40060 40033->40032 40035->39946 40050 43a196 40036->40050 40051 43a19e 40036->40051 40037 43a306 40037->40050 40080 4388c4 14 API calls 40037->40080 40040 42a115 147 API calls 40040->40051 40042 43a642 40042->40050 40084 4169a7 11 API calls 40042->40084 40046 43a635 40083 42c02e memset 40046->40083 40050->40032 40051->40037 40051->40040 40051->40050 40061 42ff8c 40051->40061 40069 415a91 40051->40069 40073 4165ff 40051->40073 40076 439504 13 API calls 40051->40076 40077 4312d0 147 API calls 40051->40077 40078 42be4c memcpy memcpy memcpy memset memcpy 40051->40078 40079 43a121 11 API calls 40051->40079 40053 4169a7 11 API calls 40054 43a325 40053->40054 40054->40042 40054->40046 40054->40050 40054->40053 40055 42b5b5 memset memcpy 40054->40055 40056 42bf4c 14 API calls 40054->40056 40059 4165ff 11 API calls 40054->40059 40081 42b63e 14 API calls 40054->40081 40082 42bfcf memcpy 40054->40082 40055->40054 40056->40054 40059->40054 40060->40032 40085 43817e 40061->40085 40063 42ff9d 40063->40051 40064 42ff99 40064->40063 40065 42ffe3 40064->40065 40066 42ffd0 40064->40066 40090 4169a7 11 API calls 40065->40090 40089 4169a7 11 API calls 40066->40089 40070 415a9d 40069->40070 40071 415ab3 40070->40071 40072 415aa4 memset 40070->40072 40071->40051 40072->40071 40239 4165a0 40073->40239 40076->40051 40077->40051 40078->40051 40079->40051 40080->40054 40081->40054 40082->40054 40083->40042 40084->40050 40086 438187 40085->40086 40088 438192 40085->40088 40091 4380f6 40086->40091 40088->40064 40089->40063 40090->40063 40093 43811f 40091->40093 40092 438164 40092->40088 40093->40092 40095 4300e8 3 API calls 40093->40095 40096 437e5e 40093->40096 40095->40093 40119 437d3c 40096->40119 40098 437eb3 40098->40093 40099 437ea9 40099->40098 40104 437f22 40099->40104 40134 41f432 40099->40134 40102 437f06 40181 415c56 11 API calls 40102->40181 40106 437f7f 40104->40106 40107 432d4e 3 API calls 40104->40107 40105 437f95 40182 415c56 11 API calls 40105->40182 40106->40105 40110 43802b 40106->40110 40107->40106 40109 4165ff 11 API calls 40111 438054 40109->40111 40110->40109 40145 437371 40111->40145 40114 43806b 40115 438094 40114->40115 40183 42f50e 138 API calls 40114->40183 40117 437fa3 40115->40117 40118 4300e8 3 API calls 40115->40118 40117->40098 40184 41f638 104 API calls 40117->40184 40118->40117 40120 437d69 40119->40120 40123 437d80 40119->40123 40185 437ccb 11 API calls 40120->40185 40122 437d76 40122->40099 40123->40122 40124 437da3 40123->40124 40125 437d90 40123->40125 40127 438460 134 API calls 40124->40127 40125->40122 40189 437ccb 11 API calls 40125->40189 40130 437dcb 40127->40130 40128 437de8 40188 424f26 123 API calls 40128->40188 40130->40128 40186 444283 13 API calls 40130->40186 40132 437dfc 40187 437ccb 11 API calls 40132->40187 40135 41f54d 40134->40135 40141 41f44f 40134->40141 40136 41f466 40135->40136 40219 41c635 memset memset 40135->40219 40136->40102 40136->40104 40141->40136 40143 41f50b 40141->40143 40190 41f1a5 40141->40190 40215 41c06f memcmp 40141->40215 40216 41f3b1 90 API calls 40141->40216 40217 41f398 86 API calls 40141->40217 40143->40135 40143->40136 40218 41c295 86 API calls 40143->40218 40220 41703f 40145->40220 40147 437399 40148 43739d 40147->40148 40150 4373ac 40147->40150 40227 4446ea 11 API calls 40148->40227 40151 416935 16 API calls 40150->40151 40152 4373ca 40151->40152 40153 438460 134 API calls 40152->40153 40158 4251c4 137 API calls 40152->40158 40162 415a91 memset 40152->40162 40165 43758f 40152->40165 40177 437584 40152->40177 40180 437d3c 135 API calls 40152->40180 40228 425433 13 API calls 40152->40228 40229 425413 17 API calls 40152->40229 40230 42533e 16 API calls 40152->40230 40231 42538f 16 API calls 40152->40231 40232 42453e 123 API calls 40152->40232 40153->40152 40154 4375bc 40235 415c7d 16 API calls 40154->40235 40157 4375d2 40179 4373a7 40157->40179 40236 4442e6 11 API calls 40157->40236 40158->40152 40160 4375e2 40160->40179 40237 444283 13 API calls 40160->40237 40162->40152 40233 42453e 123 API calls 40165->40233 40168 4375f4 40171 437620 40168->40171 40172 43760b 40168->40172 40170 43759f 40173 416935 16 API calls 40170->40173 40175 416935 16 API calls 40171->40175 40238 444283 13 API calls 40172->40238 40173->40177 40175->40179 40177->40154 40234 42453e 123 API calls 40177->40234 40178 437612 memcpy 40178->40179 40179->40114 40180->40152 40181->40098 40182->40117 40183->40115 40184->40098 40185->40122 40186->40132 40187->40128 40188->40122 40189->40122 40191 41bc3b 101 API calls 40190->40191 40192 41f1b4 40191->40192 40193 41edad 86 API calls 40192->40193 40200 41f282 40192->40200 40194 41f1cb 40193->40194 40195 41f1f5 memcmp 40194->40195 40196 41f20e 40194->40196 40194->40200 40195->40196 40197 41f21b memcmp 40196->40197 40196->40200 40198 41f326 40197->40198 40201 41f23d 40197->40201 40199 41ee6b 86 API calls 40198->40199 40198->40200 40199->40200 40200->40141 40201->40198 40202 41f28e memcmp 40201->40202 40204 41c8df 56 API calls 40201->40204 40202->40198 40203 41f2a9 40202->40203 40203->40198 40206 41f308 40203->40206 40207 41f2d8 40203->40207 40205 41f269 40204->40205 40205->40198 40208 41f287 40205->40208 40209 41f27a 40205->40209 40206->40198 40213 4446ce 11 API calls 40206->40213 40210 41ee6b 86 API calls 40207->40210 40208->40202 40211 41ee6b 86 API calls 40209->40211 40212 41f2e0 40210->40212 40211->40200 40214 41b1ca memset 40212->40214 40213->40198 40214->40200 40215->40141 40216->40141 40217->40141 40218->40135 40219->40136 40221 417044 40220->40221 40222 41705c 40220->40222 40224 416760 11 API calls 40221->40224 40226 417055 40221->40226 40223 417075 40222->40223 40225 41707a 11 API calls 40222->40225 40223->40147 40224->40226 40225->40221 40226->40147 40227->40179 40228->40152 40229->40152 40230->40152 40231->40152 40232->40152 40233->40170 40234->40154 40235->40157 40236->40160 40237->40168 40238->40178 40244 415cfe 40239->40244 40248 415d23 __aullrem __aulldvrm 40244->40248 40251 41628e 40244->40251 40245 4163ca 40258 416422 11 API calls 40245->40258 40247 416172 memset 40247->40248 40248->40245 40248->40247 40249 416422 10 API calls 40248->40249 40250 415cb9 10 API calls 40248->40250 40248->40251 40249->40248 40250->40248 40252 416520 40251->40252 40253 416527 40252->40253 40257 416574 40252->40257 40254 416544 40253->40254 40253->40257 40259 4156aa 11 API calls 40253->40259 40256 416561 memcpy 40254->40256 40254->40257 40256->40257 40257->40051 40258->40251 40259->40254 40281 41493c EnumResourceNamesW 37673 4287c1 37674 4287d2 37673->37674 37675 429ac1 37673->37675 37676 428818 37674->37676 37677 42881f 37674->37677 37692 425711 37674->37692 37687 425ad6 37675->37687 37743 415c56 11 API calls 37675->37743 37710 42013a 37676->37710 37738 420244 97 API calls 37677->37738 37682 4260dd 37737 424251 120 API calls 37682->37737 37684 4259da 37736 416760 11 API calls 37684->37736 37690 422aeb memset memcpy memcpy 37690->37692 37691 429a4d 37693 429a66 37691->37693 37697 429a9b 37691->37697 37692->37675 37692->37684 37692->37690 37692->37691 37695 4260a1 37692->37695 37706 4259c2 37692->37706 37709 425a38 37692->37709 37726 4227f0 memset memcpy 37692->37726 37727 422b84 15 API calls 37692->37727 37728 422b5d memset memcpy memcpy 37692->37728 37729 422640 13 API calls 37692->37729 37731 4241fc 11 API calls 37692->37731 37732 42413a 90 API calls 37692->37732 37739 415c56 11 API calls 37693->37739 37735 415c56 11 API calls 37695->37735 37698 429a96 37697->37698 37741 416760 11 API calls 37697->37741 37742 424251 120 API calls 37698->37742 37701 429a7a 37740 416760 11 API calls 37701->37740 37706->37687 37730 415c56 11 API calls 37706->37730 37709->37706 37733 422640 13 API calls 37709->37733 37734 4226e0 12 API calls 37709->37734 37711 42014c 37710->37711 37714 420151 37710->37714 37753 41e466 97 API calls 37711->37753 37713 420162 37713->37692 37714->37713 37715 4201b3 37714->37715 37716 420229 37714->37716 37717 4201b8 37715->37717 37718 4201dc 37715->37718 37716->37713 37719 41fd5e 86 API calls 37716->37719 37744 41fbdb 37717->37744 37718->37713 37722 4201ff 37718->37722 37750 41fc4c 37718->37750 37719->37713 37722->37713 37725 42013a 97 API calls 37722->37725 37725->37713 37726->37692 37727->37692 37728->37692 37729->37692 37730->37684 37731->37692 37732->37692 37733->37709 37734->37709 37735->37684 37736->37682 37737->37687 37738->37692 37739->37701 37740->37698 37741->37698 37742->37675 37743->37684 37745 41fbf1 37744->37745 37746 41fbf8 37744->37746 37749 41fc39 37745->37749 37768 4446ce 11 API calls 37745->37768 37758 41ee26 37746->37758 37749->37713 37754 41fd5e 37749->37754 37751 41ee6b 86 API calls 37750->37751 37752 41fc5d 37751->37752 37752->37718 37753->37714 37756 41fd65 37754->37756 37755 41fdab 37755->37713 37756->37755 37757 41fbdb 86 API calls 37756->37757 37757->37756 37759 41ee41 37758->37759 37760 41ee32 37758->37760 37769 41edad 37759->37769 37772 4446ce 11 API calls 37760->37772 37763 41ee3c 37763->37745 37766 41ee58 37766->37763 37774 41ee6b 37766->37774 37768->37749 37778 41be52 37769->37778 37772->37763 37773 41eb85 11 API calls 37773->37766 37775 41ee70 37774->37775 37776 41ee78 37774->37776 37831 41bf99 86 API calls 37775->37831 37776->37763 37779 41be6f 37778->37779 37780 41be5f 37778->37780 37786 41be8c 37779->37786 37810 418c63 memset memset 37779->37810 37809 4446ce 11 API calls 37780->37809 37782 41be69 37782->37763 37782->37773 37784 41bee7 37784->37782 37814 41a453 86 API calls 37784->37814 37786->37782 37786->37784 37787 41bf3a 37786->37787 37790 41bed1 37786->37790 37813 4446ce 11 API calls 37787->37813 37789 41bef0 37789->37784 37792 41bf01 37789->37792 37790->37789 37793 41bee2 37790->37793 37791 41bf24 memset 37791->37782 37792->37791 37794 41bf14 37792->37794 37811 418a6d memset memcpy memset 37792->37811 37799 41ac13 37793->37799 37812 41a223 memset memcpy memset 37794->37812 37798 41bf20 37798->37791 37800 41ac3f memset 37799->37800 37802 41ac52 37799->37802 37801 41acd9 37800->37801 37801->37784 37804 41ac6a 37802->37804 37815 41dc14 19 API calls 37802->37815 37806 41aca1 37804->37806 37816 41519d 37804->37816 37806->37801 37807 41acc0 memset 37806->37807 37808 41accd memcpy 37806->37808 37807->37801 37808->37801 37809->37782 37810->37786 37811->37794 37812->37798 37813->37784 37815->37804 37819 4175ed 37816->37819 37827 417570 SetFilePointer 37819->37827 37822 41760a ReadFile 37823 417637 37822->37823 37824 417627 GetLastError 37822->37824 37825 4151b3 37823->37825 37826 41763e memset 37823->37826 37824->37825 37825->37806 37826->37825 37828 4175b2 37827->37828 37829 41759c GetLastError 37827->37829 37828->37822 37828->37825 37829->37828 37830 4175a8 GetLastError 37829->37830 37830->37828 37831->37776 37832 417bc5 37833 417c61 37832->37833 37838 417bda 37832->37838 37834 417bf6 UnmapViewOfFile CloseHandle 37834->37834 37834->37838 37836 417c2c 37836->37838 37844 41851e 20 API calls 37836->37844 37838->37833 37838->37834 37838->37836 37839 4175b7 37838->37839 37840 4175d6 FindCloseChangeNotification 37839->37840 37841 4175c8 37840->37841 37842 4175df 37840->37842 37841->37842 37843 4175ce Sleep 37841->37843 37842->37838 37843->37840 37844->37836 39740 4147f3 39743 414561 39740->39743 39742 414813 39744 41456d 39743->39744 39745 41457f GetPrivateProfileIntW 39743->39745 39748 4143f1 memset _itow WritePrivateProfileStringW 39744->39748 39745->39742 39747 41457a 39747->39742 39748->39747

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                      APIs
                      • memset.MSVCRT ref: 0040DDAD
                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                      • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                      • _wcsicmp.MSVCRT ref: 0040DEB2
                      • _wcsicmp.MSVCRT ref: 0040DEC5
                      • _wcsicmp.MSVCRT ref: 0040DED8
                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                      • memset.MSVCRT ref: 0040DF5F
                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                      • _wcsicmp.MSVCRT ref: 0040DFB2
                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                      • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                      • API String ID: 594330280-3398334509
                      • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                      • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                      APIs
                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                        • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                      • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                      • String ID:
                      • API String ID: 2947809556-0
                      • Opcode ID: d2c930e6252e89cba164dd291f6fd6a93c7c4142cb300574fab5a2c635c3ca3b
                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                      • Opcode Fuzzy Hash: d2c930e6252e89cba164dd291f6fd6a93c7c4142cb300574fab5a2c635c3ca3b
                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                      APIs
                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                      • FindNextFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FileFind$FirstNext
                      • String ID:
                      • API String ID: 1690352074-0
                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                      APIs
                      • memset.MSVCRT ref: 0041898C
                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: InfoSystemmemset
                      • String ID:
                      • API String ID: 3558857096-0
                      • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                      • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                      APIs
                      • memset.MSVCRT ref: 004455C2
                      • wcsrchr.MSVCRT ref: 004455DA
                      • memset.MSVCRT ref: 0044570D
                      • memset.MSVCRT ref: 00445725
                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                        • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                        • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                      • memset.MSVCRT ref: 0044573D
                      • memset.MSVCRT ref: 00445755
                      • memset.MSVCRT ref: 004458CB
                      • memset.MSVCRT ref: 004458E3
                      • memset.MSVCRT ref: 0044596E
                      • memset.MSVCRT ref: 00445A10
                      • memset.MSVCRT ref: 00445A28
                      • memset.MSVCRT ref: 00445AC6
                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                      • memset.MSVCRT ref: 00445B52
                      • memset.MSVCRT ref: 00445B6A
                      • memset.MSVCRT ref: 00445C9B
                      • memset.MSVCRT ref: 00445CB3
                      • _wcsicmp.MSVCRT ref: 00445D56
                      • memset.MSVCRT ref: 00445B82
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                      • memset.MSVCRT ref: 00445986
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                      • API String ID: 2745753283-3798722523
                      • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                      • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                      Control-flow Graph

                      APIs
                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                      • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                      • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                      • String ID: $/deleteregkey$/savelangfile
                      • API String ID: 2744995895-28296030
                      • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                      • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                      • wcsrchr.MSVCRT ref: 0040B738
                      • memset.MSVCRT ref: 0040B756
                      • memset.MSVCRT ref: 0040B7F5
                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                      • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                      • memset.MSVCRT ref: 0040B851
                      • memset.MSVCRT ref: 0040B8CA
                      • memcmp.MSVCRT ref: 0040B9BF
                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                      • memset.MSVCRT ref: 0040BB53
                      • memcpy.MSVCRT ref: 0040BB66
                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                      • String ID: chp$v10
                      • API String ID: 170802307-2783969131
                      • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                      • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f ??3@YAXPAX@Z 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                      APIs
                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                      • memset.MSVCRT ref: 0040E380
                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                        • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                      • wcschr.MSVCRT ref: 0040E3B8
                      • memcpy.MSVCRT ref: 0040E3EC
                      • memcpy.MSVCRT ref: 0040E407
                      • memcpy.MSVCRT ref: 0040E422
                      • memcpy.MSVCRT ref: 0040E43D
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                      • API String ID: 3073804840-2252543386
                      • Opcode ID: 4fb386ce9209b8875289dcc542ef71d6c34f1816ca3767685257c05f3f5c3b96
                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                      • Opcode Fuzzy Hash: 4fb386ce9209b8875289dcc542ef71d6c34f1816ca3767685257c05f3f5c3b96
                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                      • String ID:
                      • API String ID: 3715365532-3916222277
                      • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                      • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 FindCloseChangeNotification 638->640 641 413eb0-413eb5 639->641 642 413df3-413e1a memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 647 413e1f-413e26 642->647 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 ??3@YAXPAX@Z 643->646 648 413edb-413ee2 645->648 646->648 650 413e79-413eae call 413959 call 413ca4 CloseHandle 647->650 651 413e28-413e35 647->651 654 413ee4 648->654 655 413ee7-413efe 648->655 650->641 652 413e61-413e68 651->652 653 413e37-413e44 GetModuleHandleW 651->653 652->650 659 413e6a-413e76 652->659 653->652 658 413e46-413e5c GetProcAddress 653->658 654->655 655->638 658->652 659->650
                      APIs
                        • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                      • memset.MSVCRT ref: 00413D7F
                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                      • memset.MSVCRT ref: 00413E07
                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                      • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,0000022C), ref: 00413F1A
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@CloseHandleProcess32memset$AddressChangeCreateFindFirstModuleNextNotificationOpenProcProcessSnapshotToolhelp32
                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                      • API String ID: 2191996607-1740548384
                      • Opcode ID: 0a5514244f8da3553e93fddd8650c41e468bd34edf4168a604947191dfb6c3d8
                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                      • Opcode Fuzzy Hash: 0a5514244f8da3553e93fddd8650c41e468bd34edf4168a604947191dfb6c3d8
                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                        • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                      • CloseHandle.KERNEL32(?), ref: 0040E148
                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                      • String ID: bhv
                      • API String ID: 327780389-2689659898
                      • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                      • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                      • API String ID: 2941347001-70141382
                      • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                      • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                      • String ID:
                      • API String ID: 2827331108-0
                      • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                      • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                      • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                      • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040C298
                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                      • wcschr.MSVCRT ref: 0040C324
                      • wcschr.MSVCRT ref: 0040C344
                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                      • GetLastError.KERNEL32 ref: 0040C373
                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                      • String ID: visited:
                      • API String ID: 1157525455-1702587658
                      • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                      • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 ??3@YAXPAX@Z 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                      APIs
                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                      • memset.MSVCRT ref: 0040E1BD
                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                      • _snwprintf.MSVCRT ref: 0040E257
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                      • API String ID: 3883404497-2982631422
                      • Opcode ID: 011f1ee4c8a676e7993d49e178f6fd90f7880661b1005521c0cb7dff8e01015d
                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                      • Opcode Fuzzy Hash: 011f1ee4c8a676e7993d49e178f6fd90f7880661b1005521c0cb7dff8e01015d
                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                      • memset.MSVCRT ref: 0040BC75
                      • memset.MSVCRT ref: 0040BC8C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                      • memcmp.MSVCRT ref: 0040BCD6
                      • memcpy.MSVCRT ref: 0040BD2B
                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                      • String ID:
                      • API String ID: 509814883-3916222277
                      • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                      • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError ??3@YAXPAX@Z 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 ??3@YAXPAX@Z 870->877 871->870 877->855
                      APIs
                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                      • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                      • GetLastError.KERNEL32 ref: 0041847E
                      • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: CreateFile$??3@ErrorLast
                      • String ID: |A
                      • API String ID: 1407640353-1717621600
                      • Opcode ID: 51ca5a02fc44f8a5d6c80fe755b484a3b8e8795a5c0060307af42e5ba884e769
                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                      • Opcode Fuzzy Hash: 51ca5a02fc44f8a5d6c80fe755b484a3b8e8795a5c0060307af42e5ba884e769
                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                        • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                      • _wcslwr.MSVCRT ref: 0040C817
                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                      • wcslen.MSVCRT ref: 0040C82C
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                      • API String ID: 62308376-4196376884
                      • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                      • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                      APIs
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                      • wcslen.MSVCRT ref: 0040BE06
                      • _wcsncoll.MSVCRT ref: 0040BE38
                      • memset.MSVCRT ref: 0040BE91
                      • memcpy.MSVCRT ref: 0040BEB2
                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                      • wcschr.MSVCRT ref: 0040BF24
                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                      • String ID:
                      • API String ID: 3191383707-0
                      • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                      • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                      APIs
                      • memset.MSVCRT ref: 00403CBF
                      • memset.MSVCRT ref: 00403CD4
                      • memset.MSVCRT ref: 00403CE9
                      • memset.MSVCRT ref: 00403CFE
                      • memset.MSVCRT ref: 00403D13
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 00403DDA
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                      • String ID: Waterfox$Waterfox\Profiles
                      • API String ID: 3527940856-11920434
                      • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                      • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                      APIs
                      • memset.MSVCRT ref: 00403E50
                      • memset.MSVCRT ref: 00403E65
                      • memset.MSVCRT ref: 00403E7A
                      • memset.MSVCRT ref: 00403E8F
                      • memset.MSVCRT ref: 00403EA4
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 00403F6B
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                      • API String ID: 3527940856-2068335096
                      • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                      • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                      APIs
                      • memset.MSVCRT ref: 00403FE1
                      • memset.MSVCRT ref: 00403FF6
                      • memset.MSVCRT ref: 0040400B
                      • memset.MSVCRT ref: 00404020
                      • memset.MSVCRT ref: 00404035
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 004040FC
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                      • API String ID: 3527940856-3369679110
                      • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                      • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                      • API String ID: 3510742995-2641926074
                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                      APIs
                        • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                      • memset.MSVCRT ref: 004033B7
                      • memcpy.MSVCRT ref: 004033D0
                      • wcscmp.MSVCRT ref: 004033FC
                      • _wcsicmp.MSVCRT ref: 00403439
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                      • String ID: $0.@
                      • API String ID: 3030842498-1896041820
                      • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                      • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 2941347001-0
                      • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                      • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                      APIs
                      • memset.MSVCRT ref: 00403C09
                      • memset.MSVCRT ref: 00403C1E
                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                      • wcscat.MSVCRT ref: 00403C47
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                      • wcscat.MSVCRT ref: 00403C70
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memsetwcscat$Closewcscpywcslen
                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                      • API String ID: 3249829328-1174173950
                      • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                      • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                      APIs
                      • memset.MSVCRT ref: 0040A824
                      • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                      • wcscpy.MSVCRT ref: 0040A854
                      • wcscat.MSVCRT ref: 0040A86A
                      • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                      • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 669240632-0
                      • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                      • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                      APIs
                      • wcschr.MSVCRT ref: 00414458
                      • _snwprintf.MSVCRT ref: 0041447D
                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                      • String ID: "%s"
                      • API String ID: 1343145685-3297466227
                      • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                      • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                      APIs
                      • memset.MSVCRT ref: 004087D6
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                      • memset.MSVCRT ref: 00408828
                      • memset.MSVCRT ref: 00408840
                      • memset.MSVCRT ref: 00408858
                      • memset.MSVCRT ref: 00408870
                      • memset.MSVCRT ref: 00408888
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                      • String ID:
                      • API String ID: 2911713577-0
                      • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                      • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcmp
                      • String ID: @ $SQLite format 3
                      • API String ID: 1475443563-3708268960
                      • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                      • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                      APIs
                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                      • memset.MSVCRT ref: 00414C87
                      • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                      • wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressCloseProcVersionmemsetwcscpy
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                      • API String ID: 2705122986-2036018995
                      • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                      • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: _wcsicmpqsort
                      • String ID: /nosort$/sort
                      • API String ID: 1579243037-1578091866
                      • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                      • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                      APIs
                      • memset.MSVCRT ref: 0040E60F
                      • memset.MSVCRT ref: 0040E629
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Strings
                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                      • API String ID: 3354267031-2114579845
                      • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                      • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                      APIs
                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                      • LockResource.KERNEL32(00000000), ref: 004148EF
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID:
                      • API String ID: 3473537107-0
                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                      APIs
                      Strings
                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: only a single result allowed for a SELECT that is part of an expression
                      • API String ID: 2221118986-1725073988
                      • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                      • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                      APIs
                      • Sleep.KERNEL32(00000064), ref: 004175D0
                      • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotificationSleep
                      • String ID: }A
                      • API String ID: 1821831730-2138825249
                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                      APIs
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                      • memcmp.MSVCRT ref: 00444BA5
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressProc$memcmp
                      • String ID: $$8
                      • API String ID: 2808797137-435121686
                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                      APIs
                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                        • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                      • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                        • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                        • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                      • String ID:
                      • API String ID: 1042154641-0
                      • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                      • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                      APIs
                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                      • memset.MSVCRT ref: 00403A55
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                      • String ID: history.dat$places.sqlite
                      • API String ID: 3093078384-467022611
                      • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                      • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                      APIs
                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                      • GetLastError.KERNEL32 ref: 00417627
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ErrorLast$File$PointerRead
                      • String ID:
                      • API String ID: 839530781-0
                      • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                      • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FileFindFirst
                      • String ID: *.*$index.dat
                      • API String ID: 1974802433-2863569691
                      • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                      • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                      APIs
                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                      • GetLastError.KERNEL32 ref: 004175A2
                      • GetLastError.KERNEL32 ref: 004175A8
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ErrorLast$FilePointer
                      • String ID:
                      • API String ID: 1156039329-0
                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$ChangeCloseCreateFindNotificationTime
                      • String ID:
                      • API String ID: 1631957507-0
                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                      APIs
                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Temp$DirectoryFileNamePathWindows
                      • String ID:
                      • API String ID: 1125800050-0
                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID:
                      • String ID: d
                      • API String ID: 0-2564639436
                      • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                      • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: BINARY
                      • API String ID: 2221118986-907554435
                      • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                      • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                      APIs
                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                      • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                        • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                        • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                      • String ID:
                      • API String ID: 1161345128-0
                      • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                      • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: /stext
                      • API String ID: 2081463915-3817206916
                      • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                      • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: .#v
                      • API String ID: 2081463915-507759092
                      • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                      • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                      • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                      • String ID:
                      • API String ID: 159017214-0
                      • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                      • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 3150196962-0
                      • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                      • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                      APIs
                      Strings
                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: malloc
                      • String ID: failed to allocate %u bytes of memory
                      • API String ID: 2803490479-1168259600
                      • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                      • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                      • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                      • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcmpmemset
                      • String ID:
                      • API String ID: 1065087418-0
                      • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                      • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID:
                      • API String ID: 1297977491-0
                      • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                      • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                      • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                      • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                      APIs
                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                        • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                      • String ID:
                      • API String ID: 1481295809-0
                      • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                      • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                      APIs
                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 3150196962-0
                      • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                      • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                      APIs
                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$PointerRead
                      • String ID:
                      • API String ID: 3154509469-0
                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                      APIs
                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: PrivateProfile$StringWrite_itowmemset
                      • String ID:
                      • API String ID: 4232544981-0
                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                      APIs
                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                      APIs
                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                      APIs
                      • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                      APIs
                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                      • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: 4de95ac81b56fc95cb4562d00445ef5fa655241d3aefb31a5f850866e19148c6
                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                      • Opcode Fuzzy Hash: 4de95ac81b56fc95cb4562d00445ef5fa655241d3aefb31a5f850866e19148c6
                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                      APIs
                      • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: d947284d6c22db8237c76381862de6f07fb40d788dfda0aa2648abdb68a845b9
                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                      • Opcode Fuzzy Hash: d947284d6c22db8237c76381862de6f07fb40d788dfda0aa2648abdb68a845b9
                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                      APIs
                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                      APIs
                      • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: EnumNamesResource
                      • String ID:
                      • API String ID: 3334572018-0
                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                      APIs
                      • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                      APIs
                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                      APIs
                      • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: e156b31a0a4016bb8d4295fdb5f94758c26aaa1bdb159141442c644a924158d2
                      • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                      • Opcode Fuzzy Hash: e156b31a0a4016bb8d4295fdb5f94758c26aaa1bdb159141442c644a924158d2
                      • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                      • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                      APIs
                      • memset.MSVCRT ref: 004095FC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                        • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                        • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                      • String ID:
                      • API String ID: 3655998216-0
                      • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                      • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                      APIs
                      • memset.MSVCRT ref: 00445426
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                      • String ID:
                      • API String ID: 1828521557-0
                      • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                      • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                      APIs
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                      • memcpy.MSVCRT ref: 00406942
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??2@FilePointermemcpy
                      • String ID:
                      • API String ID: 609303285-0
                      • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                      • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                      APIs
                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$CloseCreateErrorHandleLastRead
                      • String ID:
                      • API String ID: 2136311172-0
                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                      APIs
                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                      • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??2@??3@
                      • String ID:
                      • API String ID: 1936579350-0
                      • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                      • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                      APIs
                      • GetLastError.KERNEL32 ref: 004182D7
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                      • LocalFree.KERNEL32(?), ref: 00418342
                      • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                      • String ID: OsError 0x%x (%u)
                      • API String ID: 403622227-2664311388
                      • Opcode ID: 78d2135784b36f3903f9871ee7adf38e4db2590f8e5e3f290b233798c2ec08b4
                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                      • Opcode Fuzzy Hash: 78d2135784b36f3903f9871ee7adf38e4db2590f8e5e3f290b233798c2ec08b4
                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 004173BE
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Version
                      • String ID:
                      • API String ID: 1889659487-0
                      • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                      • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                      • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                      • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                      APIs
                      • _wcsicmp.MSVCRT ref: 004022A6
                      • _wcsicmp.MSVCRT ref: 004022D7
                      • _wcsicmp.MSVCRT ref: 00402305
                      • _wcsicmp.MSVCRT ref: 00402333
                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                        • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                      • memset.MSVCRT ref: 0040265F
                      • memcpy.MSVCRT ref: 0040269B
                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      • memcpy.MSVCRT ref: 004026FF
                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                      • API String ID: 577499730-1134094380
                      • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                      • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                      • GetWindowRect.USER32(?,?), ref: 00414088
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                      • GetDC.USER32 ref: 004140E3
                      • wcslen.MSVCRT ref: 00414123
                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                      • ReleaseDC.USER32(?,?), ref: 00414181
                      • _snwprintf.MSVCRT ref: 00414244
                      • SetWindowTextW.USER32(?,?), ref: 00414258
                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                      • GetClientRect.USER32(?,?), ref: 004142E1
                      • GetWindowRect.USER32(?,?), ref: 004142EB
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                      • GetClientRect.USER32(?,?), ref: 0041433B
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                      • String ID: %s:$EDIT$STATIC
                      • API String ID: 2080319088-3046471546
                      • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                      • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                      APIs
                      • EndDialog.USER32(?,?), ref: 00413221
                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                      • memset.MSVCRT ref: 00413292
                      • memset.MSVCRT ref: 004132B4
                      • memset.MSVCRT ref: 004132CD
                      • memset.MSVCRT ref: 004132E1
                      • memset.MSVCRT ref: 004132FB
                      • memset.MSVCRT ref: 00413310
                      • GetCurrentProcess.KERNEL32 ref: 00413318
                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                      • memset.MSVCRT ref: 004133C0
                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                      • memcpy.MSVCRT ref: 004133FC
                      • wcscpy.MSVCRT ref: 0041341F
                      • _snwprintf.MSVCRT ref: 0041348E
                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                      • SetFocus.USER32(00000000), ref: 004134B7
                      Strings
                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                      • {Unknown}, xrefs: 004132A6
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                      • API String ID: 4111938811-1819279800
                      • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                      • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                      APIs
                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                      • EndDialog.USER32(?,?), ref: 0040135E
                      • DeleteObject.GDI32(?), ref: 0040136A
                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                      • ShowWindow.USER32(00000000), ref: 00401398
                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                      • ShowWindow.USER32(00000000), ref: 004013A7
                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                      • String ID:
                      • API String ID: 829165378-0
                      • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                      • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                      APIs
                      • memset.MSVCRT ref: 00404172
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      • wcscpy.MSVCRT ref: 004041D6
                      • wcscpy.MSVCRT ref: 004041E7
                      • memset.MSVCRT ref: 00404200
                      • memset.MSVCRT ref: 00404215
                      • _snwprintf.MSVCRT ref: 0040422F
                      • wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 0040426E
                      • memset.MSVCRT ref: 004042CD
                      • memset.MSVCRT ref: 004042E2
                      • _snwprintf.MSVCRT ref: 004042FE
                      • wcscpy.MSVCRT ref: 00404311
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                      • API String ID: 2454223109-1580313836
                      • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                      • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                      APIs
                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                      • SetMenu.USER32(?,00000000), ref: 00411453
                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                      • memcpy.MSVCRT ref: 004115C8
                      • ShowWindow.USER32(?,?), ref: 004115FE
                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                      • API String ID: 4054529287-3175352466
                      • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                      • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: _snwprintf$memset$wcscpy
                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                      • API String ID: 2000436516-3842416460
                      • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                      • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                      APIs
                      • GetDC.USER32(00000000), ref: 004121FF
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                      • SelectObject.GDI32(?,?), ref: 00412251
                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                      • SetCursor.USER32(00000000), ref: 004122BC
                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                      • memcpy.MSVCRT ref: 0041234D
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                      • String ID:
                      • API String ID: 1700100422-0
                      • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                      • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                      APIs
                      • GetClientRect.USER32(?,?), ref: 004111E0
                      • GetWindowRect.USER32(?,?), ref: 004111F6
                      • GetWindowRect.USER32(?,?), ref: 0041120C
                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                      • GetWindowRect.USER32(00000000), ref: 0041124D
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                      • String ID:
                      • API String ID: 552707033-0
                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                      APIs
                      • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                        • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                      • memcpy.MSVCRT ref: 0040C11B
                      • strchr.MSVCRT ref: 0040C140
                      • strchr.MSVCRT ref: 0040C151
                      • _strlwr.MSVCRT ref: 0040C15F
                      • memset.MSVCRT ref: 0040C17A
                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                      • String ID: 4$h
                      • API String ID: 4066021378-1856150674
                      • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                      • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                      APIs
                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                      • KillTimer.USER32(?,00000041), ref: 004060D7
                      • KillTimer.USER32(?,00000041), ref: 004060E8
                      • GetTickCount.KERNEL32 ref: 0040610B
                      • GetParent.USER32(?), ref: 00406136
                      • SendMessageW.USER32(00000000), ref: 0040613D
                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                      • String ID: A
                      • API String ID: 2892645895-3554254475
                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                      • String ID: 0$6
                      • API String ID: 4066108131-3849865405
                      • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                      • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                      APIs
                      • memset.MSVCRT ref: 004082EF
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                      • memset.MSVCRT ref: 00408362
                      • memset.MSVCRT ref: 00408377
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$ByteCharMultiWide
                      • String ID:
                      • API String ID: 290601579-0
                      • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                      • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcpywcslen$_snwprintfmemset
                      • String ID: %s (%s)$YV@
                      • API String ID: 3979103747-598926743
                      • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                      • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                      • wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                      • wcslen.MSVCRT ref: 0040D1D3
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                      • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                      • memcpy.MSVCRT ref: 0040D24C
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                      • String ID: strings
                      • API String ID: 3166385802-3030018805
                      • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                      • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                      • String ID: r!A
                      • API String ID: 2791114272-628097481
                      • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                      • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                      APIs
                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                      • memset.MSVCRT ref: 00405455
                      • memset.MSVCRT ref: 0040546C
                      • memset.MSVCRT ref: 00405483
                      • memcpy.MSVCRT ref: 00405498
                      • memcpy.MSVCRT ref: 004054AD
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$memcpy$ErrorLast
                      • String ID: 6$\
                      • API String ID: 404372293-1284684873
                      • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                      • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                      APIs
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                      • wcscpy.MSVCRT ref: 0040A0D9
                      • wcscat.MSVCRT ref: 0040A0E6
                      • wcscat.MSVCRT ref: 0040A0F5
                      • wcscpy.MSVCRT ref: 0040A107
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                      • String ID:
                      • API String ID: 1331804452-0
                      • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                      • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                      APIs
                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                      • String ID: advapi32.dll
                      • API String ID: 2012295524-4050573280
                      • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                      • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                      APIs
                      Strings
                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                      • <%s>, xrefs: 004100A6
                      • <?xml version="1.0" ?>, xrefs: 0041007C
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$_snwprintf
                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                      • API String ID: 3473751417-2880344631
                      • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                      • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: wcscat$_snwprintfmemset
                      • String ID: %2.2X
                      • API String ID: 2521778956-791839006
                      • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                      • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                      APIs
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                        • Part of subcall function 00414592: RegOpenKeyExW.ADVAPI32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                        • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                      • memset.MSVCRT ref: 0040C439
                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                      • _wcsupr.MSVCRT ref: 0040C481
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                      • memset.MSVCRT ref: 0040C4D0
                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                      • String ID:
                      • API String ID: 1973883786-0
                      • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                      • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                      APIs
                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                      • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: PathTemp$??3@
                      • String ID: %s\etilqs_$etilqs_
                      • API String ID: 1589464350-1420421710
                      • Opcode ID: 264650abee42f12a8168c60520d94c93615684aca84a1282326acd03e30c5268
                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                      • Opcode Fuzzy Hash: 264650abee42f12a8168c60520d94c93615684aca84a1282326acd03e30c5268
                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                      APIs
                      • GetParent.USER32(?), ref: 0040D453
                      • GetWindowRect.USER32(?,?), ref: 0040D460
                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Window$Rect$ClientParentPoints
                      • String ID:
                      • API String ID: 4247780290-0
                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                      • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                      • memset.MSVCRT ref: 004450CD
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                      • String ID:
                      • API String ID: 1471605966-0
                      • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                      • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                      APIs
                      • memset.MSVCRT ref: 004100FB
                      • memset.MSVCRT ref: 00410112
                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                      • _snwprintf.MSVCRT ref: 00410141
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memset$_snwprintf_wcslwrwcscpy
                      • String ID: </%s>
                      • API String ID: 3400436232-259020660
                      • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                      • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                      APIs
                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                      • String ID: MS Sans Serif
                      • API String ID: 210187428-168460110
                      • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                      • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                      APIs
                      • memset.MSVCRT ref: 00412057
                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                      • GetKeyState.USER32(00000010), ref: 0041210D
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                      • String ID:
                      • API String ID: 3550944819-0
                      • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                      • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                      APIs
                      • wcslen.MSVCRT ref: 0040B1DE
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                      • memcpy.MSVCRT ref: 0040B248
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@$memcpy$mallocwcslen
                      • String ID:
                      • API String ID: 3023356884-0
                      • Opcode ID: a695ade3a7797f376f201de80decb40066d5f736b135f44090dc4a6cd17a09b2
                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                      • Opcode Fuzzy Hash: a695ade3a7797f376f201de80decb40066d5f736b135f44090dc4a6cd17a09b2
                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                      APIs
                      • strlen.MSVCRT ref: 0040B0D8
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                      • memcpy.MSVCRT ref: 0040B159
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??3@$memcpy$mallocstrlen
                      • String ID:
                      • API String ID: 1171893557-0
                      • Opcode ID: ee8347e84c53985be3907e5f73125604e6f6c519928a85103321f6ac1e1b5c7d
                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                      • Opcode Fuzzy Hash: ee8347e84c53985be3907e5f73125604e6f6c519928a85103321f6ac1e1b5c7d
                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                      APIs
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                      • malloc.MSVCRT ref: 00417459
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                      • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$??3@malloc
                      • String ID:
                      • API String ID: 4284152360-0
                      • Opcode ID: 99952dbbdb1bfba8fd85830a5d685bc4282b7af98e1c6427db74e5cbed68ad45
                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                      • Opcode Fuzzy Hash: 99952dbbdb1bfba8fd85830a5d685bc4282b7af98e1c6427db74e5cbed68ad45
                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                      • RegisterClassW.USER32(?), ref: 00412428
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: HandleModule$ClassCreateRegisterWindow
                      • String ID:
                      • API String ID: 2678498856-0
                      • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                      • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                      APIs
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                      • malloc.MSVCRT ref: 00417407
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                      • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$??3@malloc
                      • String ID:
                      • API String ID: 4284152360-0
                      • Opcode ID: 6a58532d87bfe5be5798e7c18fd69f9a5c0a4facd7f09204bf7deacabde6e419
                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                      • Opcode Fuzzy Hash: 6a58532d87bfe5be5798e7c18fd69f9a5c0a4facd7f09204bf7deacabde6e419
                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                      APIs
                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                      • GetStockObject.GDI32(00000000), ref: 004143C6
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                      • String ID:
                      • API String ID: 764393265-0
                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                      APIs
                      • memcpy.MSVCRT ref: 004134E0
                      • memcpy.MSVCRT ref: 004134F2
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: memcpy$DialogHandleModuleParam
                      • String ID:
                      • API String ID: 1386444988-0
                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: _snwprintfmemcpy
                      • String ID: %2.2X
                      • API String ID: 2789212964-323797159
                      • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                      • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                      APIs
                      Memory Dump Source
                      • Source File: 00000010.00000002.2198142709.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_400000_iexplore.jbxd
                      Similarity
                      • API ID: ??2@
                      • String ID:
                      • API String ID: 1033339047-0
                      • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                      • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49