Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
Analysis ID:1502949
MD5:2f152c46d438316bf3f0bf69147d3198
SHA1:d7cfbadb49cab8fdbbe536452bce74b7f7a0d74f
SHA256:b22f032935d1ecabe852ea8f41bc541c19367c380ba2f502b398f3fc8b775e82
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Version": "5.1.0 Pro", "Host:Port:Password": "192.3.64.152:2559", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TS121V", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6c4a8:$a1: Remcos restarted by watchdog!
        • 0x6ca20:$a3: %02i:%02i:%02i:%03i
        00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
        • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x6656c:$str_b2: Executing file:
        • 0x675ec:$str_b3: GetDirectListeningPort
        • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x67118:$str_b7: \update.vbs
        • 0x66594:$str_b9: Downloaded file:
        • 0x66580:$str_b10: Downloading file:
        • 0x66624:$str_b12: Failed to upload file:
        • 0x675b4:$str_b13: StartForward
        • 0x675d4:$str_b14: StopForward
        • 0x67070:$str_b15: fso.DeleteFile "
        • 0x67004:$str_b16: On Error Resume Next
        • 0x670a0:$str_b17: fso.DeleteFolder "
        • 0x66614:$str_b18: Uploaded file:
        • 0x665d4:$str_b19: Unable to delete:
        • 0x67038:$str_b20: while fso.FileExists("
        • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4a8:$a1: Remcos restarted by watchdog!
            • 0x6ca20:$a3: %02i:%02i:%02i:%03i
            2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
            • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
            • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x6656c:$str_b2: Executing file:
            • 0x675ec:$str_b3: GetDirectListeningPort
            • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x67118:$str_b7: \update.vbs
            • 0x66594:$str_b9: Downloaded file:
            • 0x66580:$str_b10: Downloading file:
            • 0x66624:$str_b12: Failed to upload file:
            • 0x675b4:$str_b13: StartForward
            • 0x675d4:$str_b14: StopForward
            • 0x67070:$str_b15: fso.DeleteFile "
            • 0x67004:$str_b16: On Error Resume Next
            • 0x670a0:$str_b17: fso.DeleteFolder "
            • 0x66614:$str_b18: Uploaded file:
            • 0x665d4:$str_b19: Unable to delete:
            • 0x67038:$str_b20: while fso.FileExists("
            • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
            2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
            • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            • 0x6637c:$s1: CoGetObject
            • 0x66390:$s1: CoGetObject
            • 0x663ac:$s1: CoGetObject
            • 0x70338:$s1: CoGetObject
            • 0x6633c:$s2: Elevation:Administrator!new:
            Click to see the 27 entries

            Stealing of Sensitive Information

            barindex
            Source: Registry Key setAuthor: Joe Security: Data: Details: DA 76 22 27 90 A5 F3 EE 3C 26 53 C2 B0 E9 C9 81 3F 2B 18 12 FC 34 B5 93 91 CD 87 50 50 F9 67 E9 38 89 89 48 C8 DE B6 3D CE CC DB F8 44 D7 31 73 80 E0 B3 08 5D 23 30 BB 30 75 4D 20 CC E9 43 A8 D5 17 D3 E3 76 64 E2 0D D9 08 AE 8D ED F5 2C 8F CD 46 6A 38 61 35 A0 46 03 89 7D 72 B8 D8 51 C0 42 A0 8B 9D 49 9C 1B B1 16 66 F5 40 77 43 42 BF 58 E0 51 96 68 86 B5 74 55 1C C9 5D 5A FD 44 72 BF 36 91 A5 D2 C9 7B 5A FF 36 4D 75 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, ProcessId: 7420, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-TS121V\exepath
            Timestamp:2024-09-02T15:19:10.716529+0200
            SID:2036594
            Severity:1
            Source Port:49732
            Destination Port:2559
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-09-02T15:19:12.098522+0200
            SID:2803304
            Severity:3
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:Unknown Traffic

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpackMalware Configuration Extractor: Remcos {"Version": "5.1.0 Pro", "Host:Port:Password": "192.3.64.152:2559", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TS121V", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeReversingLabs: Detection: 26%
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_00433837
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_1743aa26-f

            Exploits

            barindex
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTR

            Privilege Escalation

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004074FD _wcslen,CoGetObject,2_2_004074FD
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: yiGL.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: Binary string: yiGL.pdb source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409253
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041C291
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040C34D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409665
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_0040880C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040783C FindFirstFileW,FindNextFileW,2_2_0040783C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419AF5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040BB30
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040BD37
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407C97

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49732 -> 192.3.64.152:2559
            Source: Malware configuration extractorURLs: 192.3.64.152
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49734 -> 178.237.33.50:80
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_0041B380
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp)
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000002_2_0040A2B8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B70E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_004168C1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B70E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,2_2_0040A3E0

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTR

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041C9E2 SystemParametersInfoW,2_2_0041C9E2

            System Summary

            barindex
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_004167B4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_033DD5BC0_2_033DD5BC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_059400060_2_05940006
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_059400400_2_05940040
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_09464BA80_2_09464BA8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_0946D8280_2_0946D828
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_0946D8380_2_0946D838
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_0946BC000_2_0946BC00
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_0946B3900_2_0946B390
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_0946D4000_2_0946D400
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_0946B7C80_2_0946B7C8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0043E0CC2_2_0043E0CC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041F0FA2_2_0041F0FA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004541592_2_00454159
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004381682_2_00438168
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004461F02_2_004461F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0043E2FB2_2_0043E2FB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0045332B2_2_0045332B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0042739D2_2_0042739D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004374E62_2_004374E6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0043E5582_2_0043E558
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004387702_2_00438770
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004378FE2_2_004378FE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004339462_2_00433946
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0044D9C92_2_0044D9C9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00427A462_2_00427A46
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041DB622_2_0041DB62
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00427BAF2_2_00427BAF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00437D332_2_00437D33
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00435E5E2_2_00435E5E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00426E0E2_2_00426E0E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0043DE9D2_2_0043DE9D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00413FCA2_2_00413FCA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00436FEA2_2_00436FEA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: String function: 00434E10 appears 54 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: String function: 00402093 appears 50 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: String function: 00434770 appears 41 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: String function: 00401E65 appears 34 times
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745947061.0000000007A00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1746571770.0000000009440000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1742812435.00000000034B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1742812435.0000000003441000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000000.1719870266.0000000000F88000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameyiGL.exe: vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1742052500.000000000148E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeBinary or memory string: OriginalFilenameyiGL.exe: vs SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, DMrtOX8wKSbGEvAH4p.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, DMrtOX8wKSbGEvAH4p.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, DMrtOX8wKSbGEvAH4p.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, DMrtOX8wKSbGEvAH4p.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, DMrtOX8wKSbGEvAH4p.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, DMrtOX8wKSbGEvAH4p.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, XNJjfG7rCvn0KXXdR7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, XNJjfG7rCvn0KXXdR7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@3/2@1/2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_00417952
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,2_2_0040F474
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,2_2_0041B4A8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AA4A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.logJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-TS121V
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMutant created: NULL
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeReversingLabs: Detection: 26%
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: yiGL.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
            Source: Binary string: yiGL.pdb source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe

            Data Obfuscation

            barindex
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, MainForm.cs.Net Code: InitializeComponent
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, DMrtOX8wKSbGEvAH4p.cs.Net Code: YwJfkHcpaT System.Reflection.Assembly.Load(byte[])
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, DMrtOX8wKSbGEvAH4p.cs.Net Code: YwJfkHcpaT System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CB50
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 0_2_033D9C61 push 50058A93h; iretd 0_2_033D9C6D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00457106 push ecx; ret 2_2_00457119
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0045B11A push esp; ret 2_2_0045B141
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00457A28 push eax; ret 2_2_00457A46
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00434E56 push ecx; ret 2_2_00434E69
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeStatic PE information: section name: .text entropy: 7.864938879435836
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, B4IqDjwKIKkX9PETdSk.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FYc4rnjQV4', 'Pk84B1p1tN', 'AaD4ZETidU', 'fUw4AoyCd9', 'thf41B3ZVT', 'EvB4UKYogv', 'h4q4OShsnr'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, n1CHnoSGr4rVKwuS9g.csHigh entropy of concatenated method names: 'GR6cwCPbIX', 'G7GcKm3O35', 'dQUcf6AqT6', 'DbPcHJZ6pb', 'MS8ct5JZOu', 'qRKcWDU0hQ', 'fdccMptOXu', 'PKn9Opf8wk', 'qWL9J4uWka', 'xi79iLgk8q'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, eVSek5tC4TyqrxX3d7.csHigh entropy of concatenated method names: 'Dispose', 'r5Ywihw21h', 'LLQb0Ft3BQ', 'knRVVNyFuZ', 'FQ7wSPB3Hv', 'kikwz5cxd0', 'ProcessDialogKey', 'VUSbudqoyh', 'G77bwgqY3l', 'eaPbbF1CHn'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, nq1RvXawqg2Xyu2Z4B.csHigh entropy of concatenated method names: 'OmWDH7oDf5', 'DgYDjKPyO9', 'h4QDMh1E7Y', 'eNVMSQL9w2', 'ASRMzrkt4y', 'AEqDucSsQi', 'nnpDw08i0C', 'JIfDbrJWhD', 'lR4DKgR2rb', 'BGcDfVa67P'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, YdqoyhiG77gqY3lfaP.csHigh entropy of concatenated method names: 'ojE9GtHirw', 'uRI90lEUGb', 'pUZ9oimoj4', 'SAn92YXeS5', 'jiK9revENk', 'F8e9lUKYUR', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, TvS2lyf8KQ5DEQDaCj.csHigh entropy of concatenated method names: 'xoJwDNJjfG', 'RCvw8n0KXX', 'F7ewNHWYBK', 'sS8wCioXLW', 'AxVwYboBsr', 'H2swqNNrkP', 'egtl9loVQYP3db1q6S', 'c9x0vEzBN5ZrR9stcx', 'vevwwQ41Kw', 'YMOwKxpTmt'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, AybAOMLJKtEs8aAgli.csHigh entropy of concatenated method names: 'je3F71mCbJ', 'HrjFQY3of2', 'qWbFG0d4h9', 'k9EF0jOM16', 'ui9F27YiSh', 'iitFl72KEk', 'GjxFajGXpD', 'p4yFsgDd1X', 'e4wFgtCRaq', 'JmJF5HTFgo'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, BXLONPrtYr5hPl8sIh.csHigh entropy of concatenated method names: 'vtKYginqj3', 'H2PY6Zhslx', 'pqJYrbhJ9w', 'xC9YBNeqr8', 'AkyY0gNAm3', 'RmWYo0FRR7', 'UiiY2ZWegr', 'yRGYlZStJM', 'xuVYIq9kRh', 'idpYa9vlGj'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, Ssro2sGNNrkPw2Eoed.csHigh entropy of concatenated method names: 'kfYMRhXcGF', 'NaJMtKkaWH', 'iTmMW4SfUb', 'j4TMDTfd18', 'yPdM81mO00', 'onxW1vJiHu', 'f3lWUY3Uqx', 'QToWOwnp2O', 'lc3WJGw0q5', 'GBSWiK9dc5'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, LaQDQ3Q7eHWYBKcS8i.csHigh entropy of concatenated method names: 'tNgjvbXeIp', 'M9pjTUv7Br', 'BXnj7pOI2w', 'KaxjQgGAhB', 'DkLjY2Ou4e', 'XGkjqTQMx7', 'YJrjP2wXHb', 'c6cj9iucyK', 'HPxjcLPYnI', 'aWCj44R0A4'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, RCAFM8wuvjW07ukwWrJ.csHigh entropy of concatenated method names: 'KJdchqEJck', 'DtecXnn5bR', 'kxCcktr0D4', 'Dk2cvgVnNx', 'SP7cxhyTTA', 'IvwcTkX158', 'oDWce1YgR3', 'AlSc7PN1vW', 'so0cQywItt', 'w1rc3AtlXh'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, DMrtOX8wKSbGEvAH4p.csHigh entropy of concatenated method names: 'CvBKR8RxPL', 'n9aKHITeRH', 'pxUKtPVYja', 'umtKj8qRmM', 'SHAKWC87C8', 'Vj4KMKT1S7', 'whFKD29T0K', 'ImmK8WeGIh', 'wFgKpZDxUA', 'HiQKNZ14Ic'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, E7PB3HJv8ik5cxd0UU.csHigh entropy of concatenated method names: 'naT9HCBHUi', 'IWL9tFDxac', 'dsK9jYloKr', 'YxE9W1xea2', 'GGZ9Mt4FLD', 'Dq29Du1lHp', 'rOR98xGXLy', 'uYc9pYX1ZL', 'hl29N0r8JR', 'FJs9COCdTW'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, Gq5yw2zfGJtJ3vHmNL.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AgbcFebrKL', 'YcwcYoOiEv', 'hh3cqhHBMt', 'L36cPq306f', 'R5Hc9Y3JyU', 'mb3ccHH8iT', 'JObc4yyAfN'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, NSGSxhEx6o1bwicx7y.csHigh entropy of concatenated method names: 'tA4Dhr7E1i', 'CafDXPCcqr', 'buBDkdtiSg', 'qq4DvcqpbT', 'E8MDxpynZ8', 'ttfDT08AMX', 'jRtDeFVfuy', 'idjD76EyG7', 'kbBDQtmelr', 'bSvD3iMRn1'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, XNJjfG7rCvn0KXXdR7.csHigh entropy of concatenated method names: 'INDtrUotWf', 'sDLtBxoIA5', 'My1tZNExf0', 'eHjtADgXPw', 'dGet1TXFbP', 'sLotUfVoNw', 'FW3tOxtojo', 'iXstJ34mwI', 'uJDtiELQ7n', 'ubLtSPO93D'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, G5klpUbttyGEpBgmnt.csHigh entropy of concatenated method names: 'UFRkuKYiW', 'BBNvRRMiL', 'RhUT6rlIk', 'nAieWsTXh', 'GH3Qlr6ws', 'oeG3fcCGq', 'Aio5SfQPKNt6CBKkYj', 'fwmirUScLt1x15GfcO', 'BfF9ycoES', 'UJk48xOtb'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, B4IqDjwKIKkX9PETdSk.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FYc4rnjQV4', 'Pk84B1p1tN', 'AaD4ZETidU', 'fUw4AoyCd9', 'thf41B3ZVT', 'EvB4UKYogv', 'h4q4OShsnr'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, n1CHnoSGr4rVKwuS9g.csHigh entropy of concatenated method names: 'GR6cwCPbIX', 'G7GcKm3O35', 'dQUcf6AqT6', 'DbPcHJZ6pb', 'MS8ct5JZOu', 'qRKcWDU0hQ', 'fdccMptOXu', 'PKn9Opf8wk', 'qWL9J4uWka', 'xi79iLgk8q'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, eVSek5tC4TyqrxX3d7.csHigh entropy of concatenated method names: 'Dispose', 'r5Ywihw21h', 'LLQb0Ft3BQ', 'knRVVNyFuZ', 'FQ7wSPB3Hv', 'kikwz5cxd0', 'ProcessDialogKey', 'VUSbudqoyh', 'G77bwgqY3l', 'eaPbbF1CHn'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, nq1RvXawqg2Xyu2Z4B.csHigh entropy of concatenated method names: 'OmWDH7oDf5', 'DgYDjKPyO9', 'h4QDMh1E7Y', 'eNVMSQL9w2', 'ASRMzrkt4y', 'AEqDucSsQi', 'nnpDw08i0C', 'JIfDbrJWhD', 'lR4DKgR2rb', 'BGcDfVa67P'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, YdqoyhiG77gqY3lfaP.csHigh entropy of concatenated method names: 'ojE9GtHirw', 'uRI90lEUGb', 'pUZ9oimoj4', 'SAn92YXeS5', 'jiK9revENk', 'F8e9lUKYUR', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, TvS2lyf8KQ5DEQDaCj.csHigh entropy of concatenated method names: 'xoJwDNJjfG', 'RCvw8n0KXX', 'F7ewNHWYBK', 'sS8wCioXLW', 'AxVwYboBsr', 'H2swqNNrkP', 'egtl9loVQYP3db1q6S', 'c9x0vEzBN5ZrR9stcx', 'vevwwQ41Kw', 'YMOwKxpTmt'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, AybAOMLJKtEs8aAgli.csHigh entropy of concatenated method names: 'je3F71mCbJ', 'HrjFQY3of2', 'qWbFG0d4h9', 'k9EF0jOM16', 'ui9F27YiSh', 'iitFl72KEk', 'GjxFajGXpD', 'p4yFsgDd1X', 'e4wFgtCRaq', 'JmJF5HTFgo'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, BXLONPrtYr5hPl8sIh.csHigh entropy of concatenated method names: 'vtKYginqj3', 'H2PY6Zhslx', 'pqJYrbhJ9w', 'xC9YBNeqr8', 'AkyY0gNAm3', 'RmWYo0FRR7', 'UiiY2ZWegr', 'yRGYlZStJM', 'xuVYIq9kRh', 'idpYa9vlGj'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, Ssro2sGNNrkPw2Eoed.csHigh entropy of concatenated method names: 'kfYMRhXcGF', 'NaJMtKkaWH', 'iTmMW4SfUb', 'j4TMDTfd18', 'yPdM81mO00', 'onxW1vJiHu', 'f3lWUY3Uqx', 'QToWOwnp2O', 'lc3WJGw0q5', 'GBSWiK9dc5'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, LaQDQ3Q7eHWYBKcS8i.csHigh entropy of concatenated method names: 'tNgjvbXeIp', 'M9pjTUv7Br', 'BXnj7pOI2w', 'KaxjQgGAhB', 'DkLjY2Ou4e', 'XGkjqTQMx7', 'YJrjP2wXHb', 'c6cj9iucyK', 'HPxjcLPYnI', 'aWCj44R0A4'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, RCAFM8wuvjW07ukwWrJ.csHigh entropy of concatenated method names: 'KJdchqEJck', 'DtecXnn5bR', 'kxCcktr0D4', 'Dk2cvgVnNx', 'SP7cxhyTTA', 'IvwcTkX158', 'oDWce1YgR3', 'AlSc7PN1vW', 'so0cQywItt', 'w1rc3AtlXh'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, DMrtOX8wKSbGEvAH4p.csHigh entropy of concatenated method names: 'CvBKR8RxPL', 'n9aKHITeRH', 'pxUKtPVYja', 'umtKj8qRmM', 'SHAKWC87C8', 'Vj4KMKT1S7', 'whFKD29T0K', 'ImmK8WeGIh', 'wFgKpZDxUA', 'HiQKNZ14Ic'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, E7PB3HJv8ik5cxd0UU.csHigh entropy of concatenated method names: 'naT9HCBHUi', 'IWL9tFDxac', 'dsK9jYloKr', 'YxE9W1xea2', 'GGZ9Mt4FLD', 'Dq29Du1lHp', 'rOR98xGXLy', 'uYc9pYX1ZL', 'hl29N0r8JR', 'FJs9COCdTW'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, Gq5yw2zfGJtJ3vHmNL.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AgbcFebrKL', 'YcwcYoOiEv', 'hh3cqhHBMt', 'L36cPq306f', 'R5Hc9Y3JyU', 'mb3ccHH8iT', 'JObc4yyAfN'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, NSGSxhEx6o1bwicx7y.csHigh entropy of concatenated method names: 'tA4Dhr7E1i', 'CafDXPCcqr', 'buBDkdtiSg', 'qq4DvcqpbT', 'E8MDxpynZ8', 'ttfDT08AMX', 'jRtDeFVfuy', 'idjD76EyG7', 'kbBDQtmelr', 'bSvD3iMRn1'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, XNJjfG7rCvn0KXXdR7.csHigh entropy of concatenated method names: 'INDtrUotWf', 'sDLtBxoIA5', 'My1tZNExf0', 'eHjtADgXPw', 'dGet1TXFbP', 'sLotUfVoNw', 'FW3tOxtojo', 'iXstJ34mwI', 'uJDtiELQ7n', 'ubLtSPO93D'
            Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.7a00000.7.raw.unpack, G5klpUbttyGEpBgmnt.csHigh entropy of concatenated method names: 'UFRkuKYiW', 'BBNvRRMiL', 'RhUT6rlIk', 'nAieWsTXh', 'GH3Qlr6ws', 'oeG3fcCGq', 'Aio5SfQPKNt6CBKkYj', 'fwmirUScLt1x15GfcO', 'BfF9ycoES', 'UJk48xOtb'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00406EB0 ShellExecuteW,URLDownloadToFileW,2_2_00406EB0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AA4A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CB50
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040F7A7 Sleep,ExitProcess,2_2_0040F7A7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: 32F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: 3440000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: 32F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: 9470000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: 7C10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: A470000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: B470000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_0041A748
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeWindow / User API: threadDelayed 386Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeWindow / User API: threadDelayed 9608Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe TID: 7280Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe TID: 7448Thread sleep count: 386 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe TID: 7448Thread sleep time: -1158000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe TID: 7448Thread sleep count: 9608 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe TID: 7448Thread sleep time: -28824000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409253
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041C291
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040C34D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409665
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_0040880C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040783C FindFirstFileW,FindNextFileW,2_2_0040783C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419AF5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040BB30
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040BD37
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407C97
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DE0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeAPI call chain: ExitProcess graph end nodegraph_2-48190
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004349F9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CB50
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004432B5 mov eax, dword ptr fs:[00000030h]2_2_004432B5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00412077 GetProcessHeap,HeapFree,2_2_00412077
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004349F9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00434B47 SetUnhandledExceptionFilter,2_2_00434B47
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043BB22
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00434FDC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe2_2_004120F7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00419627 mouse_event,2_2_00419627
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe"Jump to behavior
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerj
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager`
            Source: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00434C52 cpuid 2_2_00434C52
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetLocaleInfoA,2_2_0040F8D1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: EnumSystemLocalesW,2_2_00452036
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_004520C3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetLocaleInfoW,2_2_00452313
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: EnumSystemLocalesW,2_2_00448404
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_0045243C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetLocaleInfoW,2_2_00452543
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00452610
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: GetLocaleInfoW,2_2_004488ED
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_00451CD8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: EnumSystemLocalesW,2_2_00451F50
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: EnumSystemLocalesW,2_2_00451F9B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_00404F51 GetLocalTime,CreateEventA,CreateThread,2_2_00404F51
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_0041B60D GetComputerNameExW,GetUserNameW,2_2_0041B60D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: 2_2_004493AD _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,2_2_004493AD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0040BA12
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0040BB30
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: \key3.db2_2_0040BB30

            Remote Access Functionality

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TS121VJump to behavior
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.469e210.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.45e39f0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe.4462250.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe PID: 7420, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeCode function: cmd.exe2_2_0040569A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            12
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Command and Scripting Interpreter
            1
            Windows Service
            1
            Bypass User Account Control
            1
            Deobfuscate/Decode Files or Information
            111
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol111
            Input Capture
            2
            Encrypted Channel
            Exfiltration Over Bluetooth1
            Defacement
            Email AddressesDNS ServerDomain Accounts2
            Service Execution
            Logon Script (Windows)1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            2
            Credentials In Files
            1
            System Service Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Remote Access Software
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Windows Service
            12
            Software Packing
            NTDS2
            File and Directory Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets33
            System Information Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Bypass User Account Control
            Cached Domain Credentials21
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Masquerading
            DCSync31
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
            Virtualization/Sandbox Evasion
            Proc Filesystem2
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
            Process Injection
            Network Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe26%ReversingLabsWin32.Trojan.Generic
            SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.fontbureau.com0%URL Reputationsafe
            http://www.fontbureau.com/designersG0%URL Reputationsafe
            http://www.fontbureau.com/designers/?0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.fontbureau.com/designers?0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.fontbureau.com/designers0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://geoplugin.net/json.gpSystem320%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://geoplugin.net/json.gp0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
            http://geoplugin.net/json.gp/C0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.fontbureau.com/designers80%URL Reputationsafe
            http://www.fonts.com0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
            http://geoplugin.net/json.gp)0%Avira URL Cloudsafe
            192.3.64.1520%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            geoplugin.net
            178.237.33.50
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpfalse
              • URL Reputation: safe
              unknown
              192.3.64.152true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://geoplugin.net/json.gp)SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000DA2000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.goodfont.co.krSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://geoplugin.net/json.gpSystem32SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comlSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sajatypeworks.comSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.typography.netDSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cnSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://geoplugin.net/json.gp/CSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.comSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sandoll.co.krSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sakkal.comSecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, 00000000.00000002.1745345437.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              178.237.33.50
              geoplugin.netNetherlands
              8455ATOM86-ASATOM86NLfalse
              192.3.64.152
              unknownUnited States
              36352AS-COLOCROSSINGUStrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1502949
              Start date and time:2024-09-02 15:18:11 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 43s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              Detection:MAL
              Classification:mal100.rans.troj.spyw.expl.evad.winEXE@3/2@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 63
              • Number of non-executed functions: 200
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              TimeTypeDescription
              09:19:08API Interceptor5043824x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              178.237.33.502024082801362910.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              SecuriteInfo.com.BackDoor.AgentTeslaNET.34.20311.495.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              Document#.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              Revised SOA-INV023010924.xla.xlsxGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              87890090.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              t7A1BhMgJ2.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              KbUI.exeGet hashmaliciousRemcos, PureLog Stealer, XRedBrowse
              • geoplugin.net/json.gp
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.12262.2326.rtfGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              geoplugin.net2024082801362910.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.BackDoor.AgentTeslaNET.34.20311.495.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Document#.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Revised SOA-INV023010924.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              87890090.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              t7A1BhMgJ2.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              KbUI.exeGet hashmaliciousRemcos, PureLog Stealer, XRedBrowse
              • 178.237.33.50
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.12262.2326.rtfGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              AS-COLOCROSSINGUS1Td9Py5FAy.xlsGet hashmaliciousUnknownBrowse
              • 172.245.135.155
              1Td9Py5FAy.xlsGet hashmaliciousUnknownBrowse
              • 172.245.135.155
              Thermo Fisher RFQ_TFS-1705.xlsGet hashmaliciousGuLoaderBrowse
              • 192.3.243.166
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.30284.2728.rtfGet hashmaliciousUnknownBrowse
              • 23.95.235.112
              Revised SOA-INV023010924.xla.xlsxGet hashmaliciousRemcosBrowse
              • 23.95.235.112
              Thermo Fisher RFQ_TFS-1705.xlsGet hashmaliciousGuLoaderBrowse
              • 107.172.31.21
              MACHINE_SPECIFICATION.jsGet hashmaliciousWSHRatBrowse
              • 192.210.215.11
              mirai.arm.elfGet hashmaliciousMiraiBrowse
              • 107.175.213.122
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.12869.5405.rtfGet hashmaliciousSmokeLoaderBrowse
              • 23.94.148.16
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.12262.2326.rtfGet hashmaliciousRemcosBrowse
              • 192.3.243.166
              ATOM86-ASATOM86NL2024082801362910.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.BackDoor.AgentTeslaNET.34.20311.495.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Document#.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Revised SOA-INV023010924.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              87890090.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              t7A1BhMgJ2.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              KbUI.exeGet hashmaliciousRemcos, PureLog Stealer, XRedBrowse
              • 178.237.33.50
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.12262.2326.rtfGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              No context
              No context
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.34331486778365
              Encrypted:false
              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
              MD5:1330C80CAAC9A0FB172F202485E9B1E8
              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
              Malicious:true
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              File Type:JSON data
              Category:dropped
              Size (bytes):962
              Entropy (8bit):5.013811273052389
              Encrypted:false
              SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
              MD5:18BC6D34FABB00C1E30D98E8DAEC814A
              SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
              SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
              SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.826841301540333
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Win16/32 Executable Delphi generic (2074/23) 0.01%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              File size:950'272 bytes
              MD5:2f152c46d438316bf3f0bf69147d3198
              SHA1:d7cfbadb49cab8fdbbe536452bce74b7f7a0d74f
              SHA256:b22f032935d1ecabe852ea8f41bc541c19367c380ba2f502b398f3fc8b775e82
              SHA512:090198731df32c3bde77a9920e22cc1aa64e184cd3f547e0a00e2d837c7acaa70e9ae730b3b683f3b645a0dab0442dcac7b4e289e6c52e65e336d0229263b98e
              SSDEEP:24576:IEOhFc0Szr3X/tuv+KBSh+4TCgIJwYezARFO:IEcWlzrHqqOezw
              TLSH:6515126C521AE802C5649B790EB1FA755A1DADFEF901D3238FDCAEEFB532C156C00192
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0T.f..............0..P... .......`... ........@.. ....................................@................................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x4e608a
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x66D55430 [Mon Sep 2 05:59:12 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xe60380x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x5d8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0xe4ffc0x54.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xe40900xe5000bdbf3d95ac1174ac36b58322acd5bc02False0.9489724771424672data7.864938879435836IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xe80000x5d80x100070bd47e6fe209d1cc0b643e0735b2005False0.163330078125data1.9614688292160218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xea0000xc0x10009f79f88028e84cb56f06bef7b549da64False0.0087890625data0.016408464515625623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0xe80900x346data0.4224343675417661
              RT_MANIFEST0xe83e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
              DLLImport
              mscoree.dll_CorExeMain
              TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
              2024-09-02T15:19:10.716529+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497322559192.168.2.4192.3.64.152
              2024-09-02T15:19:12.098522+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa34973480192.168.2.4178.237.33.50
              TimestampSource PortDest PortSource IPDest IP
              Sep 2, 2024 15:19:10.114236116 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:10.119262934 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:10.119389057 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:10.131160975 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:10.136003971 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:10.673149109 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:10.716528893 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:10.797302961 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:10.801525116 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:10.806324959 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:10.806425095 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:10.811214924 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:11.297919989 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:11.299279928 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:11.304210901 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:11.415889978 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:11.466401100 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:11.490020990 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:19:11.495906115 CEST8049734178.237.33.50192.168.2.4
              Sep 2, 2024 15:19:11.495985985 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:19:11.496135950 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:19:11.500982046 CEST8049734178.237.33.50192.168.2.4
              Sep 2, 2024 15:19:12.098426104 CEST8049734178.237.33.50192.168.2.4
              Sep 2, 2024 15:19:12.098521948 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:19:12.106890917 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:12.111759901 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:13.098337889 CEST8049734178.237.33.50192.168.2.4
              Sep 2, 2024 15:19:13.098400116 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:19:33.214199066 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:19:33.215709925 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:19:33.220611095 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:20:03.252064943 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:20:03.253643990 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:20:03.261451006 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:20:33.518095016 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:20:33.519484997 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:20:33.524379015 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:21:01.451318026 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:01.759608984 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:02.372818947 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:03.457401991 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:21:03.459319115 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:21:03.464143038 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:21:03.575998068 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:05.982244015 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:10.794732094 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:20.404110909 CEST4973480192.168.2.4178.237.33.50
              Sep 2, 2024 15:21:33.588028908 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:21:33.589627028 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:21:33.594369888 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:22:03.653038979 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:22:03.654455900 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:22:03.659363985 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:22:33.895291090 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:22:33.900032043 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:22:33.904853106 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:23:04.006750107 CEST255949732192.3.64.152192.168.2.4
              Sep 2, 2024 15:23:04.008120060 CEST497322559192.168.2.4192.3.64.152
              Sep 2, 2024 15:23:04.012933016 CEST255949732192.3.64.152192.168.2.4
              TimestampSource PortDest PortSource IPDest IP
              Sep 2, 2024 15:19:11.475758076 CEST6041553192.168.2.41.1.1.1
              Sep 2, 2024 15:19:11.484833002 CEST53604151.1.1.1192.168.2.4
              Sep 2, 2024 15:19:51.035931110 CEST5355187162.159.36.2192.168.2.4
              Sep 2, 2024 15:19:51.489598989 CEST53574271.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Sep 2, 2024 15:19:11.475758076 CEST192.168.2.41.1.1.10x9de1Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Sep 2, 2024 15:19:11.484833002 CEST1.1.1.1192.168.2.40x9de1No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
              • geoplugin.net
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.449734178.237.33.50807420C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              TimestampBytes transferredDirectionData
              Sep 2, 2024 15:19:11.496135950 CEST71OUTGET /json.gp HTTP/1.1
              Host: geoplugin.net
              Cache-Control: no-cache
              Sep 2, 2024 15:19:12.098426104 CEST1170INHTTP/1.1 200 OK
              date: Mon, 02 Sep 2024 13:19:12 GMT
              server: Apache
              content-length: 962
              content-type: application/json; charset=utf-8
              cache-control: public, max-age=300
              access-control-allow-origin: *
              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
              Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:09:19:07
              Start date:02/09/2024
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe"
              Imagebase:0xea0000
              File size:950'272 bytes
              MD5 hash:2F152C46D438316BF3F0BF69147D3198
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1743501296.0000000004449000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:09:19:09
              Start date:02/09/2024
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe"
              Imagebase:0x5f0000
              File size:950'272 bytes
              MD5 hash:2F152C46D438316BF3F0BF69147D3198
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4185267627.0000000000D67000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:9.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:204
                Total number of Limit Nodes:4
                execution_graph 40666 33d4668 40667 33d467f 40666->40667 40668 33d468b 40667->40668 40672 33d4781 40667->40672 40677 33d3e40 40668->40677 40670 33d46aa 40673 33d47a5 40672->40673 40681 33d4881 40673->40681 40685 33d4890 40673->40685 40678 33d3e4b 40677->40678 40693 33d5c54 40678->40693 40680 33d7050 40680->40670 40683 33d4890 40681->40683 40682 33d4994 40682->40682 40683->40682 40689 33d44c4 40683->40689 40686 33d48b7 40685->40686 40687 33d44c4 CreateActCtxA 40686->40687 40688 33d4994 40686->40688 40687->40688 40690 33d5920 CreateActCtxA 40689->40690 40692 33d59e3 40690->40692 40694 33d5c5f 40693->40694 40697 33d5c74 40694->40697 40696 33d70f5 40696->40680 40698 33d5c7f 40697->40698 40701 33d5ca4 40698->40701 40700 33d71da 40700->40696 40702 33d5caf 40701->40702 40705 33d5cd4 40702->40705 40704 33d72cd 40704->40700 40706 33d5cdf 40705->40706 40708 33d8370 40706->40708 40712 33d8618 40706->40712 40707 33d8609 40707->40704 40708->40707 40718 33dcd78 40708->40718 40723 33dcd77 40708->40723 40713 33d85b2 40712->40713 40715 33d8627 40712->40715 40714 33d8609 40713->40714 40716 33dcd78 2 API calls 40713->40716 40717 33dcd77 2 API calls 40713->40717 40714->40708 40715->40708 40716->40714 40717->40714 40719 33dcd99 40718->40719 40720 33dcdbd 40719->40720 40728 33dcf28 40719->40728 40732 33dcf18 40719->40732 40720->40707 40724 33dcd99 40723->40724 40725 33dcdbd 40724->40725 40726 33dcf28 2 API calls 40724->40726 40727 33dcf18 2 API calls 40724->40727 40725->40707 40726->40725 40727->40725 40729 33dcf35 40728->40729 40730 33dcf6f 40729->40730 40736 33dbae0 40729->40736 40730->40720 40733 33dcf28 40732->40733 40734 33dcf6f 40733->40734 40735 33dbae0 2 API calls 40733->40735 40734->40720 40735->40734 40737 33dbaeb 40736->40737 40739 33ddc88 40737->40739 40740 33dd2dc 40737->40740 40739->40739 40741 33dd2e7 40740->40741 40742 33d5cd4 2 API calls 40741->40742 40743 33ddcf7 40742->40743 40747 33dfa70 40743->40747 40752 33dfa88 40743->40752 40744 33ddd31 40744->40739 40749 33dfa88 40747->40749 40748 33dfac5 40748->40744 40749->40748 40750 59409c0 CreateWindowExW CreateWindowExW 40749->40750 40751 59409b2 CreateWindowExW CreateWindowExW 40749->40751 40750->40748 40751->40748 40754 33dfab9 40752->40754 40755 33dfbb9 40752->40755 40753 33dfac5 40753->40744 40754->40753 40756 59409c0 CreateWindowExW CreateWindowExW 40754->40756 40757 59409b2 CreateWindowExW CreateWindowExW 40754->40757 40755->40744 40756->40755 40757->40755 40758 946e110 40759 946e155 Wow64SetThreadContext 40758->40759 40761 946e19d 40759->40761 40762 18ad01c 40763 18ad034 40762->40763 40764 18ad08e 40763->40764 40769 5941aa8 40763->40769 40774 5941a98 40763->40774 40779 5942808 40763->40779 40784 5942818 40763->40784 40770 5941ace 40769->40770 40772 5942818 2 API calls 40770->40772 40773 5942808 2 API calls 40770->40773 40771 5941aef 40771->40764 40772->40771 40773->40771 40775 5941aa8 40774->40775 40777 5942818 2 API calls 40775->40777 40778 5942808 2 API calls 40775->40778 40776 5941aef 40776->40764 40777->40776 40778->40776 40780 5942818 40779->40780 40781 5942877 40780->40781 40789 59429a0 40780->40789 40794 5942991 40780->40794 40785 5942845 40784->40785 40786 5942877 40785->40786 40787 59429a0 2 API calls 40785->40787 40788 5942991 2 API calls 40785->40788 40787->40786 40788->40786 40791 59429b4 40789->40791 40790 5942a40 40790->40781 40799 5942a58 40791->40799 40802 5942a48 40791->40802 40796 59429a0 40794->40796 40795 5942a40 40795->40781 40797 5942a58 2 API calls 40796->40797 40798 5942a48 2 API calls 40796->40798 40797->40795 40798->40795 40800 5942a69 40799->40800 40806 5944012 40799->40806 40800->40790 40803 5942a58 40802->40803 40804 5942a69 40803->40804 40805 5944012 2 API calls 40803->40805 40804->40790 40805->40804 40810 5944030 40806->40810 40814 5944040 40806->40814 40807 594402a 40807->40800 40811 5944040 40810->40811 40812 59440da CallWindowProcW 40811->40812 40813 5944089 40811->40813 40812->40813 40813->40807 40815 5944082 40814->40815 40817 5944089 40814->40817 40816 59440da CallWindowProcW 40815->40816 40815->40817 40816->40817 40817->40807 40858 946e060 40859 946e063 ResumeThread 40858->40859 40861 946e0d1 40859->40861 40870 946e530 40871 946e5b9 CreateProcessA 40870->40871 40873 946e77b 40871->40873 40818 5947d88 40819 5947db5 40818->40819 40830 5947954 40819->40830 40821 5947e22 40822 5947954 2 API calls 40821->40822 40823 5947e54 40822->40823 40834 5947974 40823->40834 40825 5947e86 40826 5947954 2 API calls 40825->40826 40827 5948127 40826->40827 40828 5947974 2 API calls 40827->40828 40829 59481bd 40828->40829 40831 594795f 40830->40831 40833 5949769 40831->40833 40840 5947ba4 40831->40840 40833->40821 40835 594797f 40834->40835 40836 594a542 40835->40836 40837 33d8618 2 API calls 40835->40837 40838 33d830a 2 API calls 40835->40838 40839 33d5cd4 2 API calls 40835->40839 40836->40825 40837->40836 40838->40836 40839->40836 40841 5947baf 40840->40841 40843 33d8618 2 API calls 40841->40843 40845 33d5cd4 2 API calls 40841->40845 40846 33d830a 40841->40846 40842 594985c 40842->40833 40843->40842 40845->40842 40847 33d8265 40846->40847 40848 33d8313 40846->40848 40849 33d8370 40848->40849 40853 33d8618 2 API calls 40848->40853 40850 33d8609 40849->40850 40851 33dcd78 2 API calls 40849->40851 40852 33dcd77 2 API calls 40849->40852 40850->40842 40851->40850 40852->40850 40853->40849 40634 33dacb0 40638 33dada8 40634->40638 40646 33dad97 40634->40646 40635 33dacbf 40639 33dadb9 40638->40639 40640 33daddc 40638->40640 40639->40640 40654 33db031 40639->40654 40658 33db040 40639->40658 40640->40635 40641 33dadd4 40641->40640 40642 33dafe0 GetModuleHandleW 40641->40642 40643 33db00d 40642->40643 40643->40635 40647 33dadb9 40646->40647 40648 33daddc 40646->40648 40647->40648 40652 33db031 LoadLibraryExW 40647->40652 40653 33db040 LoadLibraryExW 40647->40653 40648->40635 40649 33dadd4 40649->40648 40650 33dafe0 GetModuleHandleW 40649->40650 40651 33db00d 40650->40651 40651->40635 40652->40649 40653->40649 40655 33db054 40654->40655 40656 33db079 40655->40656 40662 33da130 40655->40662 40656->40641 40659 33db054 40658->40659 40660 33da130 LoadLibraryExW 40659->40660 40661 33db079 40659->40661 40660->40661 40661->40641 40663 33db220 LoadLibraryExW 40662->40663 40665 33db299 40663->40665 40665->40656 40874 33dd040 40875 33dd086 40874->40875 40879 33dd628 40875->40879 40882 33dd618 40875->40882 40876 33dd173 40886 33dd27c 40879->40886 40883 33dd628 40882->40883 40884 33dd27c DuplicateHandle 40883->40884 40885 33dd656 40884->40885 40885->40876 40887 33dd690 DuplicateHandle 40886->40887 40888 33dd656 40887->40888 40888->40876 40854 946e398 40855 946e3e3 ReadProcessMemory 40854->40855 40857 946e427 40855->40857 40862 946e1e8 40863 946e1eb VirtualAllocEx 40862->40863 40865 946e265 40863->40865 40866 946e2a8 40867 946e2ab WriteProcessMemory 40866->40867 40869 946e347 40867->40869
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dbba86d8bd7d51296add077d7de70a0d8faa01c4c5dc45f460c72528ca519952
                • Instruction ID: 94f9f2de8eecb97803ddd6ad2191632b7260971c61a30dd6386ad9686e93872e
                • Opcode Fuzzy Hash: dbba86d8bd7d51296add077d7de70a0d8faa01c4c5dc45f460c72528ca519952
                • Instruction Fuzzy Hash: DDB106B4A09264DFCB158F69D44027ABFB1FF42311F1581ABE155CB6B2C7359843CBA2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 400 946e52e-946e5c5 403 946e5c7-946e5d1 400->403 404 946e5fe-946e61e 400->404 403->404 405 946e5d3-946e5d5 403->405 409 946e657-946e686 404->409 410 946e620-946e62a 404->410 407 946e5d7-946e5e1 405->407 408 946e5f8-946e5fb 405->408 411 946e5e5-946e5f4 407->411 412 946e5e3 407->412 408->404 420 946e6bf-946e779 CreateProcessA 409->420 421 946e688-946e692 409->421 410->409 413 946e62c-946e62e 410->413 411->411 414 946e5f6 411->414 412->411 415 946e630-946e63a 413->415 416 946e651-946e654 413->416 414->408 418 946e63e-946e64d 415->418 419 946e63c 415->419 416->409 418->418 422 946e64f 418->422 419->418 432 946e782-946e808 420->432 433 946e77b-946e781 420->433 421->420 423 946e694-946e696 421->423 422->416 425 946e698-946e6a2 423->425 426 946e6b9-946e6bc 423->426 427 946e6a6-946e6b5 425->427 428 946e6a4 425->428 426->420 427->427 429 946e6b7 427->429 428->427 429->426 443 946e80a-946e80e 432->443 444 946e818-946e81c 432->444 433->432 443->444 447 946e810 443->447 445 946e81e-946e822 444->445 446 946e82c-946e830 444->446 445->446 448 946e824 445->448 449 946e832-946e836 446->449 450 946e840-946e844 446->450 447->444 448->446 449->450 451 946e838 449->451 452 946e856-946e85d 450->452 453 946e846-946e84c 450->453 451->450 454 946e874 452->454 455 946e85f-946e86e 452->455 453->452 456 946e875 454->456 455->454 456->456
                APIs
                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0946E766
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: 2bf38c2b5091b7be5a3f4ac222dfe070e8cc3d1ef8568bad79a99bbdf64ee14b
                • Instruction ID: a2df618f06b4369b55112b453a1fb5e68416fdebaa278fa1ec10b0901602d922
                • Opcode Fuzzy Hash: 2bf38c2b5091b7be5a3f4ac222dfe070e8cc3d1ef8568bad79a99bbdf64ee14b
                • Instruction Fuzzy Hash: 4B914CB5D00219DFDB14CFA8C8417DEBBF2BF48314F1481AAE819A7290DB749995CF92

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 458 946e530-946e5c5 460 946e5c7-946e5d1 458->460 461 946e5fe-946e61e 458->461 460->461 462 946e5d3-946e5d5 460->462 466 946e657-946e686 461->466 467 946e620-946e62a 461->467 464 946e5d7-946e5e1 462->464 465 946e5f8-946e5fb 462->465 468 946e5e5-946e5f4 464->468 469 946e5e3 464->469 465->461 477 946e6bf-946e779 CreateProcessA 466->477 478 946e688-946e692 466->478 467->466 470 946e62c-946e62e 467->470 468->468 471 946e5f6 468->471 469->468 472 946e630-946e63a 470->472 473 946e651-946e654 470->473 471->465 475 946e63e-946e64d 472->475 476 946e63c 472->476 473->466 475->475 479 946e64f 475->479 476->475 489 946e782-946e808 477->489 490 946e77b-946e781 477->490 478->477 480 946e694-946e696 478->480 479->473 482 946e698-946e6a2 480->482 483 946e6b9-946e6bc 480->483 484 946e6a6-946e6b5 482->484 485 946e6a4 482->485 483->477 484->484 486 946e6b7 484->486 485->484 486->483 500 946e80a-946e80e 489->500 501 946e818-946e81c 489->501 490->489 500->501 504 946e810 500->504 502 946e81e-946e822 501->502 503 946e82c-946e830 501->503 502->503 505 946e824 502->505 506 946e832-946e836 503->506 507 946e840-946e844 503->507 504->501 505->503 506->507 508 946e838 506->508 509 946e856-946e85d 507->509 510 946e846-946e84c 507->510 508->507 511 946e874 509->511 512 946e85f-946e86e 509->512 510->509 513 946e875 511->513 512->511 513->513
                APIs
                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0946E766
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: 94ea599d1a1b1ff9dd0165d937088662f0597de8333fbb8253b5a052f53d1e05
                • Instruction ID: 2d634be730ea81180651cb2c5904fa6bf96fe75a02c445e0ece34f6bb4f9dbe1
                • Opcode Fuzzy Hash: 94ea599d1a1b1ff9dd0165d937088662f0597de8333fbb8253b5a052f53d1e05
                • Instruction Fuzzy Hash: 73914CB5D00219DFDB14CFA8C8417DEBBF2BF48314F1481AAE819A7290DB749995CF92

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 515 33dada8-33dadb7 516 33dadb9-33dadc6 call 33da0cc 515->516 517 33dade3-33dade7 515->517 522 33daddc 516->522 523 33dadc8 516->523 518 33dade9-33dadf3 517->518 519 33dadfb-33dae3c 517->519 518->519 526 33dae3e-33dae46 519->526 527 33dae49-33dae57 519->527 522->517 571 33dadce call 33db031 523->571 572 33dadce call 33db040 523->572 526->527 529 33dae59-33dae5e 527->529 530 33dae7b-33dae7d 527->530 528 33dadd4-33dadd6 528->522 531 33daf18-33dafd8 528->531 533 33dae69 529->533 534 33dae60-33dae67 call 33da0d8 529->534 532 33dae80-33dae87 530->532 566 33dafda-33dafdd 531->566 567 33dafe0-33db00b GetModuleHandleW 531->567 537 33dae89-33dae91 532->537 538 33dae94-33dae9b 532->538 536 33dae6b-33dae79 533->536 534->536 536->532 537->538 540 33dae9d-33daea5 538->540 541 33daea8-33daeaa call 33da0e8 538->541 540->541 544 33daeaf-33daeb1 541->544 546 33daebe-33daec3 544->546 547 33daeb3-33daebb 544->547 548 33daec5-33daecc 546->548 549 33daee1-33daeee 546->549 547->546 548->549 551 33daece-33daede call 33da0f8 call 33da108 548->551 556 33daf11-33daf17 549->556 557 33daef0-33daf0e 549->557 551->549 557->556 566->567 568 33db00d-33db013 567->568 569 33db014-33db028 567->569 568->569 571->528 572->528
                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 033DAFFE
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 4ae664fcaf7877f6510de0cad0f4c2d07f3a8d7c9411577bed6029ccb6cac1c7
                • Instruction ID: d95704cc5081d614f2739170744a82a063a8bcc08535fee355a871a5ff49a4be
                • Opcode Fuzzy Hash: 4ae664fcaf7877f6510de0cad0f4c2d07f3a8d7c9411577bed6029ccb6cac1c7
                • Instruction Fuzzy Hash: 91714671A00B058FD724DF29E99075ABBF5FF88300F048A2DD486DBA50DB75E949CB91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 573 59418e4-5941956 575 5941961-5941968 573->575 576 5941958-594195e 573->576 577 5941973-5941a12 CreateWindowExW 575->577 578 594196a-5941970 575->578 576->575 580 5941a14-5941a1a 577->580 581 5941a1b-5941a53 577->581 578->577 580->581 585 5941a55-5941a58 581->585 586 5941a60 581->586 585->586 587 5941a61 586->587 587->587
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05941A02
                Memory Dump Source
                • Source File: 00000000.00000002.1744818738.0000000005940000.00000040.00000800.00020000.00000000.sdmp, Offset: 05940000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5940000_SecuriteInfo.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: ce34ab4e652dc21120a81531bada33468e5e34a9fe2065e6114fab5b108a4161
                • Instruction ID: 214159ab1ee52ff7e252162326a7f1c75535b7b5bbd4c1f19376ef7914b32012
                • Opcode Fuzzy Hash: ce34ab4e652dc21120a81531bada33468e5e34a9fe2065e6114fab5b108a4161
                • Instruction Fuzzy Hash: 5B51C1B1D003499FDB14CF99D984ADEBFB5FF88310F24852AE819AB210D771A985CF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 588 59418f0-5941956 589 5941961-5941968 588->589 590 5941958-594195e 588->590 591 5941973-5941a12 CreateWindowExW 589->591 592 594196a-5941970 589->592 590->589 594 5941a14-5941a1a 591->594 595 5941a1b-5941a53 591->595 592->591 594->595 599 5941a55-5941a58 595->599 600 5941a60 595->600 599->600 601 5941a61 600->601 601->601
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05941A02
                Memory Dump Source
                • Source File: 00000000.00000002.1744818738.0000000005940000.00000040.00000800.00020000.00000000.sdmp, Offset: 05940000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5940000_SecuriteInfo.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 87270b1f32bca681defbb9719a6871fcf6d985619c48098c856692c9706330f6
                • Instruction ID: 2153eec989f32fcd0c6f351cb31c22875cf7e766924d3d5cd8a7e1abcff53e54
                • Opcode Fuzzy Hash: 87270b1f32bca681defbb9719a6871fcf6d985619c48098c856692c9706330f6
                • Instruction Fuzzy Hash: C641BFB1D00349DFDB14CFA9C984ADEBBB5FF48350F24852AE819AB210D771A985CF91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 602 33d44c4-33d59e1 CreateActCtxA 605 33d59ea-33d5a44 602->605 606 33d59e3-33d59e9 602->606 613 33d5a46-33d5a49 605->613 614 33d5a53-33d5a57 605->614 606->605 613->614 615 33d5a59-33d5a65 614->615 616 33d5a68 614->616 615->616 618 33d5a69 616->618 618->618
                APIs
                • CreateActCtxA.KERNEL32(?), ref: 033D59D1
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: Create
                • String ID:
                • API String ID: 2289755597-0
                • Opcode ID: 2b140db0550f90f523302c9e919167323950746535973410746adf1ea2264ee3
                • Instruction ID: 08e9f86db940ab496c8fadd08db56860679e0f45c7f36a805bb481f65493ced1
                • Opcode Fuzzy Hash: 2b140db0550f90f523302c9e919167323950746535973410746adf1ea2264ee3
                • Instruction Fuzzy Hash: 1B41B2B1C0062DCBDB24DFA9C884BDDBBF5BF49304F24805AD409AB255DBB56945CF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 619 33d5914-33d591a 620 33d5920-33d59e1 CreateActCtxA 619->620 622 33d59ea-33d5a44 620->622 623 33d59e3-33d59e9 620->623 630 33d5a46-33d5a49 622->630 631 33d5a53-33d5a57 622->631 623->622 630->631 632 33d5a59-33d5a65 631->632 633 33d5a68 631->633 632->633 635 33d5a69 633->635 635->635
                APIs
                • CreateActCtxA.KERNEL32(?), ref: 033D59D1
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: Create
                • String ID:
                • API String ID: 2289755597-0
                • Opcode ID: 448d11ff8a9294b9cb55d4d33dfb16d860a85c6f82a79aadc02467255be99773
                • Instruction ID: be3411960a2d51349671d21b2b9aad77b9203d025ccfca73556043a1d6af736b
                • Opcode Fuzzy Hash: 448d11ff8a9294b9cb55d4d33dfb16d860a85c6f82a79aadc02467255be99773
                • Instruction Fuzzy Hash: 8341D2B1C00629CFEB24DFA9C884BDEBBF5BF49304F24805AD408AB255DB756945CF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 636 5944040-594407c 637 5944082-5944087 636->637 638 594412c-594414c 636->638 639 5944089-59440c0 637->639 640 59440da-5944112 CallWindowProcW 637->640 644 594414f-594415c 638->644 647 59440c2-59440c8 639->647 648 59440c9-59440d8 639->648 641 5944114-594411a 640->641 642 594411b-594412a 640->642 641->642 642->644 647->648 648->644
                APIs
                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05944101
                Memory Dump Source
                • Source File: 00000000.00000002.1744818738.0000000005940000.00000040.00000800.00020000.00000000.sdmp, Offset: 05940000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5940000_SecuriteInfo.jbxd
                Similarity
                • API ID: CallProcWindow
                • String ID:
                • API String ID: 2714655100-0
                • Opcode ID: 76fb1a672539bee455b77c6d99053ac481b75aeabbbf01004f16a5ae8fa80777
                • Instruction ID: 857a853408cdfb6ae49e174714999c50a9815b162cd84a579941e0e20e364a95
                • Opcode Fuzzy Hash: 76fb1a672539bee455b77c6d99053ac481b75aeabbbf01004f16a5ae8fa80777
                • Instruction Fuzzy Hash: 784106B4A003058FDB14CF99C888EAABBF5FB9C314F248459D519AB321D774A841CFA0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 650 946e2a0-946e2a2 651 946e2a4-946e2a9 650->651 652 946e2ab-946e2f6 650->652 651->652 655 946e306-946e345 WriteProcessMemory 652->655 656 946e2f8-946e304 652->656 658 946e347-946e34d 655->658 659 946e34e-946e37e 655->659 656->655 658->659
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0946E338
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 6000128898db2b7c5aa707bdabe5e8545b1af19a8b4514d7f4b6c17b0a2876ae
                • Instruction ID: e7bd9c8e2226422e932b555111577b21997f00502003630bcadc31366e9b72ac
                • Opcode Fuzzy Hash: 6000128898db2b7c5aa707bdabe5e8545b1af19a8b4514d7f4b6c17b0a2876ae
                • Instruction Fuzzy Hash: EB2148B5900349DFCB10CFA9C885BDEBBF5FF88310F10842AE518A7250C7789594CBA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 663 946e1e0-946e1e2 664 946e1e4 663->664 665 946e1eb-946e22b 663->665 666 946e1e6-946e1e9 664->666 667 946e1a5-946e1d4 664->667 670 946e232-946e263 VirtualAllocEx 665->670 666->665 671 946e265-946e26b 670->671 672 946e26c-946e291 670->672 671->672
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0946E256
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: e07f8647484df6d56a280be4997ac06a427d18c66739d144157102aba494fc6d
                • Instruction ID: f5371faa39751a1c94bd79c45fa4116177f9ffb7a1c87e9ce3d1539e8b82a8fe
                • Opcode Fuzzy Hash: e07f8647484df6d56a280be4997ac06a427d18c66739d144157102aba494fc6d
                • Instruction Fuzzy Hash: B221BBB68002499BDB10DFA9D841BEEBFF4EF88320F14842AE524A72A1C7345554CBA1
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0946E338
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 883c9ecb2b9b58bf2bdd0e61ec5782d17f9bd815f00c57c38c8a85e128a6c22c
                • Instruction ID: af3b055a37fa9d8937ef212756dca583306611451d64ea42c74fef372b9ef6a2
                • Opcode Fuzzy Hash: 883c9ecb2b9b58bf2bdd0e61ec5782d17f9bd815f00c57c38c8a85e128a6c22c
                • Instruction Fuzzy Hash: E12125B59003599FCB10CFAAC885BDEBBF5FF48310F10842AE958A7250C7789994CBA5
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0946E418
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: bcd8a431c7b731e96df301f0cba824e801f6ea0c7833ac8bc01daec54c32a178
                • Instruction ID: 7cf068db746bdc67adc87da4d3a2afd31a9eeef699f44bff5290aa24fde6dbad
                • Opcode Fuzzy Hash: bcd8a431c7b731e96df301f0cba824e801f6ea0c7833ac8bc01daec54c32a178
                • Instruction Fuzzy Hash: A32169B28002099FCB10CFA9C880AEEFBF4FF48320F10842AE518A7250D7349951CFA1
                APIs
                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0946E18E
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: 660ce804556b5a5ae4888f3644b0920a9321b592cde3cab460d10a8ca1822267
                • Instruction ID: 7903a5772e86e9ce32c1911affc85b0079735328631e7fd42008331edcd1be01
                • Opcode Fuzzy Hash: 660ce804556b5a5ae4888f3644b0920a9321b592cde3cab460d10a8ca1822267
                • Instruction Fuzzy Hash: 1E2157B19003088FDB10DFAAC8847EFBBF4EF48324F10842AE459A7250CB789944CFA5
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,033DD656,?,?,?,?,?), ref: 033DD717
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: af17e30974298272e4e83512bff0801be04280aebfbb1212a196d70f18b5241e
                • Instruction ID: f21c86f627985502e4dc35b5d845d5c772a687be7f7cd33aa6da51bfd6b9a058
                • Opcode Fuzzy Hash: af17e30974298272e4e83512bff0801be04280aebfbb1212a196d70f18b5241e
                • Instruction Fuzzy Hash: 0721D2B59002489FDB10CF9AD984ADEBBF8EB48310F14845AE958A7311D374A954CFA5
                APIs
                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0946E18E
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: 1a155a53150a78e09294025272cde567e0120a72f61cb8f3f975b8bbad0c4f52
                • Instruction ID: 5849d265be47d1a6736a8fb68746f8663c803a870949e38211d90e8dade501ff
                • Opcode Fuzzy Hash: 1a155a53150a78e09294025272cde567e0120a72f61cb8f3f975b8bbad0c4f52
                • Instruction Fuzzy Hash: 062138B19003098FDB10DFAAC4857EFBBF4EF48324F10842AD459A7251CB789945CFA5
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0946E418
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: 4bea31ca9303bd6e90386c8d76f40e92901c74746f54c59bec0076f03f310113
                • Instruction ID: bcf0ebd961a1c1bc6f156653eb6b145d3239d041a3c126cc20b619031d1f6008
                • Opcode Fuzzy Hash: 4bea31ca9303bd6e90386c8d76f40e92901c74746f54c59bec0076f03f310113
                • Instruction Fuzzy Hash: 302128B18003599FCB10DFAAC880AEEFBF5FF48310F10842AE558A7250C7349554CBA5
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,033DD656,?,?,?,?,?), ref: 033DD717
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 776e80ebcdbfd7f5827880931eda92ef651cefa139d23f5b62df6f36cecb0581
                • Instruction ID: c3e727c53bae188e333009094b27b158816e93c6df50af2a8c57307aeb779e0d
                • Opcode Fuzzy Hash: 776e80ebcdbfd7f5827880931eda92ef651cefa139d23f5b62df6f36cecb0581
                • Instruction Fuzzy Hash: 6721E4B5900218DFDB10CF99D584ADEBBF4FF48314F14841AE914A7310C374A954CFA4
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,033DB079,00000800,00000000,00000000), ref: 033DB28A
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 3ad13c9314f2ee54ecf706fca6b3c6f54cf6dbf21145fb7d507f18b5530c16dc
                • Instruction ID: 6ff2d6881058564488cd2ccd93612767e67bab40378f47e1c104f7a18c7458b6
                • Opcode Fuzzy Hash: 3ad13c9314f2ee54ecf706fca6b3c6f54cf6dbf21145fb7d507f18b5530c16dc
                • Instruction Fuzzy Hash: 5511D3B69002099FDB10CF9AD884ADEFBF4EB48310F15842EE559A7210C775A545CFA5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 736de61a33578f306e9abd7693b49dc44823a5196157cf4307c93a51fd863a06
                • Instruction ID: 1d3db8ee834baa5dd23cd8a42943184ccb827796e28330b9fac0a515c229cc2e
                • Opcode Fuzzy Hash: 736de61a33578f306e9abd7693b49dc44823a5196157cf4307c93a51fd863a06
                • Instruction Fuzzy Hash: C71149B59002588BCB20DFAAD8457DFFBF4EB88324F10841AD419A7250CA75A544CBA5
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,033DB079,00000800,00000000,00000000), ref: 033DB28A
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: e7df92a058540f7b17269c000815cc7b16eb582d9f508f9f48dd43fd3de2aa38
                • Instruction ID: b6c20764899714150a6f707681a4b50f6340873e43326e4b70aae5cef4fdad40
                • Opcode Fuzzy Hash: e7df92a058540f7b17269c000815cc7b16eb582d9f508f9f48dd43fd3de2aa38
                • Instruction Fuzzy Hash: B81123B68003498FDB10CF9AD884ADEFBF4FB48320F14842EE459A7210C775A545CFA4
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0946E256
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 8b7a942bfeea0ad3830600900779b8c0b2eaa44fb5c823a4b8adc1a63ec2ce9e
                • Instruction ID: 1828945a4c44ae0ae74c6195fd2c4782ba5aef098d215c0ef682a294bb694409
                • Opcode Fuzzy Hash: 8b7a942bfeea0ad3830600900779b8c0b2eaa44fb5c823a4b8adc1a63ec2ce9e
                • Instruction Fuzzy Hash: E61167B19002488FCB10DFAAC844BDFBFF5EF88320F10841AE519A7250C775A950CFA1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 28eb4a810b9df234669147471127b50e754b8ceab7a3eb033f40777c94a11661
                • Instruction ID: a38923f31f3ce8576626b1e82546f266fb7341909b248a1315ae538bd13a03f8
                • Opcode Fuzzy Hash: 28eb4a810b9df234669147471127b50e754b8ceab7a3eb033f40777c94a11661
                • Instruction Fuzzy Hash: 9C1125B19002588FDB20DFAAC4457DFFBF4EB88324F20882AD559A7250CB75A944CFA5
                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 033DAFFE
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: a726bdea773f3b9ec61c07627bc015ad47ff99f75814bcfded0f3caca1ebb2e2
                • Instruction ID: 32a668da95a60dca4ec19f6c1c2ce531b325b8516a2fd773fa4e003077f2021d
                • Opcode Fuzzy Hash: a726bdea773f3b9ec61c07627bc015ad47ff99f75814bcfded0f3caca1ebb2e2
                • Instruction Fuzzy Hash: 5311DFB6C006498FCB10CF9AD884ADEFBF4EF88324F15846AD469A7210D379A545CFA5
                Memory Dump Source
                • Source File: 00000000.00000002.1742315031.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_189d000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 50420dcbc60cf650e814b4be05659d012ce81ee0f731c8739bb0b0bec9887756
                • Instruction ID: 8634d6ba6884b8bc815d7fd8b28acaaee1b76a0be51cbe0d943ba4240f58fc3b
                • Opcode Fuzzy Hash: 50420dcbc60cf650e814b4be05659d012ce81ee0f731c8739bb0b0bec9887756
                • Instruction Fuzzy Hash: 28216471500204DFCF01DF58CAC0B2BBF65FB88318F28C269E8098B256C336D546CBA2
                Memory Dump Source
                • Source File: 00000000.00000002.1742315031.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_189d000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 404e34927213a325fbd619613b9f6b24a71310fb56e48fe28cbf803853177009
                • Instruction ID: 6a4f979177d4fed4bc1453b0b370129edc803e02f0cff400ae01fe7e90a2a744
                • Opcode Fuzzy Hash: 404e34927213a325fbd619613b9f6b24a71310fb56e48fe28cbf803853177009
                • Instruction Fuzzy Hash: C0214871100204DFDF01DF48C9C0B66BF65FB84314F28C269E9098F256C33AE546C6A1
                Memory Dump Source
                • Source File: 00000000.00000002.1742359098.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_18ad000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be08d5ceff65e5615b058d21dfaff94a16661e6b1744834a566fa482c22adefe
                • Instruction ID: 60231f5f1cdc32d30e45dccbed60049ae10cad42dadc19f8b2522631f9be8355
                • Opcode Fuzzy Hash: be08d5ceff65e5615b058d21dfaff94a16661e6b1744834a566fa482c22adefe
                • Instruction Fuzzy Hash: 3F214271284204DFEB11DF68D9C0B26BFA1EB88318F60C66DD80ACB656C33AC507CA61
                Memory Dump Source
                • Source File: 00000000.00000002.1742359098.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_18ad000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 20dffabf33e43e3c3ab707ed15ee48dd8d686ae132db6d15a06ad48263690b36
                • Instruction ID: 13212e18fb9c4aacc11bb44ddeed44345423a4e21161ab44b3f5ad959528ac72
                • Opcode Fuzzy Hash: 20dffabf33e43e3c3ab707ed15ee48dd8d686ae132db6d15a06ad48263690b36
                • Instruction Fuzzy Hash: EB214971504204DFEB01DF98C5C0B26BBA5FB84328F60C76DD809CB752C33AE546CA61
                Memory Dump Source
                • Source File: 00000000.00000002.1742359098.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_18ad000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6eafb18fbe0ddbe68bf5f3c60503330f37bdbbde09f492422f0399e0be47ae1b
                • Instruction ID: 247275f819aeefe3bd89964d31f26ad1fb7d6514f54850dd13d1715e6ae3845c
                • Opcode Fuzzy Hash: 6eafb18fbe0ddbe68bf5f3c60503330f37bdbbde09f492422f0399e0be47ae1b
                • Instruction Fuzzy Hash: 5421B0754483809FDB03CF24D994711BF71EB46314F28C6EAD8498F6A7C33A980ACB62
                Memory Dump Source
                • Source File: 00000000.00000002.1742315031.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_189d000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                • Instruction ID: 603a4c740b5e954ef4d72c1fbbb278c7864ebeb5a8ed0b1faa2f5694e5694eba
                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                • Instruction Fuzzy Hash: 7411DC72404280CFDF02CF44D9C4B56BF72FB94324F28C2A9D9094B256C33AE55ACBA2
                Memory Dump Source
                • Source File: 00000000.00000002.1742315031.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_189d000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                • Instruction ID: 6e137f0bfc8e52d7e8ad2f87ff264810dba2be711ae9188fd69c8612ea5da11f
                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                • Instruction Fuzzy Hash: 5511E176404280CFCF02CF54D5C4B16BF71FB84318F28C6A9E8094B256C336D55ACBA1
                Memory Dump Source
                • Source File: 00000000.00000002.1742359098.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_18ad000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                • Instruction ID: 290adf441c34ae7e3d306d9d8875f25f458652887c3ef3dfa2b7c4149af90fd5
                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                • Instruction Fuzzy Hash: 4C11BB75504280DFEB02CF54C5C4B15BFA2FB84324F24C6AAD8498B6A6C33AE40ACB61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: A;xq
                • API String ID: 0-3929430113
                • Opcode ID: 9276c214d06d89f0f8f35d88059a6beaaf3aaf4aae6f1919cd78c213fdf301a6
                • Instruction ID: 8ffd142a0736a34c531667174fea4e76f91b550fef308199b48a8c1e2d2701a0
                • Opcode Fuzzy Hash: 9276c214d06d89f0f8f35d88059a6beaaf3aaf4aae6f1919cd78c213fdf301a6
                • Instruction Fuzzy Hash: 38E11BB4E041198FDB14DFA9C5809AEFBB2FF88304F24916AE414AB356D731AD42CF61
                Memory Dump Source
                • Source File: 00000000.00000002.1744818738.0000000005940000.00000040.00000800.00020000.00000000.sdmp, Offset: 05940000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5940000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b4d6cbf0e04390b1e1948c9929deabfb279294621ba732ecfab00f17ba779a66
                • Instruction ID: d8b2ee39556b8da66204e7b5cd32ed4752c4727758684de13b1b2785dd79ef21
                • Opcode Fuzzy Hash: b4d6cbf0e04390b1e1948c9929deabfb279294621ba732ecfab00f17ba779a66
                • Instruction Fuzzy Hash: F012B7B4422745AAE310CF6DE94E1B93FB3FB41318B504229ED615B2E1DFB8254ACF44
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 22fc63e26f161313adf58bae37f675d1adea8391e49325df7c0c3403c60d4891
                • Instruction ID: 72ac048e22ba63b2a534f8a5affb667db10c23a59bf1387b2423d4478bdf9744
                • Opcode Fuzzy Hash: 22fc63e26f161313adf58bae37f675d1adea8391e49325df7c0c3403c60d4891
                • Instruction Fuzzy Hash: 70E11DB4E001198FDB14DFA9C9819AEFBB2FF89304F24816AE414AB355D731AD42CF65
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c79982ac8b8d9755f166aef48cb790b3dc97d1e49ceb2eb9fbae40629544057
                • Instruction ID: 09ccc77381e7a4fd042a2c9a0f4bd9874cec5fed469e36b393b8d70ca1796675
                • Opcode Fuzzy Hash: 7c79982ac8b8d9755f166aef48cb790b3dc97d1e49ceb2eb9fbae40629544057
                • Instruction Fuzzy Hash: ADE11CB4E041198FDB14DFA9C5809AEFBB2FF89304F24816AE454AB356D731AD42CF61
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e86ef0f1b3db6b6855ddaed547e62211ec9b08ef5b9e00c4d7f10dc7bcb008cb
                • Instruction ID: 252f9f2f6efd6e9d19c82859fd924bd6bb2610c6b1d177728372fe4e46308982
                • Opcode Fuzzy Hash: e86ef0f1b3db6b6855ddaed547e62211ec9b08ef5b9e00c4d7f10dc7bcb008cb
                • Instruction Fuzzy Hash: D2E10BB4E001198FDB14DF99C9819AEFBB2FF89304F24916AE414AB355D731AD42CF61
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 23583155a568811aa98f20619db6a62b407db2d16ec95e9d8a7e14d9a080ba37
                • Instruction ID: f25514491c72431c34b9870cf90a938b3a53ef380b389a53d259ab129e21bc1f
                • Opcode Fuzzy Hash: 23583155a568811aa98f20619db6a62b407db2d16ec95e9d8a7e14d9a080ba37
                • Instruction Fuzzy Hash: FAE11DB4E041198FDB14DFA9C5819AEFBB2FF89304F24816AE414AB355D731AD42CF61
                Memory Dump Source
                • Source File: 00000000.00000002.1742623836.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33d0000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 50dce77a3db4b650bfa1e7c7b1222e030bc12576f705bbdb3ef955561ed8d38c
                • Instruction ID: 8478050b06e252e1e33dcd1e7ed73387e90352bada8ad97b5fc753a0273f10ba
                • Opcode Fuzzy Hash: 50dce77a3db4b650bfa1e7c7b1222e030bc12576f705bbdb3ef955561ed8d38c
                • Instruction Fuzzy Hash: 01A17D36E102158FCF05DFB4D8C05AEBBB2FF85301B1985AAE806AF265DB71E955CB40
                Memory Dump Source
                • Source File: 00000000.00000002.1744818738.0000000005940000.00000040.00000800.00020000.00000000.sdmp, Offset: 05940000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5940000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6b6cbaa48b79d0ce4a79bd77112d307a6de3a4ef67776481b3bc6bc58a1d9cfe
                • Instruction ID: 64e87ac00f958fc80ac2a25ff0c1da104c76e32ca4ddc2dc64f17d930df7b6f6
                • Opcode Fuzzy Hash: 6b6cbaa48b79d0ce4a79bd77112d307a6de3a4ef67776481b3bc6bc58a1d9cfe
                • Instruction Fuzzy Hash: 7BC12AB0421746ABD710CF2CE84A1B97FB3FB81314B544229ED616B2E1DFB8254ACF44
                Memory Dump Source
                • Source File: 00000000.00000002.1746609408.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_9460000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 896da860478a99251aa3fca5167968c8a252b9f56236e0f28408b049bf3e9ef6
                • Instruction ID: de4706d525011d5413ef88c4c7c7a8dca0beacc7499be13bf5cefda3a5b12b34
                • Opcode Fuzzy Hash: 896da860478a99251aa3fca5167968c8a252b9f56236e0f28408b049bf3e9ef6
                • Instruction Fuzzy Hash: 2551FAB4E002198BDB14CFA9C9415AEFBF2EF89314F24C16AD418AB356D7359D42CFA1

                Execution Graph

                Execution Coverage:4%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:5.5%
                Total number of Nodes:1301
                Total number of Limit Nodes:52
                execution_graph 46652 434887 46653 434893 ___BuildCatchObject 46652->46653 46679 434596 46653->46679 46655 43489a 46657 4348c3 46655->46657 46977 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 46655->46977 46665 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46657->46665 46978 444251 5 API calls _ValidateLocalCookies 46657->46978 46659 4348dc 46661 4348e2 ___BuildCatchObject 46659->46661 46979 4441f5 5 API calls _ValidateLocalCookies 46659->46979 46662 434962 46690 434b14 46662->46690 46665->46662 46980 4433e7 36 API calls 6 library calls 46665->46980 46672 434984 46673 43498e 46672->46673 46982 44341f 28 API calls _abort 46672->46982 46675 434997 46673->46675 46983 4433c2 28 API calls _abort 46673->46983 46984 43470d 13 API calls 2 library calls 46675->46984 46678 43499f 46678->46661 46680 43459f 46679->46680 46985 434c52 IsProcessorFeaturePresent 46680->46985 46682 4345ab 46986 438f31 10 API calls 4 library calls 46682->46986 46684 4345b0 46685 4345b4 46684->46685 46987 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46684->46987 46685->46655 46687 4345bd 46688 4345cb 46687->46688 46988 438f5a 8 API calls 3 library calls 46687->46988 46688->46655 46989 436e90 46690->46989 46693 434968 46694 4441a2 46693->46694 46991 44f059 46694->46991 46696 4441ab 46698 434971 46696->46698 46995 446815 36 API calls 46696->46995 46699 40e9c5 46698->46699 46997 41cb50 LoadLibraryA GetProcAddress 46699->46997 46701 40e9e1 GetModuleFileNameW 47002 40f3c3 46701->47002 46703 40e9fd 47017 4020f6 46703->47017 46706 4020f6 28 API calls 46707 40ea1b 46706->46707 47023 41be1b 46707->47023 46711 40ea2d 47049 401e8d 46711->47049 46713 40ea36 46714 40ea93 46713->46714 46715 40ea49 46713->46715 47055 401e65 46714->47055 47323 40fbb3 97 API calls 46715->47323 46718 40eaa3 46722 401e65 22 API calls 46718->46722 46719 40ea5b 46720 401e65 22 API calls 46719->46720 46721 40ea67 46720->46721 47324 410f37 36 API calls __EH_prolog 46721->47324 46723 40eac2 46722->46723 47060 40531e 46723->47060 46726 40ead1 47065 406383 46726->47065 46727 40ea79 47325 40fb64 78 API calls 46727->47325 46731 40ea82 47326 40f3b0 71 API calls 46731->47326 46737 401fd8 11 API calls 46739 40eefb 46737->46739 46738 401fd8 11 API calls 46740 40eafb 46738->46740 46981 4432f6 GetModuleHandleW 46739->46981 46741 401e65 22 API calls 46740->46741 46742 40eb04 46741->46742 47082 401fc0 46742->47082 46744 40eb0f 46745 401e65 22 API calls 46744->46745 46746 40eb28 46745->46746 46747 401e65 22 API calls 46746->46747 46748 40eb43 46747->46748 46749 40ebae 46748->46749 47327 406c1e 46748->47327 46751 401e65 22 API calls 46749->46751 46756 40ebbb 46751->46756 46752 40eb70 46753 401fe2 28 API calls 46752->46753 46754 40eb7c 46753->46754 46757 401fd8 11 API calls 46754->46757 46755 40ec02 47086 40d069 46755->47086 46756->46755 46761 413549 3 API calls 46756->46761 46758 40eb85 46757->46758 47332 413549 RegOpenKeyExA 46758->47332 46760 40ec08 46762 40ea8b 46760->46762 47089 41b2c3 46760->47089 46768 40ebe6 46761->46768 46762->46737 46766 40ec23 46769 40ec76 46766->46769 47106 407716 46766->47106 46767 40f34f 47415 4139a9 30 API calls 46767->47415 46768->46755 47335 4139a9 30 API calls 46768->47335 46771 401e65 22 API calls 46769->46771 46775 40ec7f 46771->46775 46774 40f365 47416 412475 65 API calls ___scrt_get_show_window_mode 46774->47416 46784 40ec90 46775->46784 46785 40ec8b 46775->46785 46778 40ec42 47336 407738 30 API calls 46778->47336 46779 40ec4c 46780 401e65 22 API calls 46779->46780 46793 40ec55 46780->46793 46781 40f36f 46783 41bc5e 28 API calls 46781->46783 46788 40f37f 46783->46788 46787 401e65 22 API calls 46784->46787 47339 407755 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 46785->47339 46786 40ec47 47337 407260 98 API calls 46786->47337 46791 40ec99 46787->46791 47215 413a23 RegOpenKeyExW 46788->47215 47110 41bc5e 46791->47110 46793->46769 46797 40ec71 46793->46797 46794 40eca4 47114 401f13 46794->47114 47338 407260 98 API calls 46797->47338 46801 401f09 11 API calls 46803 40f39c 46801->46803 46805 401f09 11 API calls 46803->46805 46807 40f3a5 46805->46807 46806 401e65 22 API calls 46808 40ecc1 46806->46808 47218 40dd42 46807->47218 46813 401e65 22 API calls 46808->46813 46812 40f3af 46814 40ecdb 46813->46814 46815 401e65 22 API calls 46814->46815 46816 40ecf5 46815->46816 46817 401e65 22 API calls 46816->46817 46819 40ed0e 46817->46819 46818 40ed7b 46820 40ed8a 46818->46820 46827 40ef06 ___scrt_get_show_window_mode 46818->46827 46819->46818 46821 401e65 22 API calls 46819->46821 46822 40ed93 46820->46822 46850 40ee0f ___scrt_get_show_window_mode 46820->46850 46825 40ed23 _wcslen 46821->46825 46823 401e65 22 API calls 46822->46823 46824 40ed9c 46823->46824 46826 401e65 22 API calls 46824->46826 46825->46818 46828 401e65 22 API calls 46825->46828 46829 40edae 46826->46829 47400 4136f8 RegOpenKeyExA 46827->47400 46830 40ed3e 46828->46830 46832 401e65 22 API calls 46829->46832 46833 401e65 22 API calls 46830->46833 46834 40edc0 46832->46834 46835 40ed53 46833->46835 46838 401e65 22 API calls 46834->46838 47340 40da34 46835->47340 46836 40ef51 46837 401e65 22 API calls 46836->46837 46839 40ef76 46837->46839 46841 40ede9 46838->46841 47136 402093 46839->47136 46844 401e65 22 API calls 46841->46844 46843 401f13 28 API calls 46846 40ed72 46843->46846 46847 40edfa 46844->46847 46849 401f09 11 API calls 46846->46849 47398 40cdf9 45 API calls _wcslen 46847->47398 46848 40ef88 47142 41376f RegCreateKeyA 46848->47142 46849->46818 47126 413947 46850->47126 46854 40eea3 ctype 46859 401e65 22 API calls 46854->46859 46855 40ee0a 46855->46850 46857 401e65 22 API calls 46858 40efaa 46857->46858 47148 43baac 46858->47148 46860 40eeba 46859->46860 46860->46836 46864 40eece 46860->46864 46863 40efc1 47403 41cd9b 87 API calls ___scrt_get_show_window_mode 46863->47403 46866 401e65 22 API calls 46864->46866 46865 40efe4 46870 402093 28 API calls 46865->46870 46868 40eed7 46866->46868 46871 41bc5e 28 API calls 46868->46871 46869 40efc8 CreateThread 46869->46865 48193 41d45d 10 API calls 46869->48193 46872 40eff9 46870->46872 46873 40eee3 46871->46873 46874 402093 28 API calls 46872->46874 47399 40f474 104 API calls 46873->47399 46876 40f008 46874->46876 47152 41b4ef 46876->47152 46877 40eee8 46877->46836 46879 40eeef 46877->46879 46879->46762 46881 401e65 22 API calls 46882 40f019 46881->46882 46883 401e65 22 API calls 46882->46883 46884 40f02b 46883->46884 46885 401e65 22 API calls 46884->46885 46886 40f04b 46885->46886 46887 43baac 40 API calls 46886->46887 46888 40f058 46887->46888 46889 401e65 22 API calls 46888->46889 46890 40f063 46889->46890 46891 401e65 22 API calls 46890->46891 46892 40f074 46891->46892 46893 401e65 22 API calls 46892->46893 46894 40f089 46893->46894 46895 401e65 22 API calls 46894->46895 46896 40f09a 46895->46896 46897 40f0a1 StrToIntA 46896->46897 47176 409de4 46897->47176 46900 401e65 22 API calls 46901 40f0bc 46900->46901 46902 40f101 46901->46902 46903 40f0c8 46901->46903 46906 401e65 22 API calls 46902->46906 47404 4344ea 46903->47404 46908 40f111 46906->46908 46907 401e65 22 API calls 46909 40f0e4 46907->46909 46910 40f159 46908->46910 46911 40f11d 46908->46911 46912 40f0eb CreateThread 46909->46912 46914 401e65 22 API calls 46910->46914 46913 4344ea new 22 API calls 46911->46913 46912->46902 48191 419fb4 103 API calls __EH_prolog 46912->48191 46915 40f126 46913->46915 46916 40f162 46914->46916 46917 401e65 22 API calls 46915->46917 46919 40f1cc 46916->46919 46920 40f16e 46916->46920 46918 40f138 46917->46918 46921 40f13f CreateThread 46918->46921 46922 401e65 22 API calls 46919->46922 46923 401e65 22 API calls 46920->46923 46921->46910 48196 419fb4 103 API calls __EH_prolog 46921->48196 46924 40f1d5 46922->46924 46925 40f17e 46923->46925 46926 40f1e1 46924->46926 46927 40f21a 46924->46927 46928 401e65 22 API calls 46925->46928 46929 401e65 22 API calls 46926->46929 47201 41b60d GetComputerNameExW GetUserNameW 46927->47201 46930 40f193 46928->46930 46932 40f1ea 46929->46932 47411 40d9e8 31 API calls 46930->47411 46938 401e65 22 API calls 46932->46938 46934 401f13 28 API calls 46935 40f22e 46934->46935 46937 401f09 11 API calls 46935->46937 46940 40f237 46937->46940 46941 40f1ff 46938->46941 46939 40f1a6 46942 401f13 28 API calls 46939->46942 46943 40f240 SetProcessDEPPolicy 46940->46943 46944 40f243 CreateThread 46940->46944 46951 43baac 40 API calls 46941->46951 46945 40f1b2 46942->46945 46943->46944 46946 40f264 46944->46946 46947 40f258 CreateThread 46944->46947 48164 40f7a7 46944->48164 46948 401f09 11 API calls 46945->46948 46949 40f279 46946->46949 46950 40f26d CreateThread 46946->46950 46947->46946 48192 4120f7 138 API calls 46947->48192 46952 40f1bb CreateThread 46948->46952 46954 40f2cc 46949->46954 46956 402093 28 API calls 46949->46956 46950->46949 48194 4126db 38 API calls ___scrt_get_show_window_mode 46950->48194 46953 40f20c 46951->46953 46952->46919 48195 401be9 50 API calls 46952->48195 47412 40c162 7 API calls 46953->47412 47212 4134ff RegOpenKeyExA 46954->47212 46957 40f29c 46956->46957 47413 4052fd 28 API calls 46957->47413 46963 40f2ed 46965 41bc5e 28 API calls 46963->46965 46967 40f2fd 46965->46967 47414 41361b 31 API calls 46967->47414 46971 40f313 46972 401f09 11 API calls 46971->46972 46975 40f31e 46972->46975 46973 40f346 DeleteFileW 46974 40f34d 46973->46974 46973->46975 46974->46781 46975->46781 46975->46973 46976 40f334 Sleep 46975->46976 46976->46975 46977->46655 46978->46659 46979->46665 46980->46662 46981->46672 46982->46673 46983->46675 46984->46678 46985->46682 46986->46684 46987->46687 46988->46685 46990 434b27 GetStartupInfoW 46989->46990 46990->46693 46992 44f06b 46991->46992 46993 44f062 46991->46993 46992->46696 46996 44ef58 49 API calls 4 library calls 46993->46996 46995->46696 46996->46992 46998 41cb8f LoadLibraryA GetProcAddress 46997->46998 46999 41cb7f GetModuleHandleA GetProcAddress 46997->46999 47000 41cbb8 44 API calls 46998->47000 47001 41cba8 LoadLibraryA GetProcAddress 46998->47001 46999->46998 47000->46701 47001->47000 47417 41b4a8 FindResourceA 47002->47417 47006 40f3ed ctype 47427 4020b7 47006->47427 47009 401fe2 28 API calls 47010 40f413 47009->47010 47011 401fd8 11 API calls 47010->47011 47012 40f41c 47011->47012 47013 43bd51 _Yarn 21 API calls 47012->47013 47014 40f42d ctype 47013->47014 47433 406dd8 47014->47433 47016 40f460 47016->46703 47018 40210c 47017->47018 47019 4023ce 11 API calls 47018->47019 47020 402126 47019->47020 47021 402569 28 API calls 47020->47021 47022 402134 47021->47022 47022->46706 47470 4020df 47023->47470 47025 41be9e 47026 401fd8 11 API calls 47025->47026 47027 41bed0 47026->47027 47029 401fd8 11 API calls 47027->47029 47028 41bea0 47030 4041a2 28 API calls 47028->47030 47032 41bed8 47029->47032 47033 41beac 47030->47033 47034 401fd8 11 API calls 47032->47034 47036 401fe2 28 API calls 47033->47036 47035 40ea24 47034->47035 47045 40fb17 47035->47045 47038 41beb5 47036->47038 47037 401fe2 28 API calls 47044 41be2e 47037->47044 47039 401fd8 11 API calls 47038->47039 47041 41bebd 47039->47041 47040 401fd8 11 API calls 47040->47044 47042 41ce34 28 API calls 47041->47042 47042->47025 47044->47025 47044->47028 47044->47037 47044->47040 47474 4041a2 47044->47474 47477 41ce34 47044->47477 47046 40fb23 47045->47046 47048 40fb2a 47045->47048 47519 402163 11 API calls 47046->47519 47048->46711 47050 402163 47049->47050 47054 40219f 47050->47054 47520 402730 11 API calls 47050->47520 47052 402184 47521 402712 11 API calls std::_Deallocate 47052->47521 47054->46713 47056 401e6d 47055->47056 47057 401e75 47056->47057 47522 402158 22 API calls 47056->47522 47057->46718 47061 4020df 11 API calls 47060->47061 47062 40532a 47061->47062 47523 4032a0 47062->47523 47064 405346 47064->46726 47528 4051ef 47065->47528 47067 406391 47532 402055 47067->47532 47070 401fe2 47071 401ff1 47070->47071 47078 402039 47070->47078 47072 4023ce 11 API calls 47071->47072 47073 401ffa 47072->47073 47074 40203c 47073->47074 47076 402015 47073->47076 47075 40267a 11 API calls 47074->47075 47075->47078 47566 403098 28 API calls 47076->47566 47079 401fd8 47078->47079 47080 4023ce 11 API calls 47079->47080 47081 401fe1 47080->47081 47081->46738 47083 401fd2 47082->47083 47084 401fc9 47082->47084 47083->46744 47567 4025e0 28 API calls 47084->47567 47568 401fab 47086->47568 47088 40d073 CreateMutexA GetLastError 47088->46760 47569 41bfb7 47089->47569 47094 401fe2 28 API calls 47095 41b2ff 47094->47095 47096 401fd8 11 API calls 47095->47096 47098 41b307 47096->47098 47097 41b35d 47097->46766 47098->47097 47099 4135a6 31 API calls 47098->47099 47100 41b330 47099->47100 47101 41b33b StrToIntA 47100->47101 47102 41b352 47101->47102 47103 41b349 47101->47103 47105 401fd8 11 API calls 47102->47105 47577 41cf69 22 API calls 47103->47577 47105->47097 47107 40772a 47106->47107 47108 413549 3 API calls 47107->47108 47109 407731 47108->47109 47109->46778 47109->46779 47111 41bc72 47110->47111 47578 40b904 47111->47578 47113 41bc7a 47113->46794 47115 401f22 47114->47115 47116 401f6a 47114->47116 47117 402252 11 API calls 47115->47117 47123 401f09 47116->47123 47118 401f2b 47117->47118 47119 401f6d 47118->47119 47120 401f46 47118->47120 47611 402336 47119->47611 47610 40305c 28 API calls 47120->47610 47124 402252 11 API calls 47123->47124 47125 401f12 47124->47125 47125->46806 47127 413965 47126->47127 47128 406dd8 28 API calls 47127->47128 47129 41397a 47128->47129 47130 4020f6 28 API calls 47129->47130 47131 41398a 47130->47131 47132 41376f 14 API calls 47131->47132 47133 413994 47132->47133 47134 401fd8 11 API calls 47133->47134 47135 4139a1 47134->47135 47135->46854 47137 40209b 47136->47137 47138 4023ce 11 API calls 47137->47138 47139 4020a6 47138->47139 47615 4024ed 47139->47615 47143 4137bf 47142->47143 47145 413788 47142->47145 47144 401fd8 11 API calls 47143->47144 47146 40ef9e 47144->47146 47147 41379a RegSetValueExA RegCloseKey 47145->47147 47146->46857 47147->47143 47149 43bac5 _swprintf 47148->47149 47619 43ae03 47149->47619 47151 40efb7 47151->46863 47151->46865 47153 41b5a0 47152->47153 47154 41b505 GetLocalTime 47152->47154 47156 401fd8 11 API calls 47153->47156 47155 40531e 28 API calls 47154->47155 47157 41b547 47155->47157 47158 41b5a8 47156->47158 47160 406383 28 API calls 47157->47160 47159 401fd8 11 API calls 47158->47159 47161 40f00d 47159->47161 47162 41b553 47160->47162 47161->46881 47647 402f10 47162->47647 47165 406383 28 API calls 47166 41b56b 47165->47166 47652 407200 77 API calls 47166->47652 47168 41b579 47169 401fd8 11 API calls 47168->47169 47170 41b585 47169->47170 47171 401fd8 11 API calls 47170->47171 47172 41b58e 47171->47172 47173 401fd8 11 API calls 47172->47173 47174 41b597 47173->47174 47175 401fd8 11 API calls 47174->47175 47175->47153 47177 409e02 _wcslen 47176->47177 47178 409e24 47177->47178 47179 409e0d 47177->47179 47180 40da34 31 API calls 47178->47180 47181 40da34 31 API calls 47179->47181 47182 409e2c 47180->47182 47183 409e15 47181->47183 47185 401f13 28 API calls 47182->47185 47184 401f13 28 API calls 47183->47184 47187 409e1f 47184->47187 47186 409e3a 47185->47186 47188 401f09 11 API calls 47186->47188 47189 401f09 11 API calls 47187->47189 47190 409e42 47188->47190 47191 409e79 47189->47191 47671 40915b 28 API calls 47190->47671 47656 40a109 47191->47656 47194 409e54 47672 403014 47194->47672 47198 401f13 28 API calls 47199 409e69 47198->47199 47200 401f09 11 API calls 47199->47200 47200->47187 47724 40417e 47201->47724 47206 403014 28 API calls 47207 41b672 47206->47207 47208 401f09 11 API calls 47207->47208 47209 41b67b 47208->47209 47210 401f09 11 API calls 47209->47210 47211 40f223 47210->47211 47211->46934 47213 413520 RegQueryValueExA RegCloseKey 47212->47213 47214 40f2e4 47212->47214 47213->47214 47214->46807 47214->46963 47216 413a3f RegDeleteValueW 47215->47216 47217 40f392 47215->47217 47216->47217 47217->46801 47219 40dd5b 47218->47219 47220 4134ff 3 API calls 47219->47220 47221 40dd62 47220->47221 47225 40dd81 47221->47225 47818 401707 47221->47818 47223 40dd6f 47821 413877 RegCreateKeyA 47223->47821 47226 414f2a 47225->47226 47227 4020df 11 API calls 47226->47227 47228 414f3e 47227->47228 47835 41b8b3 47228->47835 47231 4020df 11 API calls 47232 414f54 47231->47232 47233 401e65 22 API calls 47232->47233 47234 414f62 47233->47234 47235 43baac 40 API calls 47234->47235 47236 414f6f 47235->47236 47237 414f81 47236->47237 47238 414f74 Sleep 47236->47238 47239 402093 28 API calls 47237->47239 47238->47237 47240 414f90 47239->47240 47241 401e65 22 API calls 47240->47241 47242 414f99 47241->47242 47243 4020f6 28 API calls 47242->47243 47244 414fa4 47243->47244 47245 41be1b 28 API calls 47244->47245 47246 414fac 47245->47246 47839 40489e WSAStartup 47246->47839 47248 414fb6 47249 401e65 22 API calls 47248->47249 47250 414fbf 47249->47250 47251 401e65 22 API calls 47250->47251 47299 41503e 47250->47299 47252 414fd8 47251->47252 47253 401e65 22 API calls 47252->47253 47255 414fe9 47253->47255 47254 4020f6 28 API calls 47254->47299 47257 401e65 22 API calls 47255->47257 47256 41be1b 28 API calls 47256->47299 47258 414ffa 47257->47258 47260 401e65 22 API calls 47258->47260 47259 406c1e 28 API calls 47259->47299 47261 41500b 47260->47261 47263 401e65 22 API calls 47261->47263 47262 401fe2 28 API calls 47262->47299 47264 41501c 47263->47264 47265 401e65 22 API calls 47264->47265 47266 41502e 47265->47266 47986 40473d 89 API calls 47266->47986 47268 401fd8 11 API calls 47268->47299 47270 41518c WSAGetLastError 47987 41cae1 30 API calls 47270->47987 47275 41519c 47277 41b4ef 80 API calls 47275->47277 47281 401e65 22 API calls 47275->47281 47282 401e8d 11 API calls 47275->47282 47283 43baac 40 API calls 47275->47283 47275->47299 47319 402093 28 API calls 47275->47319 47320 415a71 CreateThread 47275->47320 47321 401fd8 11 API calls 47275->47321 47322 401f09 11 API calls 47275->47322 47988 4052fd 28 API calls 47275->47988 47990 40b051 85 API calls 47275->47990 47991 404e26 99 API calls 47275->47991 47277->47275 47279 401e65 22 API calls 47279->47299 47280 40531e 28 API calls 47280->47299 47281->47275 47282->47275 47285 415acf Sleep 47283->47285 47284 406383 28 API calls 47284->47299 47285->47275 47286 402f10 28 API calls 47286->47299 47287 402093 28 API calls 47287->47299 47288 41b4ef 80 API calls 47288->47299 47291 40905c 28 API calls 47291->47299 47293 4136f8 3 API calls 47293->47299 47294 4135a6 31 API calls 47294->47299 47295 40417e 28 API calls 47295->47299 47299->47254 47299->47256 47299->47259 47299->47262 47299->47268 47299->47270 47299->47275 47299->47279 47299->47280 47299->47284 47299->47286 47299->47287 47299->47288 47299->47291 47299->47293 47299->47294 47299->47295 47301 401e65 22 API calls 47299->47301 47840 414ee9 47299->47840 47846 40482d 47299->47846 47853 404f51 47299->47853 47868 4048c8 connect 47299->47868 47928 41b7e0 47299->47928 47931 4145bd 47299->47931 47934 441e81 47299->47934 47938 40dd89 47299->47938 47944 41bc42 47299->47944 47947 41bd1e 47299->47947 47951 41bb8e 47299->47951 47302 415439 GetTickCount 47301->47302 47303 41bb8e 28 API calls 47302->47303 47315 415456 47303->47315 47305 41bb8e 28 API calls 47305->47315 47308 41bd1e 28 API calls 47308->47315 47310 402ea1 28 API calls 47310->47315 47311 406383 28 API calls 47311->47315 47312 402f10 28 API calls 47312->47315 47314 401fd8 11 API calls 47314->47315 47315->47305 47315->47308 47315->47310 47315->47311 47315->47312 47315->47314 47316 401f09 11 API calls 47315->47316 47956 41bae6 47315->47956 47958 41ba96 47315->47958 47963 40f8d1 GetLocaleInfoA 47315->47963 47966 402f31 28 API calls 47315->47966 47967 404c10 47315->47967 47989 404aa1 61 API calls ctype 47315->47989 47316->47315 47319->47275 47320->47275 48150 41ad17 105 API calls 47320->48150 47321->47275 47322->47275 47323->46719 47324->46727 47325->46731 47328 4020df 11 API calls 47327->47328 47329 406c2a 47328->47329 47330 4032a0 28 API calls 47329->47330 47331 406c47 47330->47331 47331->46752 47333 40eba4 47332->47333 47334 413573 RegQueryValueExA RegCloseKey 47332->47334 47333->46749 47333->46767 47334->47333 47335->46755 47336->46786 47337->46779 47338->46769 47339->46784 48151 401f86 47340->48151 47343 40da70 48155 41b5b4 29 API calls 47343->48155 47344 40daa5 47345 41bfb7 GetCurrentProcess 47344->47345 47349 40daaa 47345->47349 47346 40da66 47348 40db99 GetLongPathNameW 47346->47348 47351 40417e 28 API calls 47348->47351 47352 40db00 47349->47352 47353 40daae 47349->47353 47350 40da79 47354 401f13 28 API calls 47350->47354 47355 40dbae 47351->47355 47357 40417e 28 API calls 47352->47357 47358 40417e 28 API calls 47353->47358 47392 40da83 47354->47392 47356 40417e 28 API calls 47355->47356 47359 40dbbd 47356->47359 47360 40db0e 47357->47360 47361 40dabc 47358->47361 48158 40ddd1 28 API calls 47359->48158 47366 40417e 28 API calls 47360->47366 47367 40417e 28 API calls 47361->47367 47363 401f09 11 API calls 47363->47346 47364 40dbd0 48159 402fa5 28 API calls 47364->48159 47369 40db24 47366->47369 47370 40dad2 47367->47370 47368 40dbdb 48160 402fa5 28 API calls 47368->48160 48157 402fa5 28 API calls 47369->48157 48156 402fa5 28 API calls 47370->48156 47374 40dbe5 47377 401f09 11 API calls 47374->47377 47375 40db2f 47378 401f13 28 API calls 47375->47378 47376 40dadd 47379 401f13 28 API calls 47376->47379 47380 40dbef 47377->47380 47381 40db3a 47378->47381 47382 40dae8 47379->47382 47383 401f09 11 API calls 47380->47383 47384 401f09 11 API calls 47381->47384 47385 401f09 11 API calls 47382->47385 47386 40dbf8 47383->47386 47387 40db43 47384->47387 47388 40daf1 47385->47388 47389 401f09 11 API calls 47386->47389 47390 401f09 11 API calls 47387->47390 47391 401f09 11 API calls 47388->47391 47393 40dc01 47389->47393 47390->47392 47391->47392 47392->47363 47394 401f09 11 API calls 47393->47394 47395 40dc0a 47394->47395 47396 401f09 11 API calls 47395->47396 47397 40dc13 47396->47397 47397->46843 47398->46855 47399->46877 47401 413742 47400->47401 47402 41371e RegQueryValueExA RegCloseKey 47400->47402 47401->46836 47402->47401 47403->46869 47407 4344ef 47404->47407 47405 43bd51 _Yarn 21 API calls 47405->47407 47406 40f0d1 47406->46907 47407->47405 47407->47406 48161 442f80 7 API calls 2 library calls 47407->48161 48162 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47407->48162 48163 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47407->48163 47411->46939 47412->46927 47414->46971 47415->46774 47418 41b4c5 LoadResource LockResource SizeofResource 47417->47418 47419 40f3de 47417->47419 47418->47419 47420 43bd51 47419->47420 47425 446137 ___crtLCMapStringA 47420->47425 47421 446175 47437 4405dd 20 API calls __dosmaperr 47421->47437 47422 446160 RtlAllocateHeap 47424 446173 47422->47424 47422->47425 47424->47006 47425->47421 47425->47422 47436 442f80 7 API calls 2 library calls 47425->47436 47428 4020bf 47427->47428 47438 4023ce 47428->47438 47430 4020ca 47442 40250a 47430->47442 47432 4020d9 47432->47009 47434 4020b7 28 API calls 47433->47434 47435 406dec 47434->47435 47435->47016 47436->47425 47437->47424 47439 4023d8 47438->47439 47440 402428 47438->47440 47439->47440 47449 4027a7 11 API calls std::_Deallocate 47439->47449 47440->47430 47443 40251a 47442->47443 47444 402520 47443->47444 47445 402535 47443->47445 47450 402569 47444->47450 47460 4028e8 28 API calls 47445->47460 47448 402533 47448->47432 47449->47440 47461 402888 47450->47461 47452 40257d 47453 402592 47452->47453 47454 4025a7 47452->47454 47466 402a34 22 API calls 47453->47466 47468 4028e8 28 API calls 47454->47468 47457 40259b 47467 4029da 22 API calls 47457->47467 47459 4025a5 47459->47448 47460->47448 47463 402890 47461->47463 47462 402898 47462->47452 47463->47462 47469 402ca3 22 API calls 47463->47469 47466->47457 47467->47459 47468->47459 47471 4020e7 47470->47471 47472 4023ce 11 API calls 47471->47472 47473 4020f2 47472->47473 47473->47044 47488 40423a 47474->47488 47478 41ce41 47477->47478 47479 41cea0 47478->47479 47483 41ce51 47478->47483 47480 41ceba 47479->47480 47481 41cfe0 28 API calls 47479->47481 47503 41d146 28 API calls 47480->47503 47481->47480 47484 41ce89 47483->47484 47494 41cfe0 47483->47494 47502 41d146 28 API calls 47484->47502 47485 41ce9c 47485->47044 47489 404243 47488->47489 47490 4023ce 11 API calls 47489->47490 47491 40424e 47490->47491 47492 402569 28 API calls 47491->47492 47493 4041b5 47492->47493 47493->47044 47496 41cfe8 47494->47496 47495 41d01a 47495->47484 47496->47495 47497 41d01e 47496->47497 47500 41d002 47496->47500 47514 402725 22 API calls 47497->47514 47504 41d051 47500->47504 47502->47485 47503->47485 47505 41d05b __EH_prolog 47504->47505 47515 402717 22 API calls 47505->47515 47507 41d06e 47516 41d15d 11 API calls 47507->47516 47509 41d094 47510 41d0cc 47509->47510 47517 402730 11 API calls 47509->47517 47510->47495 47512 41d0b3 47518 402712 11 API calls std::_Deallocate 47512->47518 47515->47507 47516->47509 47517->47512 47518->47510 47519->47048 47520->47052 47521->47054 47524 4032aa 47523->47524 47526 4032c9 47524->47526 47527 4028e8 28 API calls 47524->47527 47526->47064 47527->47526 47529 4051fb 47528->47529 47538 405274 47529->47538 47531 405208 47531->47067 47533 402061 47532->47533 47534 4023ce 11 API calls 47533->47534 47535 40207b 47534->47535 47562 40267a 47535->47562 47539 405282 47538->47539 47540 405288 47539->47540 47541 40529e 47539->47541 47549 4025f0 47540->47549 47542 4052f5 47541->47542 47543 4052b6 47541->47543 47559 4028a4 22 API calls 47542->47559 47545 40529c 47543->47545 47558 4028e8 28 API calls 47543->47558 47545->47531 47550 402888 22 API calls 47549->47550 47551 402602 47550->47551 47552 402672 47551->47552 47553 402629 47551->47553 47561 4028a4 22 API calls 47552->47561 47557 40263b 47553->47557 47560 4028e8 28 API calls 47553->47560 47557->47545 47558->47545 47560->47557 47563 40268b 47562->47563 47564 4023ce 11 API calls 47563->47564 47565 40208d 47564->47565 47565->47070 47566->47078 47567->47083 47570 41bfc4 GetCurrentProcess 47569->47570 47571 41b2d1 47569->47571 47570->47571 47572 4135a6 RegOpenKeyExA 47571->47572 47573 4135d4 RegQueryValueExA RegCloseKey 47572->47573 47574 4135fe 47572->47574 47573->47574 47575 402093 28 API calls 47574->47575 47576 413613 47575->47576 47576->47094 47577->47102 47579 40b90c 47578->47579 47584 402252 47579->47584 47581 40b917 47588 40b92c 47581->47588 47583 40b926 47583->47113 47585 4022ac 47584->47585 47586 40225c 47584->47586 47585->47581 47586->47585 47595 402779 11 API calls std::_Deallocate 47586->47595 47589 40b966 47588->47589 47590 40b938 47588->47590 47607 4028a4 22 API calls 47589->47607 47596 4027e6 47590->47596 47594 40b942 47594->47583 47595->47585 47597 4027ef 47596->47597 47598 402851 47597->47598 47599 4027f9 47597->47599 47609 4028a4 22 API calls 47598->47609 47602 402802 47599->47602 47604 402815 47599->47604 47608 402aea 28 API calls __EH_prolog 47602->47608 47605 402813 47604->47605 47606 402252 11 API calls 47604->47606 47605->47594 47606->47605 47608->47605 47610->47116 47612 402347 47611->47612 47613 402252 11 API calls 47612->47613 47614 4023c7 47613->47614 47614->47116 47616 4024f9 47615->47616 47617 40250a 28 API calls 47616->47617 47618 4020b1 47617->47618 47618->46848 47635 43ba0a 47619->47635 47621 43ae50 47641 43a7b7 36 API calls 2 library calls 47621->47641 47622 43ae15 47622->47621 47623 43ae2a 47622->47623 47626 43ae2f _strftime 47622->47626 47640 4405dd 20 API calls __dosmaperr 47623->47640 47626->47151 47628 43ae5c 47629 43ae8b 47628->47629 47642 43ba4f 40 API calls __Toupper 47628->47642 47630 43aef7 47629->47630 47643 43b9b6 20 API calls 2 library calls 47629->47643 47644 43b9b6 20 API calls 2 library calls 47630->47644 47633 43afbe _swprintf 47633->47626 47645 4405dd 20 API calls __dosmaperr 47633->47645 47636 43ba22 47635->47636 47637 43ba0f 47635->47637 47636->47622 47646 4405dd 20 API calls __dosmaperr 47637->47646 47639 43ba14 _strftime 47639->47622 47640->47626 47641->47628 47642->47628 47643->47630 47644->47633 47645->47626 47646->47639 47653 401fb0 47647->47653 47649 402f1e 47650 402055 11 API calls 47649->47650 47651 402f2d 47650->47651 47651->47165 47652->47168 47654 4025f0 28 API calls 47653->47654 47655 401fbd 47654->47655 47655->47649 47657 40a127 47656->47657 47658 413549 3 API calls 47657->47658 47659 40a12e 47658->47659 47660 40a142 47659->47660 47661 40a15c 47659->47661 47662 409e9b 47660->47662 47663 40a147 47660->47663 47664 40905c 28 API calls 47661->47664 47662->46900 47677 40905c 47663->47677 47666 40a16a 47664->47666 47684 40a179 86 API calls 47666->47684 47670 40a15a 47670->47662 47671->47194 47701 403222 47672->47701 47674 403022 47705 403262 47674->47705 47678 409072 47677->47678 47679 402252 11 API calls 47678->47679 47680 40908c 47679->47680 47685 404267 47680->47685 47682 40909a 47683 40a22d 29 API calls 47682->47683 47683->47670 47697 40a273 163 API calls 47683->47697 47684->47662 47698 40a267 86 API calls 47684->47698 47699 40a289 48 API calls 47684->47699 47700 40a27d 128 API calls 47684->47700 47686 402888 22 API calls 47685->47686 47687 40427b 47686->47687 47688 404290 47687->47688 47689 4042a5 47687->47689 47695 4042df 22 API calls 47688->47695 47691 4027e6 28 API calls 47689->47691 47694 4042a3 47691->47694 47692 404299 47696 402c48 22 API calls 47692->47696 47694->47682 47695->47692 47696->47694 47702 40322e 47701->47702 47711 403618 47702->47711 47704 40323b 47704->47674 47706 40326e 47705->47706 47707 402252 11 API calls 47706->47707 47708 403288 47707->47708 47709 402336 11 API calls 47708->47709 47710 403031 47709->47710 47710->47198 47712 403626 47711->47712 47713 403644 47712->47713 47714 40362c 47712->47714 47716 40365c 47713->47716 47717 40369e 47713->47717 47722 4036a6 28 API calls 47714->47722 47720 4027e6 28 API calls 47716->47720 47721 403642 47716->47721 47723 4028a4 22 API calls 47717->47723 47720->47721 47721->47704 47722->47721 47725 404186 47724->47725 47726 402252 11 API calls 47725->47726 47727 404191 47726->47727 47735 4041bc 47727->47735 47730 4042fc 47746 404353 47730->47746 47732 40430a 47733 403262 11 API calls 47732->47733 47734 404319 47733->47734 47734->47206 47736 4041c8 47735->47736 47739 4041d9 47736->47739 47738 40419c 47738->47730 47740 4041e9 47739->47740 47741 404206 47740->47741 47742 4041ef 47740->47742 47743 4027e6 28 API calls 47741->47743 47744 404267 28 API calls 47742->47744 47745 404204 47743->47745 47744->47745 47745->47738 47747 40435f 47746->47747 47750 404371 47747->47750 47749 40436d 47749->47732 47751 40437f 47750->47751 47752 404385 47751->47752 47753 40439e 47751->47753 47816 4034e6 28 API calls 47752->47816 47754 402888 22 API calls 47753->47754 47755 4043a6 47754->47755 47757 404419 47755->47757 47758 4043bf 47755->47758 47817 4028a4 22 API calls 47757->47817 47760 4027e6 28 API calls 47758->47760 47769 40439c 47758->47769 47760->47769 47769->47749 47816->47769 47824 43aa9a 47818->47824 47822 4138b9 47821->47822 47823 41388f RegSetValueExA RegCloseKey 47821->47823 47822->47225 47823->47822 47827 43aa1b 47824->47827 47826 40170d 47826->47223 47828 43aa2a 47827->47828 47829 43aa3e 47827->47829 47833 4405dd 20 API calls __dosmaperr 47828->47833 47832 43aa2f __alldvrm _strftime 47829->47832 47834 448957 11 API calls 2 library calls 47829->47834 47832->47826 47833->47832 47834->47832 47836 41b8f9 ctype ___scrt_get_show_window_mode 47835->47836 47837 402093 28 API calls 47836->47837 47838 414f49 47837->47838 47838->47231 47839->47248 47841 414f02 WSASetLastError 47840->47841 47842 414ef8 47840->47842 47841->47299 47992 414d86 29 API calls ___std_exception_copy 47842->47992 47844 414efd 47844->47841 47847 404846 socket 47846->47847 47848 404839 47846->47848 47850 404860 CreateEventW 47847->47850 47851 404842 47847->47851 47993 40489e WSAStartup 47848->47993 47850->47299 47851->47299 47852 40483e 47852->47847 47852->47851 47854 404f65 47853->47854 47855 404fea 47853->47855 47856 404f6e 47854->47856 47857 404fc0 CreateEventA CreateThread 47854->47857 47858 404f7d GetLocalTime 47854->47858 47855->47299 47856->47857 47857->47855 47995 405150 47857->47995 47859 41bb8e 28 API calls 47858->47859 47860 404f91 47859->47860 47994 4052fd 28 API calls 47860->47994 47869 404a1b 47868->47869 47870 4048ee 47868->47870 47871 40497e 47869->47871 47872 404a21 WSAGetLastError 47869->47872 47870->47871 47874 40531e 28 API calls 47870->47874 47894 404923 47870->47894 47871->47299 47872->47871 47873 404a31 47872->47873 47875 404932 47873->47875 47876 404a36 47873->47876 47878 40490f 47874->47878 47882 402093 28 API calls 47875->47882 48004 41cae1 30 API calls 47876->48004 47883 402093 28 API calls 47878->47883 47880 40492b 47880->47875 47881 404941 47880->47881 47891 404950 47881->47891 47892 404987 47881->47892 47885 404a80 47882->47885 47886 40491e 47883->47886 47884 404a40 48005 4052fd 28 API calls 47884->48005 47888 402093 28 API calls 47885->47888 47889 41b4ef 80 API calls 47886->47889 47893 404a8f 47888->47893 47889->47894 47896 402093 28 API calls 47891->47896 48001 421a40 54 API calls 47892->48001 47897 41b4ef 80 API calls 47893->47897 47999 420c60 27 API calls 47894->47999 47902 40495f 47896->47902 47897->47871 47900 40498f 47903 4049c4 47900->47903 47904 404994 47900->47904 47906 402093 28 API calls 47902->47906 48003 420e06 28 API calls 47903->48003 47907 402093 28 API calls 47904->47907 47909 40496e 47906->47909 47911 4049a3 47907->47911 47912 41b4ef 80 API calls 47909->47912 47914 402093 28 API calls 47911->47914 47915 404973 47912->47915 47913 4049cc 47916 4049f9 CreateEventW CreateEventW 47913->47916 47918 402093 28 API calls 47913->47918 47917 4049b2 47914->47917 48000 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47915->48000 47916->47871 47919 41b4ef 80 API calls 47917->47919 47921 4049e2 47918->47921 47923 4049b7 47919->47923 47922 402093 28 API calls 47921->47922 47924 4049f1 47922->47924 48002 4210b2 52 API calls 47923->48002 47926 41b4ef 80 API calls 47924->47926 47927 4049f6 47926->47927 47927->47916 48006 41b7b6 GlobalMemoryStatusEx 47928->48006 47930 41b7f5 47930->47299 48007 414580 47931->48007 47935 441e8d 47934->47935 48045 441c7d 47935->48045 47937 441eae 47937->47299 47939 40dda5 47938->47939 47940 4134ff 3 API calls 47939->47940 47942 40ddac 47940->47942 47941 40ddc4 47941->47299 47942->47941 47943 413549 3 API calls 47942->47943 47943->47941 47945 4020b7 28 API calls 47944->47945 47946 41bc57 47945->47946 47946->47299 47948 41bd2b 47947->47948 47949 4020b7 28 API calls 47948->47949 47950 41bd3d 47949->47950 47950->47299 47952 441e81 20 API calls 47951->47952 47953 41bbb2 47952->47953 47954 402093 28 API calls 47953->47954 47955 41bbc0 47954->47955 47955->47299 47957 41bafc GetTickCount 47956->47957 47957->47315 47959 436e90 ___scrt_get_show_window_mode 47958->47959 47960 41bab5 GetForegroundWindow GetWindowTextW 47959->47960 47961 40417e 28 API calls 47960->47961 47962 41badf 47961->47962 47962->47315 47964 402093 28 API calls 47963->47964 47965 40f8f6 47964->47965 47965->47315 47966->47315 47968 4020df 11 API calls 47967->47968 47969 404c27 47968->47969 47970 4020df 11 API calls 47969->47970 47972 404c30 47970->47972 47971 43bd51 _Yarn 21 API calls 47971->47972 47972->47971 47974 4020b7 28 API calls 47972->47974 47975 404c96 47972->47975 47976 401fe2 28 API calls 47972->47976 47979 401fd8 11 API calls 47972->47979 48050 404cc3 47972->48050 48062 404b96 57 API calls 47972->48062 47974->47972 47975->47972 47977 404ca1 47975->47977 47976->47972 48063 404e26 99 API calls 47977->48063 47979->47972 47980 404ca8 47981 401fd8 11 API calls 47980->47981 47982 404cb1 47981->47982 47983 401fd8 11 API calls 47982->47983 47984 404cba 47983->47984 47984->47275 47986->47299 47987->47275 47989->47315 47990->47275 47991->47275 47992->47844 47993->47852 47998 40515c 102 API calls 47995->47998 47997 405159 47998->47997 47999->47880 48000->47871 48001->47900 48002->47915 48003->47913 48004->47884 48006->47930 48010 414553 48007->48010 48011 414568 ___scrt_initialize_default_local_stdio_options 48010->48011 48014 43f79d 48011->48014 48017 43c4f0 48014->48017 48018 43c530 48017->48018 48019 43c518 48017->48019 48018->48019 48021 43c538 48018->48021 48039 4405dd 20 API calls __dosmaperr 48019->48039 48040 43a7b7 36 API calls 2 library calls 48021->48040 48023 43c548 48041 43cc76 20 API calls 2 library calls 48023->48041 48024 43c51d _strftime 48032 434fcb 48024->48032 48027 43c5c0 48042 43d2e4 51 API calls 3 library calls 48027->48042 48028 414576 48028->47299 48031 43c5cb 48043 43cce0 20 API calls _free 48031->48043 48033 434fd6 IsProcessorFeaturePresent 48032->48033 48034 434fd4 48032->48034 48036 435018 48033->48036 48034->48028 48044 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48036->48044 48038 4350fb 48038->48028 48039->48024 48040->48023 48041->48027 48042->48031 48043->48024 48044->48038 48046 441c94 48045->48046 48048 441ccb _strftime 48046->48048 48049 4405dd 20 API calls __dosmaperr 48046->48049 48048->47937 48049->48048 48051 4020df 11 API calls 48050->48051 48061 404cde 48051->48061 48052 404e13 48053 401fd8 11 API calls 48052->48053 48054 404e1c 48053->48054 48054->47975 48055 4041a2 28 API calls 48055->48061 48056 401fe2 28 API calls 48056->48061 48057 401fd8 11 API calls 48057->48061 48058 4020f6 28 API calls 48058->48061 48059 401fc0 28 API calls 48060 404dad CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 48059->48060 48060->48061 48064 415aea 48060->48064 48061->48052 48061->48055 48061->48056 48061->48057 48061->48058 48061->48059 48062->47972 48063->47980 48065 4020f6 28 API calls 48064->48065 48066 415b0c SetEvent 48065->48066 48067 415b21 48066->48067 48068 4041a2 28 API calls 48067->48068 48069 415b3b 48068->48069 48070 4020f6 28 API calls 48069->48070 48071 415b4b 48070->48071 48072 4020f6 28 API calls 48071->48072 48073 415b5d 48072->48073 48074 41be1b 28 API calls 48073->48074 48075 415b66 48074->48075 48076 417089 48075->48076 48077 415b86 GetTickCount 48075->48077 48078 415d2f 48075->48078 48079 401e8d 11 API calls 48076->48079 48080 41bb8e 28 API calls 48077->48080 48078->48076 48141 415ce5 48078->48141 48081 417092 48079->48081 48082 415b97 48080->48082 48084 401fd8 11 API calls 48081->48084 48085 41bae6 GetTickCount 48082->48085 48086 41709e 48084->48086 48087 415ba3 48085->48087 48088 401fd8 11 API calls 48086->48088 48089 41bb8e 28 API calls 48087->48089 48090 4170aa 48088->48090 48091 415bae 48089->48091 48092 41ba96 30 API calls 48091->48092 48093 415bbc 48092->48093 48094 41bd1e 28 API calls 48093->48094 48095 415bca 48094->48095 48096 401e65 22 API calls 48095->48096 48097 415bd8 48096->48097 48143 402f31 28 API calls 48097->48143 48099 415be6 48144 402ea1 28 API calls 48099->48144 48101 415bf5 48102 402f10 28 API calls 48101->48102 48103 415c04 48102->48103 48145 402ea1 28 API calls 48103->48145 48105 415c13 48106 402f10 28 API calls 48105->48106 48107 415c1f 48106->48107 48146 402ea1 28 API calls 48107->48146 48109 415c29 48147 404aa1 61 API calls ctype 48109->48147 48111 415c38 48112 401fd8 11 API calls 48111->48112 48113 415c41 48112->48113 48114 401fd8 11 API calls 48113->48114 48115 415c4d 48114->48115 48116 401fd8 11 API calls 48115->48116 48117 415c59 48116->48117 48118 401fd8 11 API calls 48117->48118 48119 415c65 48118->48119 48120 401fd8 11 API calls 48119->48120 48121 415c71 48120->48121 48122 401fd8 11 API calls 48121->48122 48123 415c7d 48122->48123 48124 401f09 11 API calls 48123->48124 48125 415c86 48124->48125 48126 401fd8 11 API calls 48125->48126 48127 415c8f 48126->48127 48128 401fd8 11 API calls 48127->48128 48129 415c98 48128->48129 48130 401e65 22 API calls 48129->48130 48131 415ca3 48130->48131 48132 43baac 40 API calls 48131->48132 48133 415cb0 48132->48133 48134 415cb5 48133->48134 48135 415cdb 48133->48135 48137 415cc3 48134->48137 48138 415cce 48134->48138 48136 401e65 22 API calls 48135->48136 48136->48141 48148 404ff4 82 API calls 48137->48148 48140 404f51 105 API calls 48138->48140 48142 415cc9 48140->48142 48141->48076 48149 4050e4 84 API calls 48141->48149 48142->48076 48143->48099 48144->48101 48145->48105 48146->48109 48147->48111 48148->48142 48149->48142 48152 401f8e 48151->48152 48153 402252 11 API calls 48152->48153 48154 401f99 48153->48154 48154->47343 48154->47344 48154->47346 48155->47350 48156->47376 48157->47375 48158->47364 48159->47368 48160->47374 48161->47407 48165 40f7c2 48164->48165 48166 413549 3 API calls 48165->48166 48167 40f866 48165->48167 48169 40f856 Sleep 48165->48169 48186 40f7f4 48165->48186 48166->48165 48170 40905c 28 API calls 48167->48170 48168 40905c 28 API calls 48168->48186 48169->48165 48173 40f871 48170->48173 48172 41bc5e 28 API calls 48172->48186 48174 41bc5e 28 API calls 48173->48174 48175 40f87d 48174->48175 48199 413814 14 API calls 48175->48199 48178 401f09 11 API calls 48178->48186 48179 40f890 48180 401f09 11 API calls 48179->48180 48182 40f89c 48180->48182 48181 402093 28 API calls 48181->48186 48183 402093 28 API calls 48182->48183 48184 40f8ad 48183->48184 48187 41376f 14 API calls 48184->48187 48185 41376f 14 API calls 48185->48186 48186->48168 48186->48169 48186->48172 48186->48178 48186->48181 48186->48185 48197 40d096 112 API calls ___scrt_get_show_window_mode 48186->48197 48198 413814 14 API calls 48186->48198 48188 40f8c0 48187->48188 48200 412850 TerminateProcess WaitForSingleObject 48188->48200 48190 40f8c8 ExitProcess 48201 4127ee 62 API calls 48192->48201 48198->48186 48199->48179 48200->48190 48202 4269e6 48203 4269fb 48202->48203 48215 426a8d 48202->48215 48204 426a48 48203->48204 48205 426b44 48203->48205 48206 426abd 48203->48206 48207 426b1d 48203->48207 48211 426af2 48203->48211 48214 426a7d 48203->48214 48203->48215 48230 424edd 49 API calls ctype 48203->48230 48204->48214 48204->48215 48231 41fb6c 52 API calls 48204->48231 48205->48215 48235 426155 28 API calls 48205->48235 48206->48211 48206->48215 48233 41fb6c 52 API calls 48206->48233 48207->48205 48207->48215 48218 425ae1 48207->48218 48211->48207 48234 4256f0 21 API calls 48211->48234 48214->48206 48214->48215 48232 424edd 49 API calls ctype 48214->48232 48219 425b00 ___scrt_get_show_window_mode 48218->48219 48221 425b0f 48219->48221 48224 425b34 48219->48224 48236 41ebbb 21 API calls 48219->48236 48221->48224 48229 425b14 48221->48229 48237 4205d8 46 API calls 48221->48237 48224->48205 48225 425b1d 48225->48224 48240 424d05 21 API calls 2 library calls 48225->48240 48227 425bb7 48227->48224 48238 432ec4 21 API calls _Yarn 48227->48238 48229->48224 48229->48225 48239 41da5f 49 API calls 48229->48239 48230->48204 48231->48204 48232->48206 48233->48206 48234->48207 48235->48215 48236->48221 48237->48227 48238->48229 48239->48225 48240->48224 48241 415d06 48256 41b380 48241->48256 48243 415d0f 48244 4020f6 28 API calls 48243->48244 48245 415d1e 48244->48245 48267 404aa1 61 API calls ctype 48245->48267 48247 415d2a 48248 417089 48247->48248 48249 401fd8 11 API calls 48247->48249 48250 401e8d 11 API calls 48248->48250 48249->48248 48251 417092 48250->48251 48252 401fd8 11 API calls 48251->48252 48253 41709e 48252->48253 48254 401fd8 11 API calls 48253->48254 48255 4170aa 48254->48255 48257 4020df 11 API calls 48256->48257 48258 41b38e 48257->48258 48259 43bd51 _Yarn 21 API calls 48258->48259 48260 41b39e InternetOpenW InternetOpenUrlW 48259->48260 48261 41b3c5 InternetReadFile 48260->48261 48265 41b3e8 48261->48265 48262 41b415 InternetCloseHandle InternetCloseHandle 48264 41b427 48262->48264 48263 4020b7 28 API calls 48263->48265 48264->48243 48265->48261 48265->48262 48265->48263 48266 401fd8 11 API calls 48265->48266 48266->48265 48267->48247 48268 426c4b 48273 426cc8 send 48268->48273 48274 43be58 48276 43be64 _swprintf ___BuildCatchObject 48274->48276 48275 43be72 48290 4405dd 20 API calls __dosmaperr 48275->48290 48276->48275 48278 43be9c 48276->48278 48285 445888 EnterCriticalSection 48278->48285 48280 43bea7 48286 43bf48 48280->48286 48281 43be77 ___BuildCatchObject _strftime 48285->48280 48288 43bf56 48286->48288 48287 43beb2 48291 43becf LeaveCriticalSection std::_Lockit::~_Lockit 48287->48291 48288->48287 48292 44976c 37 API calls 2 library calls 48288->48292 48290->48281 48291->48281 48292->48288 48293 41dfbd 48294 41dfd2 ctype ___scrt_get_show_window_mode 48293->48294 48306 41e1d5 48294->48306 48312 432ec4 21 API calls _Yarn 48294->48312 48297 41e1e6 48304 41e189 48297->48304 48308 432ec4 21 API calls _Yarn 48297->48308 48298 41e182 ___scrt_get_show_window_mode 48298->48304 48313 432ec4 21 API calls _Yarn 48298->48313 48301 41e21f ___scrt_get_show_window_mode 48301->48304 48309 43354a 48301->48309 48302 41e1af ___scrt_get_show_window_mode 48302->48304 48314 432ec4 21 API calls _Yarn 48302->48314 48306->48304 48307 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 48306->48307 48307->48297 48308->48301 48315 433469 48309->48315 48311 433552 48311->48304 48312->48298 48313->48302 48314->48306 48316 433482 48315->48316 48320 433478 48315->48320 48316->48320 48321 432ec4 21 API calls _Yarn 48316->48321 48318 4334a3 48318->48320 48322 433837 CryptAcquireContextA 48318->48322 48320->48311 48321->48318 48323 433858 CryptGenRandom 48322->48323 48324 433853 48322->48324 48323->48324 48325 43386d CryptReleaseContext 48323->48325 48324->48320 48325->48324 48326 40165e 48327 401666 48326->48327 48328 401669 48326->48328 48329 4016a8 48328->48329 48331 401696 48328->48331 48330 4344ea new 22 API calls 48329->48330 48332 40169c 48330->48332 48333 4344ea new 22 API calls 48331->48333 48333->48332 48334 426bdc 48340 426cb1 recv 48334->48340 48341 42f8ed 48342 42f8f8 48341->48342 48343 42f90c 48342->48343 48345 432eee 48342->48345 48346 432efd 48345->48346 48348 432ef9 48345->48348 48349 440f0d 48346->48349 48348->48343 48350 446185 48349->48350 48351 446192 48350->48351 48352 44619d 48350->48352 48368 446137 21 API calls 3 library calls 48351->48368 48354 4461a5 48352->48354 48360 4461ae ___crtLCMapStringA 48352->48360 48362 446782 48354->48362 48355 4461b3 48369 4405dd 20 API calls __dosmaperr 48355->48369 48356 4461d8 RtlReAllocateHeap 48359 44619a 48356->48359 48356->48360 48359->48348 48360->48355 48360->48356 48370 442f80 7 API calls 2 library calls 48360->48370 48363 44678d RtlFreeHeap 48362->48363 48364 4467b6 _free 48362->48364 48363->48364 48365 4467a2 48363->48365 48364->48359 48371 4405dd 20 API calls __dosmaperr 48365->48371 48367 4467a8 GetLastError 48367->48364 48368->48359 48369->48359 48370->48360 48371->48367

                Control-flow Graph

                APIs
                • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressProc$LibraryLoad$HandleModule
                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                • API String ID: 4236061018-3687161714
                • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1082 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1087 41b3c5-41b3e6 InternetReadFile 1082->1087 1088 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1087->1088 1089 41b40c-41b40f 1087->1089 1088->1089 1090 41b411-41b413 1089->1090 1091 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1089->1091 1090->1087 1090->1091 1095 41b427-41b431 1091->1095
                APIs
                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                Strings
                • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Internet$CloseHandleOpen$FileRead
                • String ID: http://geoplugin.net/json.gp
                • API String ID: 3121278467-91888290
                • Opcode ID: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                • Opcode Fuzzy Hash: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                Control-flow Graph

                APIs
                  • Part of subcall function 00413549: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00413569
                  • Part of subcall function 00413549: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                  • Part of subcall function 00413549: RegCloseKey.KERNELBASE(?), ref: 00413592
                • Sleep.KERNELBASE(00000BB8), ref: 0040F85B
                • ExitProcess.KERNEL32 ref: 0040F8CA
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseExitOpenProcessQuerySleepValue
                • String ID: 5.1.0 Pro$override$pth_unenc
                • API String ID: 2281282204-182549033
                • Opcode ID: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                • Opcode Fuzzy Hash: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1265 404f51-404f5f 1266 404f65-404f6c 1265->1266 1267 404fea 1265->1267 1269 404f74-404f7b 1266->1269 1270 404f6e-404f72 1266->1270 1268 404fec-404ff1 1267->1268 1271 404fc0-404fe8 CreateEventA CreateThread 1269->1271 1272 404f7d-404fbb GetLocalTime call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1269->1272 1270->1271 1271->1268 1272->1271
                APIs
                • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                • CreateThread.KERNELBASE(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                Strings
                • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Create$EventLocalThreadTime
                • String ID: KeepAlive | Enabled | Timeout:
                • API String ID: 2532271599-1507639952
                • Opcode ID: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                • Opcode Fuzzy Hash: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                APIs
                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00D8C338), ref: 00433849
                • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Crypt$Context$AcquireRandomRelease
                • String ID:
                • API String ID: 1815803762-0
                • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                APIs
                • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,004750E4), ref: 0041B62A
                • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Name$ComputerUser
                • String ID:
                • API String ID: 4229901323-0
                • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                APIs
                • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: InfoLocale
                • String ID:
                • API String ID: 2299586839-0
                • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 48 40eef2-40ef03 call 401fd8 23->48 69->70 102 40f34f-40f36a call 401fab call 4139a9 call 412475 69->102 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 90 40ec13-40ec1a 79->90 91 40ec0c-40ec0e 79->91 80->79 98 40ebec-40ec02 call 401fab call 4139a9 80->98 92 40ec1c 90->92 93 40ec1e-40ec2a call 41b2c3 90->93 96 40eef1 91->96 92->93 103 40ec33-40ec37 93->103 104 40ec2c-40ec2e 93->104 96->48 98->79 124 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 102->124 107 40ec76-40ec89 call 401e65 call 401fab 103->107 108 40ec39 call 407716 103->108 104->103 129 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->129 130 40ec8b call 407755 107->130 118 40ec3e-40ec40 108->118 121 40ec42-40ec47 call 407738 call 407260 118->121 122 40ec4c-40ec5f call 401e65 call 401fab 118->122 121->122 122->107 141 40ec61-40ec67 122->141 157 40f3a5-40f3af call 40dd42 call 414f2a 124->157 177 40ed80-40ed84 129->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 129->178 130->129 141->107 144 40ec69-40ec6f 141->144 144->107 147 40ec71 call 407260 144->147 147->107 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 202 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->202 233 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->233 182 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->182 183 40ee0f-40ee19 call 409057 180->183 192 40ee1e-40ee42 call 40247c call 434798 182->192 183->192 213 40ee51 192->213 214 40ee44-40ee4f call 436e90 192->214 202->177 217 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 213->217 214->217 271 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 217->271 286 40efc1 233->286 287 40efdc-40efde 233->287 271->233 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 271->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->233 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->96 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 356 40f159-40f16c call 401e65 call 401fab 347->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->357 368 40f1cc-40f1df call 401e65 call 401fab 356->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->369 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 426 40f2e4-40f2e7 416->426 418->416 426->157 428 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 426->428 443 40f346-40f34b DeleteFileW 428->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->124 445->124 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                APIs
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe,00000104), ref: 0040E9EE
                  • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                • API String ID: 2830904901-4045465773
                • Opcode ID: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                • Opcode Fuzzy Hash: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 567 415210-415225 call 404f51 call 4048c8 560->567 568 4151e5-41520b call 402093 * 2 call 41b4ef 560->568 583 415aa3-415ab5 call 404e26 call 4021fa 561->583 567->583 584 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 567->584 568->583 596 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 583->596 597 415add-415ae5 call 401e8d 583->597 648 415380-41538d call 405aa6 584->648 649 415392-4153b9 call 401fab call 4135a6 584->649 596->597 597->477 648->649 655 4153c0-41577f call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 649->655 656 4153bb-4153bd 649->656 782 415781 call 404aa1 655->782 656->655 783 415786-415a0a call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 782->783 901 415a0f-415a16 783->901 902 415a18-415a1f 901->902 903 415a2a-415a31 901->903 902->903 904 415a21-415a23 902->904 905 415a33-415a38 call 40b051 903->905 906 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->906 904->903 905->906 917 415a71-415a7d CreateThread 906->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 906->918 917->918 918->583
                APIs
                • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Sleep$ErrorLastLocalTime
                • String ID: | $%I64u$5.1.0 Pro$8SG$C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                • API String ID: 524882891-353088653
                • Opcode ID: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                • Opcode Fuzzy Hash: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                Control-flow Graph

                APIs
                • connect.WS2_32(?,?,?), ref: 004048E0
                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                • WSAGetLastError.WS2_32 ref: 00404A21
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                • API String ID: 994465650-2151626615
                • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1000 40da34-40da59 call 401f86 1003 40db83-40dba9 call 401f04 GetLongPathNameW call 40417e 1000->1003 1004 40da5f 1000->1004 1030 40dbae-40dc1b call 40417e call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1003->1030 1005 40da70-40da7e call 41b5b4 call 401f13 1004->1005 1006 40da91-40da96 1004->1006 1007 40db51-40db56 1004->1007 1008 40daa5-40daac call 41bfb7 1004->1008 1009 40da66-40da6b 1004->1009 1010 40db58-40db5d 1004->1010 1011 40da9b-40daa0 1004->1011 1012 40db6e 1004->1012 1013 40db5f-40db64 call 43c0cf 1004->1013 1034 40da83 1005->1034 1016 40db73-40db78 call 43c0cf 1006->1016 1007->1016 1025 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1008->1025 1026 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1008->1026 1009->1016 1010->1016 1011->1016 1012->1016 1021 40db69-40db6c 1013->1021 1027 40db79-40db7e call 409057 1016->1027 1021->1012 1021->1027 1025->1034 1039 40da87-40da8c call 401f09 1026->1039 1027->1003 1034->1039 1039->1003
                APIs
                • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040DB9A
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: LongNamePath
                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                • API String ID: 82841172-425784914
                • Opcode ID: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                • Opcode Fuzzy Hash: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1100 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1111 41b35d-41b366 1100->1111 1112 41b31c-41b32b call 4135a6 1100->1112 1113 41b368-41b36d 1111->1113 1114 41b36f 1111->1114 1117 41b330-41b347 call 401fab StrToIntA 1112->1117 1116 41b374-41b37f call 40537d 1113->1116 1114->1116 1122 41b355-41b358 call 401fd8 1117->1122 1123 41b349-41b352 call 41cf69 1117->1123 1122->1111 1123->1122
                APIs
                  • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                  • Part of subcall function 004135A6: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                  • Part of subcall function 004135A6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                  • Part of subcall function 004135A6: RegCloseKey.KERNELBASE(?), ref: 004135F2
                • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCurrentOpenProcessQueryValue
                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                • API String ID: 1866151309-2070987746
                • Opcode ID: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                • Opcode Fuzzy Hash: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CountEventTick
                • String ID: !D@$NG
                • API String ID: 180926312-2721294649
                • Opcode ID: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                • Opcode Fuzzy Hash: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1282 41376f-413786 RegCreateKeyA 1283 413788-4137bd call 40247c call 401fab RegSetValueExA RegCloseKey 1282->1283 1284 4137bf 1282->1284 1285 4137c1-4137cf call 401fd8 1283->1285 1284->1285
                APIs
                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                • RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                • RegCloseKey.KERNELBASE(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCreateValue
                • String ID: pth_unenc
                • API String ID: 1818849710-4028850238
                • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54

                Control-flow Graph

                APIs
                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                • CreateThread.KERNELBASE(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                • FindCloseChangeNotification.KERNELBASE(?,?,00000000), ref: 00404DDB
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                • String ID:
                • API String ID: 2579639479-0
                • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1340 40d069-40d095 call 401fab CreateMutexA GetLastError
                APIs
                • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                • GetLastError.KERNEL32 ref: 0040D083
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CreateErrorLastMutex
                • String ID: SG
                • API String ID: 1925916568-3189917014
                • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1343 4135a6-4135d2 RegOpenKeyExA 1344 4135d4-4135fc RegQueryValueExA RegCloseKey 1343->1344 1345 413607 1343->1345 1346 413609 1344->1346 1347 4135fe-413605 1344->1347 1345->1346 1348 41360e-41361a call 402093 1346->1348 1347->1348
                APIs
                • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                • RegCloseKey.KERNELBASE(?), ref: 004135F2
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID:
                • API String ID: 3677997916-0
                • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1351 4136f8-41371c RegOpenKeyExA 1352 413768 1351->1352 1353 41371e-413740 RegQueryValueExA RegCloseKey 1351->1353 1354 41376a-41376e 1352->1354 1353->1352 1355 413742-413766 call 406cb7 call 406d3c 1353->1355 1355->1354
                APIs
                • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                • RegCloseKey.KERNELBASE(00000000), ref: 00413738
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID:
                • API String ID: 3677997916-0
                • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                APIs
                • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00413569
                • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                • RegCloseKey.KERNELBASE(?), ref: 00413592
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID:
                • API String ID: 3677997916-0
                • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                APIs
                • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                • RegCloseKey.KERNELBASE(?,?,?,0040C19C,00466C48), ref: 00413535
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID:
                • API String ID: 3677997916-0
                • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                APIs
                • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                • RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCreateValue
                • String ID:
                • API String ID: 1818849710-0
                • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _wcslen
                • String ID: pQG
                • API String ID: 176396367-3769108836
                • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                APIs
                • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0041B7CA
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID: @
                • API String ID: 1890195054-2766056989
                • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                APIs
                • _free.LIBCMT ref: 004461A6
                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap$_free
                • String ID:
                • API String ID: 1482568997-0
                • Opcode ID: 365bd7ee977071c6a41bb961a5dd0d7818d2ba038ed0d9e6099f468a5701a404
                • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                • Opcode Fuzzy Hash: 365bd7ee977071c6a41bb961a5dd0d7818d2ba038ed0d9e6099f468a5701a404
                • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                APIs
                • socket.WS2_32(?,00000001,00000006), ref: 00404852
                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                  • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CreateEventStartupsocket
                • String ID:
                • API String ID: 1953588214-0
                • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                APIs
                • GetForegroundWindow.USER32 ref: 0041BAB8
                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Window$ForegroundText
                • String ID:
                • API String ID: 29597999-0
                • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                APIs
                • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                APIs
                • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Startup
                • String ID:
                • API String ID: 724789610-0
                • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: send
                • String ID:
                • API String ID: 2809346765-0
                • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: recv
                • String ID:
                • API String ID: 1507349165-0
                • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                APIs
                • SetEvent.KERNEL32(?,?), ref: 00407CB9
                • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                  • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                  • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                  • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                  • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                  • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                • DeleteFileA.KERNEL32(?), ref: 00408652
                  • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                  • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                  • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                  • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                • Sleep.KERNEL32(000007D0), ref: 004086F8
                • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                  • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                • API String ID: 1067849700-181434739
                • Opcode ID: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                • Opcode Fuzzy Hash: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                APIs
                • __Init_thread_footer.LIBCMT ref: 004056E6
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • __Init_thread_footer.LIBCMT ref: 00405723
                • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                • CloseHandle.KERNEL32 ref: 00405A23
                • CloseHandle.KERNEL32 ref: 00405A2B
                • CloseHandle.KERNEL32 ref: 00405A3D
                • CloseHandle.KERNEL32 ref: 00405A45
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                • API String ID: 2994406822-18413064
                • Opcode ID: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                • Opcode Fuzzy Hash: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                APIs
                • GetCurrentProcessId.KERNEL32 ref: 00412106
                  • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                  • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                  • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                • CloseHandle.KERNEL32(00000000), ref: 00412155
                • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                • API String ID: 3018269243-13974260
                • Opcode ID: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                • Opcode Fuzzy Hash: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                APIs
                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                • FindClose.KERNEL32(00000000), ref: 0040BBC9
                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                • FindClose.KERNEL32(00000000), ref: 0040BD12
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Find$CloseFile$FirstNext
                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                • API String ID: 1164774033-3681987949
                • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                APIs
                • OpenClipboard.USER32 ref: 004168C2
                • EmptyClipboard.USER32 ref: 004168D0
                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                • GlobalLock.KERNEL32(00000000), ref: 004168F9
                • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                • CloseClipboard.USER32 ref: 00416955
                • OpenClipboard.USER32 ref: 0041695C
                • GetClipboardData.USER32(0000000D), ref: 0041696C
                • GlobalLock.KERNEL32(00000000), ref: 00416975
                • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                • CloseClipboard.USER32 ref: 00416984
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                • String ID: !D@
                • API String ID: 3520204547-604454484
                • Opcode ID: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                • Opcode Fuzzy Hash: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                APIs
                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                • FindClose.KERNEL32(00000000), ref: 0040BDC9
                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                • FindClose.KERNEL32(00000000), ref: 0040BEAF
                • FindClose.KERNEL32(00000000), ref: 0040BED0
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Find$Close$File$FirstNext
                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                • API String ID: 3527384056-432212279
                • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                APIs
                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                • API String ID: 3756808967-1743721670
                • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: 0$1$2$3$4$5$6$7$VG
                • API String ID: 0-1861860590
                • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                APIs
                • _wcslen.LIBCMT ref: 00407521
                • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Object_wcslen
                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • API String ID: 240030777-3166923314
                • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                APIs
                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                • GetLastError.KERNEL32 ref: 0041A7BB
                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                • String ID:
                • API String ID: 3587775597-0
                • Opcode ID: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                • Opcode Fuzzy Hash: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                APIs
                • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                • FindClose.KERNEL32(00000000), ref: 0040C47D
                • FindClose.KERNEL32(00000000), ref: 0040C4A8
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Find$CloseFile$FirstNext
                • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                • API String ID: 1164774033-405221262
                • Opcode ID: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                • Opcode Fuzzy Hash: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                APIs
                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                  • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                • String ID:
                • API String ID: 2341273852-0
                • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                APIs
                • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$Find$CreateFirstNext
                • String ID: 8SG$PXG$PXG$NG$PG
                • API String ID: 341183262-3812160132
                • Opcode ID: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                • Opcode Fuzzy Hash: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                APIs
                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                • GetLastError.KERNEL32 ref: 0040A2ED
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                • TranslateMessage.USER32(?), ref: 0040A34A
                • DispatchMessageA.USER32(?), ref: 0040A355
                Strings
                • Keylogger initialization failure: error , xrefs: 0040A301
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                • String ID: Keylogger initialization failure: error
                • API String ID: 3219506041-952744263
                • Opcode ID: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                • Opcode Fuzzy Hash: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                APIs
                • GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                • GetKeyState.USER32(00000010), ref: 0040A433
                • GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                • String ID:
                • API String ID: 1888522110-0
                • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                APIs
                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                • GetProcAddress.KERNEL32(00000000), ref: 00414271
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressCloseCreateLibraryLoadProcsend
                • String ID: SHDeleteKeyW$Shlwapi.dll
                • API String ID: 2127411465-314212984
                • Opcode ID: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                • Opcode Fuzzy Hash: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                APIs
                  • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                  • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                  • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                  • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                  • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                • GetProcAddress.KERNEL32(00000000), ref: 00416872
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                • String ID: !D@$PowrProf.dll$SetSuspendState
                • API String ID: 1589313981-2876530381
                • Opcode ID: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                • Opcode Fuzzy Hash: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                APIs
                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                • GetLastError.KERNEL32 ref: 0040BA58
                Strings
                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                • UserProfile, xrefs: 0040BA1E
                • [Chrome StoredLogins not found], xrefs: 0040BA72
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DeleteErrorFileLast
                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                • API String ID: 2018770650-1062637481
                • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                APIs
                • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                • GetLastError.KERNEL32 ref: 0041799D
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                • String ID: SeShutdownPrivilege
                • API String ID: 3534403312-3733053543
                • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                APIs
                • __EH_prolog.LIBCMT ref: 00409258
                  • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                • FindClose.KERNEL32(00000000), ref: 004093C1
                  • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                  • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                  • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                • FindClose.KERNEL32(00000000), ref: 004095B9
                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                • String ID:
                • API String ID: 1824512719-0
                • Opcode ID: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                • Opcode Fuzzy Hash: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$Open$ManagerStart
                • String ID:
                • API String ID: 276877138-0
                • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                APIs
                • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 004524D5
                • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004524FE
                • GetACP.KERNEL32 ref: 00452513
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: InfoLocale
                • String ID: ACP$OCP
                • API String ID: 2299586839-711371036
                • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                APIs
                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Resource$FindLoadLockSizeof
                • String ID: SETTINGS
                • API String ID: 3473537107-594951305
                • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                APIs
                • __EH_prolog.LIBCMT ref: 0040966A
                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Find$File$CloseFirstH_prologNext
                • String ID:
                • API String ID: 1157919129-0
                • Opcode ID: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                • Opcode Fuzzy Hash: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                  • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                • GetUserDefaultLCID.KERNEL32 ref: 0045271C
                • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004527ED
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                • String ID:
                • API String ID: 745075371-0
                • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                APIs
                • __EH_prolog.LIBCMT ref: 00408811
                • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                • String ID:
                • API String ID: 1771804793-0
                • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                APIs
                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DownloadExecuteFileShell
                • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe$open
                • API String ID: 2825088817-2026999973
                • Opcode ID: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                • Opcode Fuzzy Hash: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                APIs
                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: FileFind$FirstNextsend
                • String ID: XPG$XPG
                • API String ID: 4113138495-1962359302
                • Opcode ID: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                • Opcode Fuzzy Hash: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                APIs
                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                  • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                  • Part of subcall function 0041376F: RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                  • Part of subcall function 0041376F: RegCloseKey.KERNELBASE(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCreateInfoParametersSystemValue
                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                • API String ID: 4127273184-3576401099
                • Opcode ID: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                • Opcode Fuzzy Hash: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • IsValidCodePage.KERNEL32(00000000), ref: 00451DBA
                • _wcschr.LIBVCRUNTIME ref: 00451E4A
                • _wcschr.LIBVCRUNTIME ref: 00451E58
                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451EFB
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                • String ID:
                • API String ID: 4212172061-0
                • Opcode ID: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                • Opcode Fuzzy Hash: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                APIs
                • _free.LIBCMT ref: 004493BD
                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                • GetTimeZoneInformation.KERNEL32 ref: 004493CF
                • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 00449447
                • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 00449474
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                • String ID:
                • API String ID: 806657224-0
                • Opcode ID: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                • Instruction ID: 1863d2ad967fb4723a60e4ea427cb143a9fbff6035582c54e6546b9b7662ab80
                • Opcode Fuzzy Hash: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                • Instruction Fuzzy Hash: E1312570908201EFDB18DF69DE8086EBBB8FF0572071442AFE054973A1D3748D42DB18
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                  • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorInfoLastLocale$_free$_abort
                • String ID:
                • API String ID: 2829624132-0
                • Opcode ID: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                • Opcode Fuzzy Hash: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                APIs
                • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                • String ID:
                • API String ID: 3906539128-0
                • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                APIs
                • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                • ExitProcess.KERNEL32 ref: 004432EF
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                APIs
                • OpenClipboard.USER32(00000000), ref: 0040B711
                • GetClipboardData.USER32(0000000D), ref: 0040B71D
                • CloseClipboard.USER32 ref: 0040B725
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Clipboard$CloseDataOpen
                • String ID:
                • API String ID: 2058664381-0
                • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                APIs
                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: InfoLocale
                • String ID: GetLocaleInfoEx
                • API String ID: 2299586839-2904428671
                • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                APIs
                • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Heap$FreeProcess
                • String ID:
                • API String ID: 3859560861-0
                • Opcode ID: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                • Opcode Fuzzy Hash: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                APIs
                • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: FeaturePresentProcessor
                • String ID:
                • API String ID: 2325560087-0
                • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                  • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$_free$InfoLocale_abort
                • String ID:
                • API String ID: 1663032902-0
                • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • EnumSystemLocalesW.KERNEL32(004520C3,00000001), ref: 0045200D
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                • String ID:
                • API String ID: 1084509184-0
                • Opcode ID: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                • Opcode Fuzzy Hash: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$InfoLocale_abort_free
                • String ID:
                • API String ID: 2692324296-0
                • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • EnumSystemLocalesW.KERNEL32(00452313,00000001), ref: 00452082
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                • String ID:
                • API String ID: 1084509184-0
                • Opcode ID: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                • Opcode Fuzzy Hash: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                APIs
                  • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                • EnumSystemLocalesW.KERNEL32(Function_000483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CriticalEnterEnumLocalesSectionSystem
                • String ID:
                • API String ID: 1272433827-0
                • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • EnumSystemLocalesW.KERNEL32(00451EA7,00000001), ref: 00451F87
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                • String ID:
                • API String ID: 1084509184-0
                • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                • Instruction Fuzzy Hash:
                APIs
                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                  • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                • DeleteDC.GDI32(00000000), ref: 00418F2A
                • DeleteDC.GDI32(00000000), ref: 00418F2D
                • DeleteObject.GDI32(00000000), ref: 00418F30
                • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                • DeleteDC.GDI32(00000000), ref: 00418F62
                • DeleteDC.GDI32(00000000), ref: 00418F65
                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                • GetIconInfo.USER32(?,?), ref: 00418FBD
                • DeleteObject.GDI32(?), ref: 00418FEC
                • DeleteObject.GDI32(?), ref: 00418FF9
                • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                • DeleteDC.GDI32(?), ref: 0041917C
                • DeleteDC.GDI32(00000000), ref: 0041917F
                • DeleteObject.GDI32(00000000), ref: 00419182
                • GlobalFree.KERNEL32(?), ref: 0041918D
                • DeleteObject.GDI32(00000000), ref: 00419241
                • GlobalFree.KERNEL32(?), ref: 00419248
                • DeleteDC.GDI32(?), ref: 00419258
                • DeleteDC.GDI32(00000000), ref: 00419263
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                • String ID: DISPLAY
                • API String ID: 479521175-865373369
                • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                APIs
                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                • GetProcAddress.KERNEL32(00000000), ref: 00418139
                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                • GetProcAddress.KERNEL32(00000000), ref: 00418161
                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                • GetProcAddress.KERNEL32(00000000), ref: 00418175
                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                • ResumeThread.KERNEL32(?), ref: 00418435
                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                • GetCurrentProcess.KERNEL32(?), ref: 00418457
                • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                • GetLastError.KERNEL32 ref: 0041847A
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                • API String ID: 4188446516-3035715614
                • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                APIs
                  • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                  • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                  • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                  • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                • ExitProcess.KERNEL32 ref: 0040D7D0
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                • API String ID: 1861856835-332907002
                • Opcode ID: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                • Opcode Fuzzy Hash: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                APIs
                  • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                  • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                  • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                  • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                • ExitProcess.KERNEL32 ref: 0040D419
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                • API String ID: 3797177996-2557013105
                • Opcode ID: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                • Opcode Fuzzy Hash: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                APIs
                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                • ExitProcess.KERNEL32(00000000), ref: 004124A0
                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                • CloseHandle.KERNEL32(00000000), ref: 0041253B
                • GetCurrentProcessId.KERNEL32 ref: 00412541
                • PathFileExistsW.SHLWAPI(?), ref: 00412572
                • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                  • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                • Sleep.KERNEL32(000001F4), ref: 00412682
                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                • CloseHandle.KERNEL32(00000000), ref: 004126A9
                • GetCurrentProcessId.KERNEL32 ref: 004126AF
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                • String ID: .exe$8SG$WDH$exepath$open$temp_
                • API String ID: 2649220323-436679193
                • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                APIs
                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                • SetEvent.KERNEL32 ref: 0041B219
                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                • CloseHandle.KERNEL32 ref: 0041B23A
                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                • API String ID: 738084811-2094122233
                • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                APIs
                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$Write$Create
                • String ID: RIFF$WAVE$data$fmt
                • API String ID: 1602526932-4212202414
                • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                APIs
                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe,00000001,0040764D,C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                • API String ID: 1646373207-3859664295
                • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                APIs
                • _wcslen.LIBCMT ref: 0040CE07
                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                • _wcslen.LIBCMT ref: 0040CEE6
                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe,00000000,00000000), ref: 0040CF84
                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                • _wcslen.LIBCMT ref: 0040CFC6
                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                • ExitProcess.KERNEL32 ref: 0040D062
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                • String ID: 6$C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe$del$open
                • API String ID: 1579085052-679340612
                • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                APIs
                • lstrlenW.KERNEL32(?), ref: 0041C036
                • _memcmp.LIBVCRUNTIME ref: 0041C04E
                • lstrlenW.KERNEL32(?), ref: 0041C067
                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                • _wcslen.LIBCMT ref: 0041C13B
                • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                • GetLastError.KERNEL32 ref: 0041C173
                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                • GetLastError.KERNEL32 ref: 0041C1D0
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                • String ID: ?
                • API String ID: 3941738427-1684325040
                • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$EnvironmentVariable$_wcschr
                • String ID:
                • API String ID: 3899193279-0
                • Opcode ID: 138887d55368f9cf58208da3f492a4fc17d417063cec38a58e843e9613042db9
                • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                • Opcode Fuzzy Hash: 138887d55368f9cf58208da3f492a4fc17d417063cec38a58e843e9613042db9
                • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                APIs
                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                  • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                  • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                  • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                • Sleep.KERNEL32(00000064), ref: 00412E94
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                • String ID: /stext "$0TG$0TG$NG$NG
                • API String ID: 1223786279-2576077980
                • Opcode ID: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                • Opcode Fuzzy Hash: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                APIs
                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                • LoadLibraryA.KERNEL32(?), ref: 00414E17
                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                • LoadLibraryA.KERNEL32(?), ref: 00414E76
                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                • API String ID: 2490988753-744132762
                • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                APIs
                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                • GetCursorPos.USER32(?), ref: 0041D5E9
                • SetForegroundWindow.USER32(?), ref: 0041D5F2
                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                • ExitProcess.KERNEL32 ref: 0041D665
                • CreatePopupMenu.USER32 ref: 0041D66B
                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                • String ID: Close
                • API String ID: 1657328048-3535843008
                • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$Info
                • String ID:
                • API String ID: 2509303402-0
                • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                APIs
                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                • __aulldiv.LIBCMT ref: 00408D4D
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                • CloseHandle.KERNEL32(00000000), ref: 00408F64
                • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                • API String ID: 3086580692-2582957567
                • Opcode ID: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                • Opcode Fuzzy Hash: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                APIs
                • Sleep.KERNEL32(00001388), ref: 0040A740
                  • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                  • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                  • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                  • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                • String ID: 8SG$8SG$pQG$pQG$PG$PG
                • API String ID: 3795512280-1152054767
                • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                APIs
                • ___free_lconv_mon.LIBCMT ref: 0045130A
                  • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                  • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                  • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                • _free.LIBCMT ref: 004512FF
                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                • _free.LIBCMT ref: 00451321
                • _free.LIBCMT ref: 00451336
                • _free.LIBCMT ref: 00451341
                • _free.LIBCMT ref: 00451363
                • _free.LIBCMT ref: 00451376
                • _free.LIBCMT ref: 00451384
                • _free.LIBCMT ref: 0045138F
                • _free.LIBCMT ref: 004513C7
                • _free.LIBCMT ref: 004513CE
                • _free.LIBCMT ref: 004513EB
                • _free.LIBCMT ref: 00451403
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                • String ID:
                • API String ID: 161543041-0
                • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                APIs
                • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041C726
                • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseEnumOpen
                • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                • API String ID: 1332880857-3730529168
                • Opcode ID: f8c39a8c5312d126ce2fea3caf237c12ed67f6eb61076c5a3b07a390ba7738a1
                • Instruction ID: 30dd124696def6d144da0f01c12024620090e461f41beb3abd2b2340f2562d2c
                • Opcode Fuzzy Hash: f8c39a8c5312d126ce2fea3caf237c12ed67f6eb61076c5a3b07a390ba7738a1
                • Instruction Fuzzy Hash: E961F3711082419AD325EF11D851EEFB3E8BF94309F10493FB589921A2FF789E49CA5A
                APIs
                • __EH_prolog.LIBCMT ref: 00419FB9
                • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                • GetLocalTime.KERNEL32(?), ref: 0041A105
                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                • API String ID: 489098229-1431523004
                • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                APIs
                  • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                  • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                  • Part of subcall function 004136F8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                  • Part of subcall function 004136F8: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                  • Part of subcall function 004136F8: RegCloseKey.KERNELBASE(00000000), ref: 00413738
                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                • ExitProcess.KERNEL32 ref: 0040D9C4
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                • API String ID: 1913171305-3159800282
                • Opcode ID: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                • Opcode Fuzzy Hash: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free
                • String ID:
                • API String ID: 269201875-0
                • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                APIs
                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                • closesocket.WS2_32(000000FF), ref: 00404E5A
                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                • String ID:
                • API String ID: 3658366068-0
                • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                APIs
                  • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                • GetLastError.KERNEL32 ref: 00455CEF
                • __dosmaperr.LIBCMT ref: 00455CF6
                • GetFileType.KERNEL32(00000000), ref: 00455D02
                • GetLastError.KERNEL32 ref: 00455D0C
                • __dosmaperr.LIBCMT ref: 00455D15
                • CloseHandle.KERNEL32(00000000), ref: 00455D35
                • CloseHandle.KERNEL32(?), ref: 00455E7F
                • GetLastError.KERNEL32 ref: 00455EB1
                • __dosmaperr.LIBCMT ref: 00455EB8
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                • String ID: H
                • API String ID: 4237864984-2852464175
                • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free
                • String ID: \&G$\&G$`&G
                • API String ID: 269201875-253610517
                • Opcode ID: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                • Opcode Fuzzy Hash: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: 65535$udp
                • API String ID: 0-1267037602
                • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                APIs
                • __Init_thread_footer.LIBCMT ref: 0040AD38
                • Sleep.KERNEL32(000001F4), ref: 0040AD43
                • GetForegroundWindow.USER32 ref: 0040AD49
                • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                • Sleep.KERNEL32(000003E8), ref: 0040AE54
                  • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                • String ID: [${ User has been idle for $ minutes }$]
                • API String ID: 911427763-3954389425
                • Opcode ID: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                • Opcode Fuzzy Hash: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                APIs
                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                • __dosmaperr.LIBCMT ref: 0043A8A6
                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                • __dosmaperr.LIBCMT ref: 0043A8E3
                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                • __dosmaperr.LIBCMT ref: 0043A937
                • _free.LIBCMT ref: 0043A943
                • _free.LIBCMT ref: 0043A94A
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                • String ID:
                • API String ID: 2441525078-0
                • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                APIs
                • SetEvent.KERNEL32(?,?), ref: 004054BF
                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                • TranslateMessage.USER32(?), ref: 0040557E
                • DispatchMessageA.USER32(?), ref: 00405589
                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                • String ID: CloseChat$DisplayMessage$GetMessage
                • API String ID: 2956720200-749203953
                • Opcode ID: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                • Opcode Fuzzy Hash: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                APIs
                  • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                • String ID: 0VG$0VG$<$@$Temp
                • API String ID: 1704390241-2575729100
                • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                APIs
                • OpenClipboard.USER32 ref: 00416941
                • EmptyClipboard.USER32 ref: 0041694F
                • CloseClipboard.USER32 ref: 00416955
                • OpenClipboard.USER32 ref: 0041695C
                • GetClipboardData.USER32(0000000D), ref: 0041696C
                • GlobalLock.KERNEL32(00000000), ref: 00416975
                • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                • CloseClipboard.USER32 ref: 00416984
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                • String ID: !D@
                • API String ID: 2172192267-604454484
                • Opcode ID: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                • Opcode Fuzzy Hash: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                APIs
                • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                • CloseHandle.KERNEL32(00000000), ref: 0041345F
                • CloseHandle.KERNEL32(?), ref: 00413465
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                • String ID:
                • API String ID: 297527592-0
                • Opcode ID: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                • Opcode Fuzzy Hash: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$Open$ControlManager
                • String ID:
                • API String ID: 221034970-0
                • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                APIs
                • _free.LIBCMT ref: 00448135
                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                • _free.LIBCMT ref: 00448141
                • _free.LIBCMT ref: 0044814C
                • _free.LIBCMT ref: 00448157
                • _free.LIBCMT ref: 00448162
                • _free.LIBCMT ref: 0044816D
                • _free.LIBCMT ref: 00448178
                • _free.LIBCMT ref: 00448183
                • _free.LIBCMT ref: 0044818E
                • _free.LIBCMT ref: 0044819C
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Eventinet_ntoa
                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                • API String ID: 3578746661-3604713145
                • Opcode ID: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                • Opcode Fuzzy Hash: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                APIs
                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DecodePointer
                • String ID: acos$asin$exp$log$log10$pow$sqrt
                • API String ID: 3527080286-3064271455
                • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                APIs
                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                • Sleep.KERNEL32(00000064), ref: 00417521
                • DeleteFileW.KERNEL32(00000000), ref: 00417555
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CreateDeleteExecuteShellSleep
                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                • API String ID: 1462127192-2001430897
                • Opcode ID: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                • Opcode Fuzzy Hash: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                APIs
                • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe), ref: 0040749E
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CurrentProcess
                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                • API String ID: 2050909247-4242073005
                • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                APIs
                • _strftime.LIBCMT ref: 00401D50
                  • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                • API String ID: 3809562944-243156785
                • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                • int.LIBCPMT ref: 00410E81
                  • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                  • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                • std::_Facet_Register.LIBCPMT ref: 00410EC1
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                • __Init_thread_footer.LIBCMT ref: 00410F29
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                • String ID: ,kG$0kG
                • API String ID: 3815856325-2015055088
                • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                APIs
                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                • waveInStart.WINMM ref: 00401CFE
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                • String ID: dMG$|MG$PG
                • API String ID: 1356121797-532278878
                • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                  • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                  • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                  • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                • TranslateMessage.USER32(?), ref: 0041D4E9
                • DispatchMessageA.USER32(?), ref: 0041D4F3
                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                • String ID: Remcos
                • API String ID: 1970332568-165870891
                • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                APIs
                • GetCPInfo.KERNEL32(?,?), ref: 00453E2F
                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453EB2
                • __alloca_probe_16.LIBCMT ref: 00453EEA
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453F45
                • __alloca_probe_16.LIBCMT ref: 00453F94
                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F5C
                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FD8
                • __freea.LIBCMT ref: 00454003
                • __freea.LIBCMT ref: 0045400F
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                • String ID:
                • API String ID: 201697637-0
                • Opcode ID: 41faff77b3ca8bcb7800d11aee7d3bd6127a2cdf4248cdb25627aedf265c2dc0
                • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                • Opcode Fuzzy Hash: 41faff77b3ca8bcb7800d11aee7d3bd6127a2cdf4248cdb25627aedf265c2dc0
                • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                APIs
                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • _memcmp.LIBVCRUNTIME ref: 00445423
                • _free.LIBCMT ref: 00445494
                • _free.LIBCMT ref: 004454AD
                • _free.LIBCMT ref: 004454DF
                • _free.LIBCMT ref: 004454E8
                • _free.LIBCMT ref: 004454F4
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$ErrorLast$_abort_memcmp
                • String ID: C
                • API String ID: 1679612858-1037565863
                • Opcode ID: f6fd18d4392df02cbe2be5e2d03c6f20a759fef808f06ac5ce3ebcd5771f977e
                • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                • Opcode Fuzzy Hash: f6fd18d4392df02cbe2be5e2d03c6f20a759fef808f06ac5ce3ebcd5771f977e
                • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: tcp$udp
                • API String ID: 0-3725065008
                • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                APIs
                • __Init_thread_footer.LIBCMT ref: 004018BE
                • ExitThread.KERNEL32 ref: 004018F6
                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                • String ID: PkG$XMG$NG$NG
                • API String ID: 1649129571-3151166067
                • Opcode ID: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                • Opcode Fuzzy Hash: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                APIs
                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                  • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                  • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                • String ID: .part
                • API String ID: 1303771098-3499674018
                • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                APIs
                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                • __alloca_probe_16.LIBCMT ref: 0044ACDB
                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                • __alloca_probe_16.LIBCMT ref: 0044ADC0
                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                • __freea.LIBCMT ref: 0044AE30
                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                • __freea.LIBCMT ref: 0044AE39
                • __freea.LIBCMT ref: 0044AE5E
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                • String ID:
                • API String ID: 3864826663-0
                • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                APIs
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: InputSend
                • String ID:
                • API String ID: 3431551938-0
                • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: __freea$__alloca_probe_16_free
                • String ID: a/p$am/pm$zD
                • API String ID: 2936374016-2723203690
                • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                APIs
                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Enum$InfoQueryValue
                • String ID: [regsplt]$xUG$TG
                • API String ID: 3554306468-1165877943
                • Opcode ID: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                • Opcode Fuzzy Hash: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                APIs
                • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                • __fassign.LIBCMT ref: 0044B479
                • __fassign.LIBCMT ref: 0044B494
                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                • String ID:
                • API String ID: 1324828854-0
                • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                APIs
                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                  • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                  • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseEnumInfoOpenQuerysend
                • String ID: xUG$NG$NG$TG
                • API String ID: 3114080316-2811732169
                • Opcode ID: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                • Opcode Fuzzy Hash: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                APIs
                  • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                  • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                  • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                  • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                • _wcslen.LIBCMT ref: 0041B763
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                • API String ID: 37874593-122982132
                • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                APIs
                  • Part of subcall function 004135A6: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                  • Part of subcall function 004135A6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                  • Part of subcall function 004135A6: RegCloseKey.KERNELBASE(?), ref: 004135F2
                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                • API String ID: 1133728706-4073444585
                • Opcode ID: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                • Opcode Fuzzy Hash: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                APIs
                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                • CloseHandle.KERNEL32(00000000), ref: 0041C459
                • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                • CloseHandle.KERNEL32(00000000), ref: 0041C477
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CloseHandle$CreatePointerWrite
                • String ID: hpF
                • API String ID: 1852769593-151379673
                • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                APIs
                  • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                • _free.LIBCMT ref: 00450F48
                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                • _free.LIBCMT ref: 00450F53
                • _free.LIBCMT ref: 00450F5E
                • _free.LIBCMT ref: 00450FB2
                • _free.LIBCMT ref: 00450FBD
                • _free.LIBCMT ref: 00450FC8
                • _free.LIBCMT ref: 00450FD3
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                • int.LIBCPMT ref: 00411183
                  • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                  • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                • std::_Facet_Register.LIBCPMT ref: 004111C3
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                • String ID: (mG
                • API String ID: 2536120697-4059303827
                • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                APIs
                • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastValue___vcrt_
                • String ID:
                • API String ID: 3852720340-0
                • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                APIs
                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe), ref: 004075D0
                  • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                  • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                • CoUninitialize.OLE32 ref: 00407629
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: InitializeObjectUninitialize_wcslen
                • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                • API String ID: 3851391207-2534652239
                • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                APIs
                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                • GetLastError.KERNEL32 ref: 0040BAE7
                Strings
                • [Chrome Cookies not found], xrefs: 0040BB01
                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                • UserProfile, xrefs: 0040BAAD
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DeleteErrorFileLast
                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                • API String ID: 2018770650-304995407
                • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                APIs
                • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Console$AllocOutputShowWindow
                • String ID: Remcos v$5.1.0 Pro$CONOUT$
                • API String ID: 2425139147-1043272453
                • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                APIs
                • __allrem.LIBCMT ref: 0043AC69
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                • __allrem.LIBCMT ref: 0043AC9C
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                • __allrem.LIBCMT ref: 0043ACD1
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                • String ID:
                • API String ID: 1992179935-0
                • Opcode ID: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                • Opcode Fuzzy Hash: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                APIs
                • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                  • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: H_prologSleep
                • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                • API String ID: 3469354165-3054508432
                • Opcode ID: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                • Opcode Fuzzy Hash: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                APIs
                  • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                  • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                  • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                  • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                • String ID:
                • API String ID: 3950776272-0
                • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: __cftoe
                • String ID:
                • API String ID: 4189289331-0
                • Opcode ID: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                • Opcode Fuzzy Hash: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                • String ID:
                • API String ID: 493672254-0
                • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                APIs
                • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • _free.LIBCMT ref: 0044824C
                • _free.LIBCMT ref: 00448274
                • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • _abort.LIBCMT ref: 00448293
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$_free$_abort
                • String ID:
                • API String ID: 3160817290-0
                • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$Open$ControlManager
                • String ID:
                • API String ID: 221034970-0
                • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$Open$ControlManager
                • String ID:
                • API String ID: 221034970-0
                • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Service$CloseHandle$Open$ControlManager
                • String ID:
                • API String ID: 221034970-0
                • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                APIs
                • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                • wsprintfW.USER32 ref: 0040B1F3
                  • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: EventLocalTimewsprintf
                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                • API String ID: 1497725170-248792730
                • Opcode ID: 5930b91d6002e4bc173ab4be93e7cb7fd053249898d40d7797ac70fa62357d50
                • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                • Opcode Fuzzy Hash: 5930b91d6002e4bc173ab4be93e7cb7fd053249898d40d7797ac70fa62357d50
                • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                APIs
                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CloseCreateHandleSizeSleep
                • String ID: XQG
                • API String ID: 1958988193-3606453820
                • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                APIs
                • RegisterClassExA.USER32(00000030), ref: 0041D55B
                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                • GetLastError.KERNEL32 ref: 0041D580
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ClassCreateErrorLastRegisterWindow
                • String ID: 0$MsgWindowClass
                • API String ID: 2877667751-2410386613
                • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                APIs
                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                • CloseHandle.KERNEL32(?), ref: 004077AA
                • CloseHandle.KERNEL32(?), ref: 004077AF
                Strings
                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                • C:\Windows\System32\cmd.exe, xrefs: 00407796
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandle$CreateProcess
                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                • API String ID: 2922976086-4183131282
                • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                Strings
                • C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe, xrefs: 004076C4
                • SG, xrefs: 004076DA
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: SG$C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
                • API String ID: 0-3345130889
                • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                APIs
                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                APIs
                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                • String ID: KeepAlive | Disabled
                • API String ID: 2993684571-305739064
                • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                APIs
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                • Sleep.KERNEL32(00002710), ref: 0041AE07
                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: PlaySound$HandleLocalModuleSleepTime
                • String ID: Alarm triggered
                • API String ID: 614609389-2816303416
                • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                APIs
                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                Strings
                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Console$AttributeText$BufferHandleInfoScreen
                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                • API String ID: 3024135584-2418719853
                • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                APIs
                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                • _free.LIBCMT ref: 00444E06
                • _free.LIBCMT ref: 00444E1D
                • _free.LIBCMT ref: 00444E3C
                • _free.LIBCMT ref: 00444E57
                • _free.LIBCMT ref: 00444E6E
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$AllocateHeap
                • String ID:
                • API String ID: 3033488037-0
                • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                APIs
                  • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                  • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                • String ID:
                • API String ID: 4269425633-0
                • Opcode ID: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                • Opcode Fuzzy Hash: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free
                • String ID:
                • API String ID: 269201875-0
                • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                APIs
                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                • __alloca_probe_16.LIBCMT ref: 004511B1
                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                • __freea.LIBCMT ref: 0045121D
                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                • String ID:
                • API String ID: 313313983-0
                • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                APIs
                • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                • _free.LIBCMT ref: 0044F3BF
                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                • String ID:
                • API String ID: 336800556-0
                • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                APIs
                • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                • _free.LIBCMT ref: 004482D3
                • _free.LIBCMT ref: 004482FA
                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$_free
                • String ID:
                • API String ID: 3170660625-0
                • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                APIs
                • _free.LIBCMT ref: 004509D4
                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                • _free.LIBCMT ref: 004509E6
                • _free.LIBCMT ref: 004509F8
                • _free.LIBCMT ref: 00450A0A
                • _free.LIBCMT ref: 00450A1C
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                APIs
                • _free.LIBCMT ref: 00444066
                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                • _free.LIBCMT ref: 00444078
                • _free.LIBCMT ref: 0044408B
                • _free.LIBCMT ref: 0044409C
                • _free.LIBCMT ref: 004440AD
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                APIs
                • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                  • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                  • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                  • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CreateFileKeyboardLayoutNameconnectsend
                • String ID: XQG$NG$PG
                • API String ID: 1634807452-3565412412
                • Opcode ID: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                • Opcode Fuzzy Hash: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                APIs
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                • String ID: `#D$`#D
                • API String ID: 885266447-2450397995
                • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe,00000104), ref: 00443475
                • _free.LIBCMT ref: 00443540
                • _free.LIBCMT ref: 0044354A
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free$FileModuleName
                • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exe
                • API String ID: 2506810119-1108195513
                • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                APIs
                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                  • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                  • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                  • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                • String ID: /sort "Visit Time" /stext "$0NG
                • API String ID: 368326130-3219657780
                • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                APIs
                • _wcslen.LIBCMT ref: 004162F5
                  • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                  • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                  • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                  • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _wcslen$CloseCreateValue
                • String ID: !D@$okmode$PG
                • API String ID: 3411444782-3370592832
                • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                APIs
                  • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                Strings
                • User Data\Default\Network\Cookies, xrefs: 0040C603
                • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                • API String ID: 1174141254-1980882731
                • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                APIs
                  • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                Strings
                • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                • API String ID: 1174141254-1980882731
                • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                APIs
                • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
                • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                  • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                  • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CreateThread$LocalTimewsprintf
                • String ID: Offline Keylogger Started
                • API String ID: 465354869-4114347211
                • Opcode ID: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                • Opcode Fuzzy Hash: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                APIs
                  • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                  • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CreateThread$LocalTime$wsprintf
                • String ID: Online Keylogger Started
                • API String ID: 112202259-1258561607
                • Opcode ID: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                • Opcode Fuzzy Hash: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                APIs
                • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: CryptUnprotectData$crypt32
                • API String ID: 2574300362-2380590389
                • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                APIs
                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                • CloseHandle.KERNEL32(?), ref: 004051CA
                • SetEvent.KERNEL32(?), ref: 004051D9
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseEventHandleObjectSingleWait
                • String ID: Connection Timeout
                • API String ID: 2055531096-499159329
                • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                APIs
                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Exception@8Throw
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 2005118841-1866435925
                • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                APIs
                • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseCreateValue
                • String ID: pth_unenc
                • API String ID: 1818849710-4028850238
                • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                  • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                  • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                • String ID: bad locale name
                • API String ID: 3628047217-1405518554
                • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                APIs
                • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                • ShowWindow.USER32(00000009), ref: 00416C61
                • SetForegroundWindow.USER32 ref: 00416C6D
                  • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                  • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                  • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                • String ID: !D@
                • API String ID: 3446828153-604454484
                • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                APIs
                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExecuteShell
                • String ID: /C $cmd.exe$open
                • API String ID: 587946157-3896048727
                • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                APIs
                • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: TerminateThread$HookUnhookWindows
                • String ID: pth_unenc
                • API String ID: 3123878439-4028850238
                • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                APIs
                • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: GetCursorInfo$User32.dll
                • API String ID: 1646373207-2714051624
                • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                APIs
                • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: GetLastInputInfo$User32.dll
                • API String ID: 2574300362-1519888992
                • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: __alldvrm$_strrchr
                • String ID:
                • API String ID: 1036877536-0
                • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: _free
                • String ID:
                • API String ID: 269201875-0
                • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                APIs
                Strings
                • Cleared browsers logins and cookies., xrefs: 0040C0F5
                • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Sleep
                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                • API String ID: 3472027048-1236744412
                • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                APIs
                  • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                  • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                  • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                • Sleep.KERNEL32(000001F4), ref: 0040A573
                • Sleep.KERNEL32(00000064), ref: 0040A5FD
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Window$SleepText$ForegroundLength
                • String ID: [ $ ]
                • API String ID: 3309952895-93608704
                • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                APIs
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoad$ErrorLast
                • String ID:
                • API String ID: 3177248105-0
                • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                APIs
                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: File$CloseCreateHandleReadSize
                • String ID:
                • API String ID: 3919263394-0
                • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                APIs
                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleOpenProcess
                • String ID:
                • API String ID: 39102293-0
                • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                APIs
                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                  • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                • _UnwindNestedFrames.LIBCMT ref: 00439891
                • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                • String ID:
                • API String ID: 2633735394-0
                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                APIs
                • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                • GetSystemMetrics.USER32(0000004F), ref: 00419402
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: MetricsSystem
                • String ID:
                • API String ID: 4116985748-0
                • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                APIs
                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                  • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                • String ID:
                • API String ID: 1761009282-0
                • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                APIs
                • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorHandling__start
                • String ID: pow
                • API String ID: 3213639722-2276729525
                • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                APIs
                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                • __Init_thread_footer.LIBCMT ref: 0040B797
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Init_thread_footer__onexit
                • String ID: [End of clipboard]$[Text copied to clipboard]
                • API String ID: 1881088180-3686566968
                • Opcode ID: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                • Opcode Fuzzy Hash: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                APIs
                • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C12
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: ACP$OCP
                • API String ID: 0-711371036
                • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                APIs
                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                Strings
                • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: LocalTime
                • String ID: KeepAlive | Enabled | Timeout:
                • API String ID: 481472006-1507639952
                • Opcode ID: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                • Opcode Fuzzy Hash: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                APIs
                • Sleep.KERNEL32 ref: 00416640
                • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DownloadFileSleep
                • String ID: !D@
                • API String ID: 1931167962-604454484
                • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                APIs
                • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: LocalTime
                • String ID: | $%02i:%02i:%02i:%03i
                • API String ID: 481472006-2430845779
                • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                APIs
                • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID: alarm.wav$hYG
                • API String ID: 1174141254-2782910960
                • Opcode ID: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                • Opcode Fuzzy Hash: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                APIs
                  • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                  • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • CloseHandle.KERNEL32(?), ref: 0040B0B4
                • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                • String ID: Online Keylogger Stopped
                • API String ID: 1623830855-1496645233
                • Opcode ID: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                • Opcode Fuzzy Hash: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                APIs
                • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: wave$BufferHeaderPrepare
                • String ID: XMG
                • API String ID: 2315374483-813777761
                • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                APIs
                • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: LocaleValid
                • String ID: IsValidLocaleName$JD
                • API String ID: 1901932003-2234456777
                • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                APIs
                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID: UserProfile$\AppData\Local\Google\Chrome\
                • API String ID: 1174141254-4188645398
                • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                APIs
                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                • API String ID: 1174141254-2800177040
                • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                APIs
                • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID: AppData$\Opera Software\Opera Stable\
                • API String ID: 1174141254-1629609700
                • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                APIs
                • GetKeyState.USER32(00000011), ref: 0040B64B
                  • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                  • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                  • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                  • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                  • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                  • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                  • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                  • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                • String ID: [AltL]$[AltR]
                • API String ID: 2738857842-2658077756
                • Opcode ID: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                • Opcode Fuzzy Hash: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                APIs
                • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: uD
                • API String ID: 0-2547262877
                • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                APIs
                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ExecuteShell
                • String ID: !D@$open
                • API String ID: 587946157-1586967515
                • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                APIs
                • GetKeyState.USER32(00000012), ref: 0040B6A5
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: State
                • String ID: [CtrlL]$[CtrlR]
                • API String ID: 1649606143-2446555240
                • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                APIs
                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                • __Init_thread_footer.LIBCMT ref: 00410F29
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: Init_thread_footer__onexit
                • String ID: ,kG$0kG
                • API String ID: 1881088180-2015055088
                • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                APIs
                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                Strings
                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DeleteOpenValue
                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                • API String ID: 2654517830-1051519024
                • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                APIs
                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: DeleteDirectoryFileRemove
                • String ID: pth_unenc
                • API String ID: 3325800564-4028850238
                • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                APIs
                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ObjectProcessSingleTerminateWait
                • String ID: pth_unenc
                • API String ID: 1872346434-4028850238
                • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                APIs
                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                • GetLastError.KERNEL32 ref: 00440D35
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharMultiWide$ErrorLast
                • String ID:
                • API String ID: 1717984340-0
                • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                APIs
                • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                Memory Dump Source
                • Source File: 00000002.00000002.4184920782.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastRead
                • String ID:
                • API String ID: 4100373531-0
                • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99