Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
Analysis ID:1504345
MD5:a11ca5e0c52c6f6797183f3eaf592bd4
SHA1:2a4b7155609a0d6530c46bcc19f8a2724cc2bcbd
SHA256:7509f9497471ef5ef9fb8cb4decb92af7f592b2e760156d1b4b4c1d7812ca040
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "192.3.64.152:2559:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TS121V", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4506855614.0000000001177000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4a8:$a1: Remcos restarted by watchdog!
          • 0x6ca20:$a3: %02i:%02i:%02i:%03i
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6c4a8:$a1: Remcos restarted by watchdog!
              • 0x6ca20:$a3: %02i:%02i:%02i:%03i
              4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
              • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
              • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6656c:$str_b2: Executing file:
              • 0x675ec:$str_b3: GetDirectListeningPort
              • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x67118:$str_b7: \update.vbs
              • 0x66594:$str_b9: Downloaded file:
              • 0x66580:$str_b10: Downloading file:
              • 0x66624:$str_b12: Failed to upload file:
              • 0x675b4:$str_b13: StartForward
              • 0x675d4:$str_b14: StopForward
              • 0x67070:$str_b15: fso.DeleteFile "
              • 0x67004:$str_b16: On Error Resume Next
              • 0x670a0:$str_b17: fso.DeleteFolder "
              • 0x66614:$str_b18: Uploaded file:
              • 0x665d4:$str_b19: Unable to delete:
              • 0x67038:$str_b20: while fso.FileExists("
              • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
              4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x6637c:$s1: CoGetObject
              • 0x66390:$s1: CoGetObject
              • 0x663ac:$s1: CoGetObject
              • 0x70338:$s1: CoGetObject
              • 0x6633c:$s2: Elevation:Administrator!new:
              Click to see the 27 entries

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: DA 76 22 27 90 A5 F3 EE 3C 26 53 C2 B0 E9 C9 81 3F 2B 13 12 FF 34 BD 93 9B CD 9A 50 7F F9 7F E9 19 89 9F 48 D0 DE A9 3D D5 CC C4 F8 68 D7 3E 73 B6 E0 B5 08 4B 23 37 BB 2B 75 50 20 DD E9 6F A8 F2 17 DB E3 7F 64 A3 0D 94 08 A2 8D EF F5 6F 8F B4 46 57 38 7D 35 FC 46 5B 89 32 72 86 D8 28 C0 41 A0 B2 9D 07 9C 17 B1 16 66 FF 40 17 43 34 BF 3D E0 4C 96 6E 86 AB 74 50 1C CD 5D 45 FD 48 72 B1 36 88 A5 82 C9 2D 5A A8 36 74 75 04 B9 CE AC 91 0E 62 44 06 F8 2F 9C 03 73 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, ProcessId: 3440, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-TS121V\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-04T19:57:58.555377+020020365941Malware Command and Control Activity Detected192.168.2.549706192.3.64.1522559TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-04T19:58:00.443924+020028033043Unknown Traffic192.168.2.549708178.237.33.5080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "192.3.64.152:2559:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TS121V", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeReversingLabs: Detection: 44%
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.4506855614.0000000001177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,4_2_00433837
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_98807438-1

              Exploits

              barindex
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTR

              Privilege Escalation

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004074FD _wcslen,CoGetObject,4_2_004074FD
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: GKJk.pdb source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: Binary string: GKJk.pdbSHA256\r2pNDs source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409253
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0041C291
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0040C34D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409665
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0044E879 FindFirstFileExA,4_2_0044E879
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_0040880C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040783C FindFirstFileW,FindNextFileW,4_2_0040783C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419AF5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040BB30
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040BD37
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407C97

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49706 -> 192.3.64.152:2559
              Source: Malware configuration extractorURLs: 192.3.64.152
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49708 -> 178.237.33.50:80
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,4_2_0041B380
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/A
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/SGZ
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp4
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplW

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000004_2_0040A2B8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B70E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_004168C1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B70E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,4_2_0040A3E0

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.4506855614.0000000001177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041C9E2 SystemParametersInfoW,4_2_0041C9E2

              System Summary

              barindex
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,4_2_004167B4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_00EAD2A40_2_00EAD2A4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D335380_2_06D33538
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D3C8280_2_06D3C828
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D385300_2_06D38530
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D385200_2_06D38520
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D335280_2_06D33528
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D380F80_2_06D380F8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D361780_2_06D36178
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D38A400_2_06D38A40
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D378110_2_06D37811
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 0_2_06D378200_2_06D37820
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0043E0CC4_2_0043E0CC
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041F0FA4_2_0041F0FA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004541594_2_00454159
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004381684_2_00438168
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004461F04_2_004461F0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0043E2FB4_2_0043E2FB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0045332B4_2_0045332B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0042739D4_2_0042739D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004374E64_2_004374E6
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0043E5584_2_0043E558
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004387704_2_00438770
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004378FE4_2_004378FE
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004339464_2_00433946
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0044D9C94_2_0044D9C9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00427A464_2_00427A46
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041DB624_2_0041DB62
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00427BAF4_2_00427BAF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00437D334_2_00437D33
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00435E5E4_2_00435E5E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00426E0E4_2_00426E0E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0043DE9D4_2_0043DE9D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00413FCA4_2_00413FCA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00436FEA4_2_00436FEA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: String function: 00434E10 appears 54 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: String function: 00402093 appears 50 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: String function: 00434770 appears 41 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: String function: 00401E65 appears 34 times
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2037741994.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2038236757.0000000002B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2041672575.00000000088F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGKJk.exe* vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2041246338.0000000006C70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2041115247.00000000054E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2038236757.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeBinary or memory string: OriginalFilenameGKJk.exe* vs SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, TBZTGwhLhgIb3k9TE4.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, TBZTGwhLhgIb3k9TE4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, TBZTGwhLhgIb3k9TE4.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, TBZTGwhLhgIb3k9TE4.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, TBZTGwhLhgIb3k9TE4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, TBZTGwhLhgIb3k9TE4.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, pMUVgcB54ud0wnPso9.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, pMUVgcB54ud0wnPso9.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@5/2@1/2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,4_2_00417952
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,4_2_0040F474
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,4_2_0041B4A8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AA4A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.logJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-TS121V
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMutant created: NULL
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeReversingLabs: Detection: 44%
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: GKJk.pdb source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
              Source: Binary string: GKJk.pdbSHA256\r2pNDs source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe

              Data Obfuscation

              barindex
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, MainForm.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.2b9c5a8.2.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.54e0000.6.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, TBZTGwhLhgIb3k9TE4.cs.Net Code: o3qqdBW5Np System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.2c0fa60.1.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.2b46968.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, TBZTGwhLhgIb3k9TE4.cs.Net Code: o3qqdBW5Np System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00457106 push ecx; ret 4_2_00457119
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0045B11A push esp; ret 4_2_0045B141
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0045E54D push esi; ret 4_2_0045E556
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00457A28 push eax; ret 4_2_00457A46
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00434E56 push ecx; ret 4_2_00434E69
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeStatic PE information: section name: .text entropy: 7.8435121254530715
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, VMqVUwRUqiLWpc2C7HC.csHigh entropy of concatenated method names: 'iCt9o3vcy4', 'S3T9nmbut7', 'TS79dyLisI', 'fkq9e5Dk0y', 'sGU9CLVHJj', 'g849kpIX9Z', 'XEq9uk7hIe', 'hqy9BWm1sk', 'c4F9AN61eH', 'Dd89M0ixov'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, CqkMRL0rHBvscNt0Bs.csHigh entropy of concatenated method names: 's8DDlTe4gm', 'LEjDSjcaws', 'cs4D6cMse8', 'nFjDGwLAjG', 'aA2DcXJbmd', 'FmID3TLnwh', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, ctJOcrgHb9AQNFER2X.csHigh entropy of concatenated method names: 'ToString', 'Ra1YrCBBGx', 'rETYSaCKOi', 'SYOY6ftM06', 'We5YGQdArs', 'PsUY3niJN3', 'D6GYp6fcJo', 'aXuYQlegOe', 'eL1YKM87uW', 'kphYZUG9RE'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, o8MZRbI2Z6M9ro0rQh.csHigh entropy of concatenated method names: 'A8dDVd9Paw', 'SMEDTawZ8N', 'qoID1m5s9b', 'V4eDsjrVbS', 'krxDN5uWDF', 'oMnDf3wsMD', 'FLPDh5WFjr', 'agkD8OyQ8N', 'QQLD4ZEgF0', 'v4wD2LJCxK'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, tWE3IaTtqycePIX720.csHigh entropy of concatenated method names: 'Dispose', 'csfR0u7X9B', 'iufFSwTaim', 'dJY11NRcDX', 'aH8R7MZRb2', 'N6MRz9ro0r', 'ProcessDialogKey', 'LhuFUqkMRL', 'OHBFRvscNt', 'XBsFFXijHB'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, cOtxBpMw60xbWJZct7.csHigh entropy of concatenated method names: 'TF6sCFGVVJ', 'uU6sud7i1e', 'Tyk1627IR4', 'KqW1GDugb5', 'PwN13e9qY3', 'SYY1pdxopB', 'kXQ1QBci8d', 'jot1KFkqAg', 'j6N1ZMJBOr', 'nD81x7ngku'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, Oh9Pc4RaXsbNgyPoYK1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'esJbcUV7RP', 't6abWitGkP', 'Q9ybgS88Xb', 'Ki3byZEipZ', 'lhAbJLCVKA', 'hGlbLffBfx', 'qKxbXf8tvf'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, BUNw5Eqh0adBAatJBl.csHigh entropy of concatenated method names: 'FTYRfMUVgc', 'Q4uRhd0wnP', 'rDRR4U4PNH', 'vCeR2bFOtx', 'UZcRmt7Ius', 'FV9RYDyL8w', 'yk0LU8NFrAf4buM3sb', 'rpSdYLtuvW8puLohAV', 'No4Qw2fRQV6l5YrnRh', 'WqrRRDoL25'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, XusMV9lDyL8wYlKbr6.csHigh entropy of concatenated method names: 'mhuNvDEVgU', 'vunNTNQO79', 'wUnNs0DPs9', 'IDfNfHP8Zp', 'lJONhq4LfA', 'h6rsJQ2tox', 'WynsLZmi6g', 'jtOsXOZw0d', 'ksOsIG9y56', 'ASbs0nXRpf'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, Gws7I2RFLiQayy79FjA.csHigh entropy of concatenated method names: 'TtIboECf0C', 'nZubnFea1X', 'khebd4NoSH', 'Lo6QNO2koj4b4tZMHLp', 'kSfRv32lu7BfYfjFVBH', 'uyFrgm2vko7qXrhAsCy', 'vy6qIW2TyjPIvbNcxWL', 'TqkuHQ2gcaf5kPl4ewT'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, S5LlvsQybFV7Fyoeik.csHigh entropy of concatenated method names: 'ughfVy9v4n', 'Bimf1qg0k2', 'xrMfNBaFt8', 'NXyN7XnLDn', 'mBXNzEi2QU', 'qmZfU4EglP', 'z1LfRQDtj8', 'JOIfFpU99R', 'baofauFeLI', 'BfDfqjghX8'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, TBZTGwhLhgIb3k9TE4.csHigh entropy of concatenated method names: 'pDXava277g', 'PpWaVYOpcR', 'SiraT570oG', 'YnQa19DrnV', 'nGaasU9kJu', 'mPLaNsXZmN', 'i2IafCbyBb', 'MvVahnMRXU', 'hdOa8I3y6H', 'lHpa42kLIN'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, ln0s29ADRU4PNHwCeb.csHigh entropy of concatenated method names: 'aFo1evfj6C', 'vdm1kJM0g6', 'bYZ1BS8sAL', 'bLv1ATsWO7', 'rLQ1mKncpH', 'zN31YHBRqB', 'H3p1iBFAoZ', 'SQZ1DtaYcE', 'PSg19TV1nf', 'lRv1bUI7ro'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, QtnM5UcPW6K0OZPbqO.csHigh entropy of concatenated method names: 'JrbmxyJFXL', 'B52mto8wWB', 'GiTmcUr1tR', 'MT5mWppv21', 'LEqmStyoBq', 'ERFm6aAl4C', 'DydmGMpqBR', 'U89m34IwA7', 'EAqmpPjSg2', 'K98mQElTQm'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, pMUVgcB54ud0wnPso9.csHigh entropy of concatenated method names: 'nRATcuFlyY', 'IasTWSKQDv', 'c7RTg3GNON', 'yZqTyvJXNn', 'tlfTJPZhkD', 'GYoTL1aKIs', 'YXUTXkv8FJ', 'imZTIm2TZD', 'zLsT01GgBw', 'D67T7dJ9u4'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, Re3ju5ZsBlVJLI2Tif.csHigh entropy of concatenated method names: 'aqVfoESw9v', 'Y5Dfnbcv3f', 'r4CfdgXl0i', 'fLPfehOsmg', 'rINfCLLCqM', 'yhifkYLYKl', 'kebfuEMxi7', 'd2KfB5y9nR', 'acKfAr3L4L', 's8qfMBqJ2T'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, Mp9GtQzsf3NDOE95Lt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IHq9HYLL5O', 's2S9md0uqb', 'iIS9YaR8sc', 'aSX9iSpV3m', 'MQ89DpeBK6', 'aAR995Bmqt', 'MRl9bcynwH'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, mmNUHqFe6h0f5SL1Xr.csHigh entropy of concatenated method names: 'RxLdiAhZE', 'IUTew7gGw', 'NrNkh09ka', 'URqunGMd2', 'EHIAt2jwp', 'P8jM0V95S', 'x6x07C04Ga63NptjZ8', 'jqR7DYsplgscDw43qi', 'kuwDEClbo', 'c2JbgogCg'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, OLWcQg5KAKJihMS3IR.csHigh entropy of concatenated method names: 'RFTHBFQVYM', 'YdYHAipbK9', 'j9EHluCYfn', 'VnrHSfx9Uv', 'qdDHGcRV4u', 'UG1H30uwU4', 'pDxHQow2SC', 'xt6HKxF8ct', 'KslHxccahj', 'xWLHrU9qKP'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, WijHBY76FksNVCJbFS.csHigh entropy of concatenated method names: 'KQm9RZ3Itq', 'UE39aMo71f', 'wEK9qiOPHK', 'qjn9VF9UdB', 't3S9Tb778P', 'PPs9spTRpy', 'rgU9NIBoqM', 'NtcDXCsOD4', 'ASQDIarYUt', 'oWgD0QohTB'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, OSMXm4LCDCH5uNpgAK.csHigh entropy of concatenated method names: 'GZQiIYxlet', 'kK2i7gttqb', 'qjeDUfsGP8', 'CUTDRQC87O', 'zWsirWxAu3', 'XgIitYc4sJ', 'GVmi5ksK4c', 'HZtic2a0Aq', 'U45iWZEYGZ', 'DBhigTb19K'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, VMqVUwRUqiLWpc2C7HC.csHigh entropy of concatenated method names: 'iCt9o3vcy4', 'S3T9nmbut7', 'TS79dyLisI', 'fkq9e5Dk0y', 'sGU9CLVHJj', 'g849kpIX9Z', 'XEq9uk7hIe', 'hqy9BWm1sk', 'c4F9AN61eH', 'Dd89M0ixov'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, CqkMRL0rHBvscNt0Bs.csHigh entropy of concatenated method names: 's8DDlTe4gm', 'LEjDSjcaws', 'cs4D6cMse8', 'nFjDGwLAjG', 'aA2DcXJbmd', 'FmID3TLnwh', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, ctJOcrgHb9AQNFER2X.csHigh entropy of concatenated method names: 'ToString', 'Ra1YrCBBGx', 'rETYSaCKOi', 'SYOY6ftM06', 'We5YGQdArs', 'PsUY3niJN3', 'D6GYp6fcJo', 'aXuYQlegOe', 'eL1YKM87uW', 'kphYZUG9RE'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, o8MZRbI2Z6M9ro0rQh.csHigh entropy of concatenated method names: 'A8dDVd9Paw', 'SMEDTawZ8N', 'qoID1m5s9b', 'V4eDsjrVbS', 'krxDN5uWDF', 'oMnDf3wsMD', 'FLPDh5WFjr', 'agkD8OyQ8N', 'QQLD4ZEgF0', 'v4wD2LJCxK'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, tWE3IaTtqycePIX720.csHigh entropy of concatenated method names: 'Dispose', 'csfR0u7X9B', 'iufFSwTaim', 'dJY11NRcDX', 'aH8R7MZRb2', 'N6MRz9ro0r', 'ProcessDialogKey', 'LhuFUqkMRL', 'OHBFRvscNt', 'XBsFFXijHB'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, cOtxBpMw60xbWJZct7.csHigh entropy of concatenated method names: 'TF6sCFGVVJ', 'uU6sud7i1e', 'Tyk1627IR4', 'KqW1GDugb5', 'PwN13e9qY3', 'SYY1pdxopB', 'kXQ1QBci8d', 'jot1KFkqAg', 'j6N1ZMJBOr', 'nD81x7ngku'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, Oh9Pc4RaXsbNgyPoYK1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'esJbcUV7RP', 't6abWitGkP', 'Q9ybgS88Xb', 'Ki3byZEipZ', 'lhAbJLCVKA', 'hGlbLffBfx', 'qKxbXf8tvf'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, BUNw5Eqh0adBAatJBl.csHigh entropy of concatenated method names: 'FTYRfMUVgc', 'Q4uRhd0wnP', 'rDRR4U4PNH', 'vCeR2bFOtx', 'UZcRmt7Ius', 'FV9RYDyL8w', 'yk0LU8NFrAf4buM3sb', 'rpSdYLtuvW8puLohAV', 'No4Qw2fRQV6l5YrnRh', 'WqrRRDoL25'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, XusMV9lDyL8wYlKbr6.csHigh entropy of concatenated method names: 'mhuNvDEVgU', 'vunNTNQO79', 'wUnNs0DPs9', 'IDfNfHP8Zp', 'lJONhq4LfA', 'h6rsJQ2tox', 'WynsLZmi6g', 'jtOsXOZw0d', 'ksOsIG9y56', 'ASbs0nXRpf'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, Gws7I2RFLiQayy79FjA.csHigh entropy of concatenated method names: 'TtIboECf0C', 'nZubnFea1X', 'khebd4NoSH', 'Lo6QNO2koj4b4tZMHLp', 'kSfRv32lu7BfYfjFVBH', 'uyFrgm2vko7qXrhAsCy', 'vy6qIW2TyjPIvbNcxWL', 'TqkuHQ2gcaf5kPl4ewT'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, S5LlvsQybFV7Fyoeik.csHigh entropy of concatenated method names: 'ughfVy9v4n', 'Bimf1qg0k2', 'xrMfNBaFt8', 'NXyN7XnLDn', 'mBXNzEi2QU', 'qmZfU4EglP', 'z1LfRQDtj8', 'JOIfFpU99R', 'baofauFeLI', 'BfDfqjghX8'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, TBZTGwhLhgIb3k9TE4.csHigh entropy of concatenated method names: 'pDXava277g', 'PpWaVYOpcR', 'SiraT570oG', 'YnQa19DrnV', 'nGaasU9kJu', 'mPLaNsXZmN', 'i2IafCbyBb', 'MvVahnMRXU', 'hdOa8I3y6H', 'lHpa42kLIN'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, ln0s29ADRU4PNHwCeb.csHigh entropy of concatenated method names: 'aFo1evfj6C', 'vdm1kJM0g6', 'bYZ1BS8sAL', 'bLv1ATsWO7', 'rLQ1mKncpH', 'zN31YHBRqB', 'H3p1iBFAoZ', 'SQZ1DtaYcE', 'PSg19TV1nf', 'lRv1bUI7ro'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, QtnM5UcPW6K0OZPbqO.csHigh entropy of concatenated method names: 'JrbmxyJFXL', 'B52mto8wWB', 'GiTmcUr1tR', 'MT5mWppv21', 'LEqmStyoBq', 'ERFm6aAl4C', 'DydmGMpqBR', 'U89m34IwA7', 'EAqmpPjSg2', 'K98mQElTQm'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, pMUVgcB54ud0wnPso9.csHigh entropy of concatenated method names: 'nRATcuFlyY', 'IasTWSKQDv', 'c7RTg3GNON', 'yZqTyvJXNn', 'tlfTJPZhkD', 'GYoTL1aKIs', 'YXUTXkv8FJ', 'imZTIm2TZD', 'zLsT01GgBw', 'D67T7dJ9u4'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, Re3ju5ZsBlVJLI2Tif.csHigh entropy of concatenated method names: 'aqVfoESw9v', 'Y5Dfnbcv3f', 'r4CfdgXl0i', 'fLPfehOsmg', 'rINfCLLCqM', 'yhifkYLYKl', 'kebfuEMxi7', 'd2KfB5y9nR', 'acKfAr3L4L', 's8qfMBqJ2T'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, Mp9GtQzsf3NDOE95Lt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IHq9HYLL5O', 's2S9md0uqb', 'iIS9YaR8sc', 'aSX9iSpV3m', 'MQ89DpeBK6', 'aAR995Bmqt', 'MRl9bcynwH'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, mmNUHqFe6h0f5SL1Xr.csHigh entropy of concatenated method names: 'RxLdiAhZE', 'IUTew7gGw', 'NrNkh09ka', 'URqunGMd2', 'EHIAt2jwp', 'P8jM0V95S', 'x6x07C04Ga63NptjZ8', 'jqR7DYsplgscDw43qi', 'kuwDEClbo', 'c2JbgogCg'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, OLWcQg5KAKJihMS3IR.csHigh entropy of concatenated method names: 'RFTHBFQVYM', 'YdYHAipbK9', 'j9EHluCYfn', 'VnrHSfx9Uv', 'qdDHGcRV4u', 'UG1H30uwU4', 'pDxHQow2SC', 'xt6HKxF8ct', 'KslHxccahj', 'xWLHrU9qKP'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, WijHBY76FksNVCJbFS.csHigh entropy of concatenated method names: 'KQm9RZ3Itq', 'UE39aMo71f', 'wEK9qiOPHK', 'qjn9VF9UdB', 't3S9Tb778P', 'PPs9spTRpy', 'rgU9NIBoqM', 'NtcDXCsOD4', 'ASQDIarYUt', 'oWgD0QohTB'
              Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.6c70000.7.raw.unpack, OSMXm4LCDCH5uNpgAK.csHigh entropy of concatenated method names: 'GZQiIYxlet', 'kK2i7gttqb', 'qjeDUfsGP8', 'CUTDRQC87O', 'zWsirWxAu3', 'XgIitYc4sJ', 'GVmi5ksK4c', 'HZtic2a0Aq', 'U45iWZEYGZ', 'DBhigTb19K'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00406EB0 ShellExecuteW,URLDownloadToFileW,4_2_00406EB0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AA4A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040F7A7 Sleep,ExitProcess,4_2_0040F7A7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: EA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: 2890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: 8B30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: 6E90000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: 9B30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: AB30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,4_2_0041A748
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeWindow / User API: threadDelayed 2892Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeWindow / User API: threadDelayed 7101Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe TID: 3876Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe TID: 5836Thread sleep count: 2892 > 30Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe TID: 5836Thread sleep time: -8676000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe TID: 5836Thread sleep count: 7101 > 30Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe TID: 5836Thread sleep time: -21303000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409253
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0041C291
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0040C34D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409665
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0044E879 FindFirstFileExA,4_2_0044E879
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_0040880C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040783C FindFirstFileW,FindNextFileW,4_2_0040783C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419AF5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040BB30
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040BD37
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407C97
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011EF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeAPI call chain: ExitProcess graph end nodegraph_4-48860
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004349F9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004432B5 mov eax, dword ptr fs:[00000030h]4_2_004432B5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00412077 GetProcessHeap,HeapFree,4_2_00412077
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004349F9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00434B47 SetUnhandledExceptionFilter,4_2_00434B47
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043BB22
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00434FDC
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe4_2_004120F7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00419627 mouse_event,4_2_00419627
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"Jump to behavior
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerH
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerE
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerf
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerm
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00434C52 cpuid 4_2_00434C52
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetLocaleInfoA,4_2_0040F8D1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: EnumSystemLocalesW,4_2_00452036
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_004520C3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetLocaleInfoW,4_2_00452313
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: EnumSystemLocalesW,4_2_00448404
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_0045243C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetLocaleInfoW,4_2_00452543
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00452610
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: GetLocaleInfoW,4_2_004488ED
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_00451CD8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: EnumSystemLocalesW,4_2_00451F50
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: EnumSystemLocalesW,4_2_00451F9B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00404F51 GetLocalTime,CreateEventA,CreateThread,4_2_00404F51
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_0041B60D GetComputerNameExW,GetUserNameW,4_2_0041B60D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: 4_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,4_2_00449190
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.4506855614.0000000001177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data4_2_0040BA12
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\4_2_0040BB30
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: \key3.db4_2_0040BB30

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TS121VJump to behavior
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3d7d568.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3cc2f48.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe.3b41ae8.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.4506855614.0000000001177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 892, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe PID: 3440, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeCode function: cmd.exe4_2_0040569A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              12
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Bypass User Account Control
              1
              Deobfuscate/Decode Files or Information
              111
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol111
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts2
              Service Execution
              Logon Script (Windows)1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Windows Service
              12
              Software Packing
              NTDS2
              File and Directory Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets33
              System Information Discovery
              SSHKeylogging12
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Bypass User Account Control
              Cached Domain Credentials21
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSync31
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc Filesystem3
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
              Process Injection
              Network Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe45%ReversingLabsWin32.Backdoor.Remcos
              SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://geoplugin.net/A0%Avira URL Cloudsafe
              http://geoplugin.net/SGZ0%Avira URL Cloudsafe
              http://geoplugin.net/json.gplW0%Avira URL Cloudsafe
              http://geoplugin.net/json.gp0%Avira URL Cloudsafe
              http://geoplugin.net/json.gp/C0%Avira URL Cloudsafe
              http://geoplugin.net/0%Avira URL Cloudsafe
              http://geoplugin.net/json.gp40%Avira URL Cloudsafe
              http://geoplugin.net/json.gpSystem320%Avira URL Cloudsafe
              192.3.64.1520%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpfalse
                • Avira URL Cloud: safe
                unknown
                192.3.64.152true
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gp4SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/ASecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gplWSecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011D7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.00000000011B0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gp/CSecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/SGZSecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gpSystem32SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                178.237.33.50
                geoplugin.netNetherlands
                8455ATOM86-ASATOM86NLfalse
                192.3.64.152
                unknownUnited States
                36352AS-COLOCROSSINGUStrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1504345
                Start date and time:2024-09-04 19:57:06 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 25s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                Detection:MAL
                Classification:mal100.rans.troj.spyw.expl.evad.winEXE@5/2@1/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 72
                • Number of non-executed functions: 202
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                TimeTypeDescription
                13:57:56API Interceptor4936946x Sleep call for process: SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                178.237.33.5017254631443eae77db10019b6b965fab82d73f71d12f87665a437c5f6e94698ca7d178f318712.dat-decoded.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                FRENCH GROUP.jsGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                OqPk1nSANG.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                • geoplugin.net/json.gp
                AWB#81311002907.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                DT RDU KDFT0089.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                sfkVuqTYjG.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                Rgh99876k7e.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.18888.15372.rtfGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                Quote.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                NtOl.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                192.3.64.152Quote.exeGet hashmaliciousRemcosBrowse
                  SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeGet hashmaliciousRemcosBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    geoplugin.net17254631443eae77db10019b6b965fab82d73f71d12f87665a437c5f6e94698ca7d178f318712.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    FRENCH GROUP.jsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    OqPk1nSANG.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 178.237.33.50
                    AWB#81311002907.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    DT RDU KDFT0089.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    sfkVuqTYjG.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Rgh99876k7e.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.18888.15372.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Quote.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    NtOl.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AS-COLOCROSSINGUS17254631443eae77db10019b6b965fab82d73f71d12f87665a437c5f6e94698ca7d178f318712.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.3.101.17
                    FRENCH GROUP.jsGet hashmaliciousRemcosBrowse
                    • 192.3.101.17
                    eRH4iNjnCk.exeGet hashmaliciousRemcosBrowse
                    • 107.175.229.139
                    SecuriteInfo.com.Other.Malware-gen.18317.3179.xlsxGet hashmaliciousUnknownBrowse
                    • 198.23.188.147
                    SecuriteInfo.com.Other.Malware-gen.18317.3179.xlsxGet hashmaliciousUnknownBrowse
                    • 198.23.188.147
                    SecuriteInfo.com.Other.Malware-gen.18317.3179.xlsxGet hashmaliciousUnknownBrowse
                    • 198.23.188.147
                    SecuriteInfo.com.Trojan.GenericKD.73998107.10440.22732.xlsxGet hashmaliciousUnknownBrowse
                    • 192.3.243.166
                    sfkVuqTYjG.exeGet hashmaliciousRemcosBrowse
                    • 107.173.4.18
                    Rgh99876k7e.exeGet hashmaliciousRemcosBrowse
                    • 192.210.150.26
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.18888.15372.rtfGet hashmaliciousRemcosBrowse
                    • 192.3.140.102
                    ATOM86-ASATOM86NL17254631443eae77db10019b6b965fab82d73f71d12f87665a437c5f6e94698ca7d178f318712.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    FRENCH GROUP.jsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    OqPk1nSANG.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 178.237.33.50
                    AWB#81311002907.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    DT RDU KDFT0089.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    sfkVuqTYjG.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Rgh99876k7e.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.18888.15372.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Quote.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    NtOl.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    No context
                    No context
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.34331486778365
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):962
                    Entropy (8bit):5.013130376969173
                    Encrypted:false
                    SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                    MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                    SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                    SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                    SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.836387542656967
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    File size:992'256 bytes
                    MD5:a11ca5e0c52c6f6797183f3eaf592bd4
                    SHA1:2a4b7155609a0d6530c46bcc19f8a2724cc2bcbd
                    SHA256:7509f9497471ef5ef9fb8cb4decb92af7f592b2e760156d1b4b4c1d7812ca040
                    SHA512:4b024d7425428ea170c55fe6bce154d37a50186aedbfa7f8db6fb196f775a0bf9b8c4a1ad3b6e8a71fce81533a54ec89fe682d432ff03263d45a55d7dd267576
                    SSDEEP:24576:X7txfsLeyE40WnabOI6tYvh5nJsWiNSzAlw:xxkoLdOFtYvhop9l
                    TLSH:2725126813C8D403C96466B40EB1E1B813BC5EDDB402D3A78FEABF9FB9A6F550C18156
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0.............^3... ...@....@.. ....................................@................................
                    Icon Hash:5614041456560606
                    Entrypoint:0x4f335e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66D7C1D3 [Wed Sep 4 02:11:31 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xf33090x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000xb9c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xf60000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xf0ffc0x54.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xf13640xf140057b1e27e852a453c1f4d90eeefb3ca67False0.9310273639896373data7.8435121254530715IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xf40000xb9c0xc008f29d8d6a3c96552abbc7a40ce7eb840False0.4560546875data4.992614171273466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xf60000xc0x200f0117f7f27dbd59087834c5ed8c797ccFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xf40c80x7a0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.5
                    RT_GROUP_ICON0xf48780x14data1.05
                    RT_VERSION0xf489c0x2fcdata0.4424083769633508
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-09-04T19:57:58.555377+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549706192.3.64.1522559TCP
                    2024-09-04T19:58:00.443924+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549708178.237.33.5080TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 4, 2024 19:57:57.928267002 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:57.933300018 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:57.933372974 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:57.938683987 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:57.943536043 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:58.510741949 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:58.555377007 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:58.642301083 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:58.647370100 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:58.652343035 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:58.653803110 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:58.658746958 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:59.192730904 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:59.196399927 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:59.201245070 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:59.308590889 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:57:59.352267981 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:57:59.831537962 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:57:59.836853981 CEST8049708178.237.33.50192.168.2.5
                    Sep 4, 2024 19:57:59.836956978 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:57:59.837096930 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:57:59.841840029 CEST8049708178.237.33.50192.168.2.5
                    Sep 4, 2024 19:58:00.443828106 CEST8049708178.237.33.50192.168.2.5
                    Sep 4, 2024 19:58:00.443923950 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:58:00.453562975 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:58:00.459310055 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:58:01.450119972 CEST8049708178.237.33.50192.168.2.5
                    Sep 4, 2024 19:58:01.450175047 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:58:27.935206890 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:58:27.944345951 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:58:27.947518110 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:58:27.948615074 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:58:27.949203968 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:58:57.813307047 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:58:57.818794966 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:58:57.823708057 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:28.258544922 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:28.258594990 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:28.258703947 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:59:28.259942055 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:59:28.264831066 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:49.399405956 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:59:49.711694002 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:59:50.321077108 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:59:51.524198055 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:59:53.930489063 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 19:59:58.334779978 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:58.336333990 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:59:58.336507082 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:58.336577892 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 19:59:58.341407061 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 19:59:58.742960930 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 20:00:08.461744070 CEST4970880192.168.2.5178.237.33.50
                    Sep 4, 2024 20:00:28.104916096 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:00:28.108972073 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 20:00:28.113786936 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:00:58.206937075 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:00:58.209484100 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 20:00:58.214277983 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:01:28.261372089 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:01:28.262906075 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 20:01:28.267736912 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:01:58.385785103 CEST255949706192.3.64.152192.168.2.5
                    Sep 4, 2024 20:01:58.387079000 CEST497062559192.168.2.5192.3.64.152
                    Sep 4, 2024 20:01:58.391815901 CEST255949706192.3.64.152192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 4, 2024 19:57:59.418171883 CEST5437053192.168.2.51.1.1.1
                    Sep 4, 2024 19:57:59.824373960 CEST53543701.1.1.1192.168.2.5
                    Sep 4, 2024 19:58:19.265472889 CEST53577961.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Sep 4, 2024 19:57:59.418171883 CEST192.168.2.51.1.1.10x745Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Sep 4, 2024 19:57:59.824373960 CEST1.1.1.1192.168.2.50x745No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                    • geoplugin.net
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.549708178.237.33.50803440C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    TimestampBytes transferredDirectionData
                    Sep 4, 2024 19:57:59.837096930 CEST71OUTGET /json.gp HTTP/1.1
                    Host: geoplugin.net
                    Cache-Control: no-cache
                    Sep 4, 2024 19:58:00.443828106 CEST1170INHTTP/1.1 200 OK
                    date: Wed, 04 Sep 2024 17:58:00 GMT
                    server: Apache
                    content-length: 962
                    content-type: application/json; charset=utf-8
                    cache-control: public, max-age=300
                    access-control-allow-origin: *
                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                    Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:13:57:56
                    Start date:04/09/2024
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"
                    Imagebase:0x680000
                    File size:992'256 bytes
                    MD5 hash:A11CA5E0C52C6F6797183F3EAF592BD4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2039223030.0000000003B29000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:13:57:56
                    Start date:04/09/2024
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"
                    Imagebase:0x240000
                    File size:992'256 bytes
                    MD5 hash:A11CA5E0C52C6F6797183F3EAF592BD4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:4
                    Start time:13:57:56
                    Start date:04/09/2024
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe"
                    Imagebase:0xb00000
                    File size:992'256 bytes
                    MD5 hash:A11CA5E0C52C6F6797183F3EAF592BD4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4506855614.0000000001177000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4506855614.000000000118B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:196
                      Total number of Limit Nodes:4
                      execution_graph 24363 6d3c213 FindCloseChangeNotification 24364 6d3c27f 24363->24364 24365 ea4668 24366 ea4672 24365->24366 24368 ea4758 24365->24368 24369 ea477d 24368->24369 24373 ea4868 24369->24373 24377 ea4858 24369->24377 24375 ea488f 24373->24375 24374 ea496c 24375->24374 24381 ea44f0 24375->24381 24378 ea488f 24377->24378 24379 ea496c 24378->24379 24380 ea44f0 CreateActCtxA 24378->24380 24379->24379 24380->24379 24382 ea58f8 CreateActCtxA 24381->24382 24384 ea59bb 24382->24384 24573 ead378 24574 ead3be 24573->24574 24578 ead548 24574->24578 24581 ead558 24574->24581 24575 ead4ab 24584 eab6d0 24578->24584 24582 ead586 24581->24582 24583 eab6d0 DuplicateHandle 24581->24583 24582->24575 24583->24582 24585 ead5c0 DuplicateHandle 24584->24585 24586 ead586 24585->24586 24586->24575 24385 6d3b690 24386 6d3b81b 24385->24386 24388 6d3b6b6 24385->24388 24388->24386 24389 6d3b1c0 24388->24389 24390 6d3b910 PostMessageW 24389->24390 24391 6d3b97c 24390->24391 24391->24388 24392 6d3965b 24393 6d39781 24392->24393 24398 6d39f71 24393->24398 24403 6d39fe6 24393->24403 24409 6d39f80 24393->24409 24394 6d39791 24399 6d39f74 24398->24399 24414 6d3a2d0 24399->24414 24431 6d3a2c0 24399->24431 24400 6d39fa2 24400->24394 24404 6d39fe9 24403->24404 24405 6d39f74 24403->24405 24404->24394 24407 6d3a2d0 12 API calls 24405->24407 24408 6d3a2c0 12 API calls 24405->24408 24406 6d39fa2 24406->24394 24407->24406 24408->24406 24410 6d39f9a 24409->24410 24412 6d3a2d0 12 API calls 24410->24412 24413 6d3a2c0 12 API calls 24410->24413 24411 6d39fa2 24411->24394 24412->24411 24413->24411 24415 6d3a2e5 24414->24415 24416 6d3a2f7 24415->24416 24448 6d3a693 24415->24448 24453 6d3a7cc 24415->24453 24457 6d3a6eb 24415->24457 24465 6d3a947 24415->24465 24473 6d3aac0 24415->24473 24478 6d3acc0 24415->24478 24483 6d3a9a1 24415->24483 24488 6d3aaa1 24415->24488 24493 6d3a3dd 24415->24493 24498 6d3a41e 24415->24498 24503 6d3ac1f 24415->24503 24511 6d3a95b 24415->24511 24515 6d3a6d4 24415->24515 24520 6d3a611 24415->24520 24416->24400 24432 6d3a2e5 24431->24432 24433 6d3a693 2 API calls 24432->24433 24434 6d3a2f7 24432->24434 24435 6d3a611 2 API calls 24432->24435 24436 6d3a6d4 2 API calls 24432->24436 24437 6d3a95b 2 API calls 24432->24437 24438 6d3ac1f 4 API calls 24432->24438 24439 6d3a41e 2 API calls 24432->24439 24440 6d3a3dd 2 API calls 24432->24440 24441 6d3aaa1 2 API calls 24432->24441 24442 6d3a9a1 2 API calls 24432->24442 24443 6d3acc0 2 API calls 24432->24443 24444 6d3aac0 2 API calls 24432->24444 24445 6d3a947 4 API calls 24432->24445 24446 6d3a6eb 4 API calls 24432->24446 24447 6d3a7cc 2 API calls 24432->24447 24433->24434 24434->24400 24435->24434 24436->24434 24437->24434 24438->24434 24439->24434 24440->24434 24441->24434 24442->24434 24443->24434 24444->24434 24445->24434 24446->24434 24447->24434 24449 6d3a611 24448->24449 24525 6d38f30 24449->24525 24529 6d38f38 24449->24529 24450 6d3ae93 24455 6d38f30 WriteProcessMemory 24453->24455 24456 6d38f38 WriteProcessMemory 24453->24456 24454 6d3a71a 24454->24416 24455->24454 24456->24454 24458 6d3a700 24457->24458 24459 6d3ac7e 24458->24459 24533 6d38968 24458->24533 24537 6d38963 24458->24537 24541 6d38048 24459->24541 24545 6d38040 24459->24545 24460 6d3add9 24466 6d3a955 24465->24466 24467 6d3ac7e 24465->24467 24469 6d38963 Wow64SetThreadContext 24466->24469 24470 6d38968 Wow64SetThreadContext 24466->24470 24471 6d38040 ResumeThread 24467->24471 24472 6d38048 ResumeThread 24467->24472 24468 6d3add9 24469->24467 24470->24467 24471->24468 24472->24468 24474 6d3aac6 24473->24474 24549 6d39021 24474->24549 24553 6d39028 24474->24553 24475 6d3aae9 24480 6d3acc6 24478->24480 24479 6d3aeea 24481 6d38f30 WriteProcessMemory 24480->24481 24482 6d38f38 WriteProcessMemory 24480->24482 24481->24479 24482->24479 24484 6d3a9a7 24483->24484 24486 6d38040 ResumeThread 24484->24486 24487 6d38048 ResumeThread 24484->24487 24485 6d3add9 24486->24485 24487->24485 24489 6d3a9b8 24488->24489 24491 6d38040 ResumeThread 24489->24491 24492 6d38048 ResumeThread 24489->24492 24490 6d3add9 24491->24490 24492->24490 24494 6d3a3e9 24493->24494 24557 6d391c0 24494->24557 24561 6d391b4 24494->24561 24499 6d3a3e9 24498->24499 24501 6d391c0 CreateProcessA 24499->24501 24502 6d391b4 CreateProcessA 24499->24502 24500 6d3a528 24500->24416 24501->24500 24502->24500 24504 6d3a6eb 24503->24504 24504->24503 24505 6d3ac7e 24504->24505 24507 6d38963 Wow64SetThreadContext 24504->24507 24508 6d38968 Wow64SetThreadContext 24504->24508 24509 6d38040 ResumeThread 24505->24509 24510 6d38048 ResumeThread 24505->24510 24506 6d3add9 24507->24505 24508->24505 24509->24506 24510->24506 24565 6d38e70 24511->24565 24569 6d38e78 24511->24569 24512 6d3a979 24512->24416 24516 6d3a852 24515->24516 24517 6d3a6e5 24515->24517 24518 6d38963 Wow64SetThreadContext 24516->24518 24519 6d38968 Wow64SetThreadContext 24516->24519 24517->24416 24518->24517 24519->24517 24521 6d3a61a 24520->24521 24523 6d38f30 WriteProcessMemory 24521->24523 24524 6d38f38 WriteProcessMemory 24521->24524 24522 6d3ae93 24523->24522 24524->24522 24526 6d38f38 WriteProcessMemory 24525->24526 24528 6d38fd7 24526->24528 24528->24450 24530 6d38f80 WriteProcessMemory 24529->24530 24532 6d38fd7 24530->24532 24532->24450 24534 6d389ad Wow64SetThreadContext 24533->24534 24536 6d389f5 24534->24536 24536->24459 24538 6d389ad Wow64SetThreadContext 24537->24538 24540 6d389f5 24538->24540 24540->24459 24542 6d38088 ResumeThread 24541->24542 24544 6d380b9 24542->24544 24544->24460 24546 6d38048 ResumeThread 24545->24546 24548 6d380b9 24546->24548 24548->24460 24550 6d39073 ReadProcessMemory 24549->24550 24552 6d390b7 24550->24552 24552->24475 24554 6d39073 ReadProcessMemory 24553->24554 24556 6d390b7 24554->24556 24556->24475 24558 6d39249 24557->24558 24558->24558 24559 6d393ae CreateProcessA 24558->24559 24560 6d3940b 24559->24560 24562 6d391c0 CreateProcessA 24561->24562 24564 6d3940b 24562->24564 24566 6d38eb8 VirtualAllocEx 24565->24566 24568 6d38ef5 24566->24568 24568->24512 24570 6d38eb8 VirtualAllocEx 24569->24570 24572 6d38ef5 24570->24572 24572->24512 24587 eaabf0 24591 eaace8 24587->24591 24599 eaacd8 24587->24599 24588 eaabff 24592 eaacf9 24591->24592 24593 eaad1c 24591->24593 24592->24593 24607 eaaf80 24592->24607 24611 eaaf70 24592->24611 24593->24588 24594 eaad14 24594->24593 24595 eaaf20 GetModuleHandleW 24594->24595 24596 eaaf4d 24595->24596 24596->24588 24600 eaacf9 24599->24600 24601 eaad1c 24599->24601 24600->24601 24605 eaaf80 LoadLibraryExW 24600->24605 24606 eaaf70 LoadLibraryExW 24600->24606 24601->24588 24602 eaad14 24602->24601 24603 eaaf20 GetModuleHandleW 24602->24603 24604 eaaf4d 24603->24604 24604->24588 24605->24602 24606->24602 24609 eaaf94 24607->24609 24608 eaafb9 24608->24594 24609->24608 24615 eaa0a8 24609->24615 24612 eaaf94 24611->24612 24613 eaa0a8 LoadLibraryExW 24612->24613 24614 eaafb9 24612->24614 24613->24614 24614->24594 24616 eab160 LoadLibraryExW 24615->24616 24618 eab1d9 24616->24618 24618->24608
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c07534d7b84a4e585678d0fe90bb016291ca3b5c61688f89204a2a6441765bfe
                      • Instruction ID: bd69528b96dd2c0bd8c3cdf97bb1e147c29e0e0af3a1ebeb8c51511479efc21f
                      • Opcode Fuzzy Hash: c07534d7b84a4e585678d0fe90bb016291ca3b5c61688f89204a2a6441765bfe
                      • Instruction Fuzzy Hash: 31328C31B112148FDB98DB69C450BAEB7F6EF89300F188469E146EB3A5CB35ED01CB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89532eb919349823cf4bac90af4af3075e1c7b9a79b8eacf987ae73a2e830108
                      • Instruction ID: 63866bfa666551f07e14b0810e5319c3626f6a88720eef4bbc6d6016e215ff00
                      • Opcode Fuzzy Hash: 89532eb919349823cf4bac90af4af3075e1c7b9a79b8eacf987ae73a2e830108
                      • Instruction Fuzzy Hash: A42104B1D046589FEB48CF97C9457EEBEFAAFC9300F04C02AA409A6254DB7849468F90
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: df24004075eec7464aac040e53e0967f229c98500b0998bb406ce2b91d34bcaa
                      • Instruction ID: 106b4e02bbb48b599371d042c9111bf36de6e0d494656a294a44debaab5a2d47
                      • Opcode Fuzzy Hash: df24004075eec7464aac040e53e0967f229c98500b0998bb406ce2b91d34bcaa
                      • Instruction Fuzzy Hash: 9121E3B1D046589BEB58CFABC9457EEBBFAAFC9300F04C06A940966254DB744949CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 379 6d391b4-6d39255 382 6d39257-6d39261 379->382 383 6d3928e-6d392ae 379->383 382->383 384 6d39263-6d39265 382->384 388 6d392b0-6d392ba 383->388 389 6d392e7-6d39316 383->389 386 6d39267-6d39271 384->386 387 6d39288-6d3928b 384->387 390 6d39273 386->390 391 6d39275-6d39284 386->391 387->383 388->389 393 6d392bc-6d392be 388->393 399 6d39318-6d39322 389->399 400 6d3934f-6d39409 CreateProcessA 389->400 390->391 391->391 392 6d39286 391->392 392->387 394 6d392e1-6d392e4 393->394 395 6d392c0-6d392ca 393->395 394->389 397 6d392ce-6d392dd 395->397 398 6d392cc 395->398 397->397 402 6d392df 397->402 398->397 399->400 401 6d39324-6d39326 399->401 411 6d39412-6d39498 400->411 412 6d3940b-6d39411 400->412 403 6d39349-6d3934c 401->403 404 6d39328-6d39332 401->404 402->394 403->400 406 6d39336-6d39345 404->406 407 6d39334 404->407 406->406 408 6d39347 406->408 407->406 408->403 422 6d3949a-6d3949e 411->422 423 6d394a8-6d394ac 411->423 412->411 422->423 426 6d394a0 422->426 424 6d394ae-6d394b2 423->424 425 6d394bc-6d394c0 423->425 424->425 427 6d394b4 424->427 428 6d394c2-6d394c6 425->428 429 6d394d0-6d394d4 425->429 426->423 427->425 428->429 430 6d394c8 428->430 431 6d394e6-6d394ed 429->431 432 6d394d6-6d394dc 429->432 430->429 433 6d39504 431->433 434 6d394ef-6d394fe 431->434 432->431 435 6d39505 433->435 434->433 435->435
                      APIs
                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06D393F6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 9539d39cae2691604c8f2a02e9fe556b4c3222f566ea780db7fb3afa875646ec
                      • Instruction ID: d1eac7cf6826fe4d6cde7ec9a814e014fb4831ed5a0bb5d8eb58e1d925a99b71
                      • Opcode Fuzzy Hash: 9539d39cae2691604c8f2a02e9fe556b4c3222f566ea780db7fb3afa875646ec
                      • Instruction Fuzzy Hash: B6A17E70D00629CFDF60DF68C8517EDBBB2BF48310F048569E819AB280EB749985CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 437 6d391c0-6d39255 439 6d39257-6d39261 437->439 440 6d3928e-6d392ae 437->440 439->440 441 6d39263-6d39265 439->441 445 6d392b0-6d392ba 440->445 446 6d392e7-6d39316 440->446 443 6d39267-6d39271 441->443 444 6d39288-6d3928b 441->444 447 6d39273 443->447 448 6d39275-6d39284 443->448 444->440 445->446 450 6d392bc-6d392be 445->450 456 6d39318-6d39322 446->456 457 6d3934f-6d39409 CreateProcessA 446->457 447->448 448->448 449 6d39286 448->449 449->444 451 6d392e1-6d392e4 450->451 452 6d392c0-6d392ca 450->452 451->446 454 6d392ce-6d392dd 452->454 455 6d392cc 452->455 454->454 459 6d392df 454->459 455->454 456->457 458 6d39324-6d39326 456->458 468 6d39412-6d39498 457->468 469 6d3940b-6d39411 457->469 460 6d39349-6d3934c 458->460 461 6d39328-6d39332 458->461 459->451 460->457 463 6d39336-6d39345 461->463 464 6d39334 461->464 463->463 465 6d39347 463->465 464->463 465->460 479 6d3949a-6d3949e 468->479 480 6d394a8-6d394ac 468->480 469->468 479->480 483 6d394a0 479->483 481 6d394ae-6d394b2 480->481 482 6d394bc-6d394c0 480->482 481->482 484 6d394b4 481->484 485 6d394c2-6d394c6 482->485 486 6d394d0-6d394d4 482->486 483->480 484->482 485->486 487 6d394c8 485->487 488 6d394e6-6d394ed 486->488 489 6d394d6-6d394dc 486->489 487->486 490 6d39504 488->490 491 6d394ef-6d394fe 488->491 489->488 492 6d39505 490->492 491->490 492->492
                      APIs
                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06D393F6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 1f572e3b9899d2227e7abb16d3c3f7d24d91b4cb39007372d89102ef7ec49a12
                      • Instruction ID: b8160c27255fd4b2fcf662136e8bb56f1a157070d168199eae62a193e54b18ee
                      • Opcode Fuzzy Hash: 1f572e3b9899d2227e7abb16d3c3f7d24d91b4cb39007372d89102ef7ec49a12
                      • Instruction Fuzzy Hash: 90917071D00629CFDF60DF68C9517EDBBB2BF48310F048569E818AB280EB749985CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 494 eaace8-eaacf7 495 eaacf9-eaad06 call ea9314 494->495 496 eaad23-eaad27 494->496 501 eaad08 495->501 502 eaad1c 495->502 498 eaad3b-eaad7c 496->498 499 eaad29-eaad33 496->499 505 eaad89-eaad97 498->505 506 eaad7e-eaad86 498->506 499->498 549 eaad0e call eaaf80 501->549 550 eaad0e call eaaf70 501->550 502->496 507 eaadbb-eaadbd 505->507 508 eaad99-eaad9e 505->508 506->505 513 eaadc0-eaadc7 507->513 510 eaada9 508->510 511 eaada0-eaada7 call eaa050 508->511 509 eaad14-eaad16 509->502 512 eaae58-eaaf18 509->512 515 eaadab-eaadb9 510->515 511->515 544 eaaf1a-eaaf1d 512->544 545 eaaf20-eaaf4b GetModuleHandleW 512->545 516 eaadc9-eaadd1 513->516 517 eaadd4-eaaddb 513->517 515->513 516->517 519 eaade8-eaadf1 call eaa060 517->519 520 eaaddd-eaade5 517->520 525 eaadfe-eaae03 519->525 526 eaadf3-eaadfb 519->526 520->519 527 eaae21-eaae25 525->527 528 eaae05-eaae0c 525->528 526->525 533 eaae2b-eaae2e 527->533 528->527 530 eaae0e-eaae1e call eaa070 call eaa080 528->530 530->527 535 eaae30-eaae4e 533->535 536 eaae51-eaae57 533->536 535->536 544->545 546 eaaf4d-eaaf53 545->546 547 eaaf54-eaaf68 545->547 546->547 549->509 550->509
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00EAAF3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 31850e820f38c6215982ad184f22c44214827339176852b2a3a307b18585ba67
                      • Instruction ID: 4fa9cc43ea90bc9cf0de88b3e70a9ca7e3086f4f82829ad5bfa9e2a8bf8348c1
                      • Opcode Fuzzy Hash: 31850e820f38c6215982ad184f22c44214827339176852b2a3a307b18585ba67
                      • Instruction Fuzzy Hash: E9712370A00B058FDB64DF29D04175ABBF1FF89308F049A2DD48AABA50DB75E949CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 551 ea5a64-ea5af4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a1709912b79d3215610da81a7c190a92bc9e6e908a17cee38d24dca79c05957
                      • Instruction ID: a864a078121aa3e3c72056eb83aba4039125a0d9dfe764c2f331309ed08bbf72
                      • Opcode Fuzzy Hash: 9a1709912b79d3215610da81a7c190a92bc9e6e908a17cee38d24dca79c05957
                      • Instruction Fuzzy Hash: 0A31BE72904A48CFDB11DFA8C8857EEBBB0EF8A314F24818AC055BF255C779A907CB11

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 554 ea58ed-ea596c 555 ea596f-ea59b9 CreateActCtxA 554->555 557 ea59bb-ea59c1 555->557 558 ea59c2-ea5a1c 555->558 557->558 565 ea5a2b-ea5a2f 558->565 566 ea5a1e-ea5a21 558->566 567 ea5a40 565->567 568 ea5a31-ea5a3d 565->568 566->565 570 ea5a41 567->570 568->567 570->570
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00EA59A9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 2513b691465dba816d571c3be0646c95d60582bc37e2133610791233c019dfbd
                      • Instruction ID: 55cda57fe013e2122009206c93eb47176f1f7a145a2d79d3ee8b745c6fcecdc7
                      • Opcode Fuzzy Hash: 2513b691465dba816d571c3be0646c95d60582bc37e2133610791233c019dfbd
                      • Instruction Fuzzy Hash: D341D171D00719CBEB24DFA9C884BDEBBB1BF89304F20856AD408BB255DB756946CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 571 ea44f0-ea59b9 CreateActCtxA 575 ea59bb-ea59c1 571->575 576 ea59c2-ea5a1c 571->576 575->576 583 ea5a2b-ea5a2f 576->583 584 ea5a1e-ea5a21 576->584 585 ea5a40 583->585 586 ea5a31-ea5a3d 583->586 584->583 588 ea5a41 585->588 586->585 588->588
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00EA59A9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: f69dfbdcdc13afc2bdc258104cc301b42b0052783e1ba3f2aa7288753728e22a
                      • Instruction ID: dd987cebe05f188ace81fea6d46f04cb4a7e3e2a0e330d90c75d682e19ec44b8
                      • Opcode Fuzzy Hash: f69dfbdcdc13afc2bdc258104cc301b42b0052783e1ba3f2aa7288753728e22a
                      • Instruction Fuzzy Hash: A541E271D00719CBEB24DFA9C884BDEBBB5BF49304F20816AD408BB255DB756946CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 589 6d38f30-6d38f86 592 6d38f96-6d38fd5 WriteProcessMemory 589->592 593 6d38f88-6d38f94 589->593 595 6d38fd7-6d38fdd 592->595 596 6d38fde-6d3900e 592->596 593->592 595->596
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06D38FC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 539796c747bb4c6ed0026715b1e2530f6887336625d0d62364fd2ccc75f208d5
                      • Instruction ID: 9649fc2adf74f2aa52b2ff324dc8216a44c1aebc04556c5ff63bbbabdff76fdf
                      • Opcode Fuzzy Hash: 539796c747bb4c6ed0026715b1e2530f6887336625d0d62364fd2ccc75f208d5
                      • Instruction Fuzzy Hash: AE212671D003199FDB10CFAAC881BEEBBF5FF48310F108829E919A7240D7789955CBA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 600 6d38f38-6d38f86 602 6d38f96-6d38fd5 WriteProcessMemory 600->602 603 6d38f88-6d38f94 600->603 605 6d38fd7-6d38fdd 602->605 606 6d38fde-6d3900e 602->606 603->602 605->606
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06D38FC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 6bea137cba20d7823b7671632da7a7eeb35bf0c120f3ab16d3d3b25763d85b46
                      • Instruction ID: 8c0c2687695edfa21f5e36a06c534e83ec02069c1d8320c951087b6798320238
                      • Opcode Fuzzy Hash: 6bea137cba20d7823b7671632da7a7eeb35bf0c120f3ab16d3d3b25763d85b46
                      • Instruction Fuzzy Hash: CA2125719003199FCB10CFAAC881BEEBBF5FF48310F10882AE919A7240D7789945CBA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 610 eab6d0-ead654 DuplicateHandle 612 ead65d-ead67a 610->612 613 ead656-ead65c 610->613 613->612
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00EAD586,?,?,?,?,?), ref: 00EAD647
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 09433d3b62e22a35c7252c20d42a2e39be57f186c81ec6393846d5540a57359e
                      • Instruction ID: 8cc8086517bca309a40154c172d55e74e83150e5e65abc9c9737e23ba302c8f9
                      • Opcode Fuzzy Hash: 09433d3b62e22a35c7252c20d42a2e39be57f186c81ec6393846d5540a57359e
                      • Instruction Fuzzy Hash: 262103B5900208AFDB10CF9AD984AEEBBF4EB48310F10841AE918B7350D378A941CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 616 6d39021-6d390b5 ReadProcessMemory 619 6d390b7-6d390bd 616->619 620 6d390be-6d390ee 616->620 619->620
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06D390A8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 314a7617488382b0ddc9d800cd1b5c8b0a431f4e61d3ab687cd854ebccd74606
                      • Instruction ID: b192ed5525fad44ce9b5e10865b098bc22233da1fc6043ca2da468c52195a04f
                      • Opcode Fuzzy Hash: 314a7617488382b0ddc9d800cd1b5c8b0a431f4e61d3ab687cd854ebccd74606
                      • Instruction Fuzzy Hash: 2B211671D003599FDB10CFAAC884AEEBBF1FF48310F10842EE559A7241D7799945CBA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 624 6d38963-6d389b3 626 6d389c3-6d389f3 Wow64SetThreadContext 624->626 627 6d389b5-6d389c1 624->627 629 6d389f5-6d389fb 626->629 630 6d389fc-6d38a2c 626->630 627->626 629->630
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06D389E6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 1536b857b20d9ccbdf653a99a2b2d19899705ccfaa92fbbb5bf0b7db425139e7
                      • Instruction ID: 657ef122c08638362200593f3b2616a9f87ed917fdd1f63ad33b44f3588bf009
                      • Opcode Fuzzy Hash: 1536b857b20d9ccbdf653a99a2b2d19899705ccfaa92fbbb5bf0b7db425139e7
                      • Instruction Fuzzy Hash: DE212571D002198FDB54CFAAC4857EEBBF1AF88314F14842EE459A7240CB789945CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 634 ead5b8-ead654 DuplicateHandle 635 ead65d-ead67a 634->635 636 ead656-ead65c 634->636 636->635
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00EAD586,?,?,?,?,?), ref: 00EAD647
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: b53383f90d366505b3cc9c8b6e9ec12418a962d010923525b19cc319af46f0f5
                      • Instruction ID: e0cddd8f5b1f6c8a49cf06a9853500ee9461dc09b86c91752ef399eaa9114655
                      • Opcode Fuzzy Hash: b53383f90d366505b3cc9c8b6e9ec12418a962d010923525b19cc319af46f0f5
                      • Instruction Fuzzy Hash: 0F21E0B5900248AFDB10CFAAD984ADEBBF5EB48310F14841AE918A7350D378A955CFA4
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06D390A8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: b600ed05c3678e243545a91d253da8327601dcc782c35ded5430f0fa8958fb45
                      • Instruction ID: bab607c3898b01192bfae4efdde6027c71b2decfbf5325435038113164a3cd6e
                      • Opcode Fuzzy Hash: b600ed05c3678e243545a91d253da8327601dcc782c35ded5430f0fa8958fb45
                      • Instruction Fuzzy Hash: DE212871C003599FDB10DFAAC880AEEFBF5FF48310F508429E919A7240D7799945CBA4
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06D389E6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 1a26b2476c8955243ff6cdfa34c09258a0f84bd7c8f0609d9ae32c3bc95abefd
                      • Instruction ID: 3e93df2a5d223fe18a941dbebe10da07bcd22463c4350e8c9f569da8e8157bc3
                      • Opcode Fuzzy Hash: 1a26b2476c8955243ff6cdfa34c09258a0f84bd7c8f0609d9ae32c3bc95abefd
                      • Instruction Fuzzy Hash: E1213471D003198FDB50DFAAC485BEEBBF4EF88314F54842AD459A7240CB78A945CFA5
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06D38EE6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 214bf5a9e6a14973acf0b016589d346c87ac0108e5f5a73880c0d40ae8f57127
                      • Instruction ID: 2f41fa6da322488b52cbe9dd9222138a057a521e1f40c06719920437209147b8
                      • Opcode Fuzzy Hash: 214bf5a9e6a14973acf0b016589d346c87ac0108e5f5a73880c0d40ae8f57127
                      • Instruction Fuzzy Hash: ED1159729003598FCB20DFAAC8447EFBFF5EF48310F248819E515A7250CB799545CBA0
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EAAFB9,00000800,00000000,00000000), ref: 00EAB1CA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: ebb339a2eec7459d786bd06ddcf86a55f19c484f689d23e8e570973f973b4087
                      • Instruction ID: e033b23101cd05382791130e585f1f505a20bfbe459a37b7a660d55761186161
                      • Opcode Fuzzy Hash: ebb339a2eec7459d786bd06ddcf86a55f19c484f689d23e8e570973f973b4087
                      • Instruction Fuzzy Hash: 4F1103B69012099FDB10CF9AC844ADEFBF4EB89314F10842EE419BB301C379A945CFA5
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EAAFB9,00000800,00000000,00000000), ref: 00EAB1CA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 284414a444486ceaf76210830399ea05ef9a5d9f33d83d0160fa35741f2680e6
                      • Instruction ID: b108c5ac344c46f36a69cbaa0d190dcd2b7a3fcc92704249f4743078370b1b1d
                      • Opcode Fuzzy Hash: 284414a444486ceaf76210830399ea05ef9a5d9f33d83d0160fa35741f2680e6
                      • Instruction Fuzzy Hash: 191103B69002098FDB10CF9AD844ADEFBF5EB89310F10852ED419BB200C379A946CFA5
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06D38EE6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 0befd462b43d2376af5f829e1151d3709df04953981a6b0e828101fdb78507a1
                      • Instruction ID: d54316acaab33895ff5311a7524ed2aee76c369fbcbe9b14b0767060e03afa86
                      • Opcode Fuzzy Hash: 0befd462b43d2376af5f829e1151d3709df04953981a6b0e828101fdb78507a1
                      • Instruction Fuzzy Hash: 2F1126729003599FCB20DFAAC844BEFBFF5EF88310F148819E515A7250CB79A945CBA4
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: af78338968af84d59596989e96194ca400171ae9ab8fe6b508bfbb143ea13d6f
                      • Instruction ID: fc2955591939b5d7cdd937cfd755681fc179ea4b95657183dd15bb7f99a956ab
                      • Opcode Fuzzy Hash: af78338968af84d59596989e96194ca400171ae9ab8fe6b508bfbb143ea13d6f
                      • Instruction Fuzzy Hash: 82114671D002088FCB24DFAAC8457EEFBF5EB88324F208819D419A7340CA79A945CBA4
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06D3C0C9,?,?), ref: 06D3C270
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 2325de68915a4b5a32f0aed9b6deb4acb4cbe4407bdbb52677fd40918932c2fb
                      • Instruction ID: a3f87eb24f2680846a5a585dc44feaaa71e38a13e3936cc4d302ccd63c1d69d5
                      • Opcode Fuzzy Hash: 2325de68915a4b5a32f0aed9b6deb4acb4cbe4407bdbb52677fd40918932c2fb
                      • Instruction Fuzzy Hash: E51143B58003488FCB20CF9AC584BEEBBF4EB48320F10841AD958B7340D338A944CBA4
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06D3C0C9,?,?), ref: 06D3C270
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: b167296f2ab9a211e8b0d31b972abcc95c86fafb5a1828bf3a64ac340c0772c7
                      • Instruction ID: b3276863e2a6005b7220696b94f670842a7ea111a2a47d53cb5937b9b925119b
                      • Opcode Fuzzy Hash: b167296f2ab9a211e8b0d31b972abcc95c86fafb5a1828bf3a64ac340c0772c7
                      • Instruction Fuzzy Hash: 5E1113B58007498FDB60DF9AC584BEEBBF4EB48320F108519D958A7341D738A945CBA5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 80894d41bfbc58748db62ce8b2daa3c23494738554ff93835cf337731a8d534d
                      • Instruction ID: 563358bbed56e194eb2f601cd9d2711c1ed909034441da2f2dac4a27e46da03e
                      • Opcode Fuzzy Hash: 80894d41bfbc58748db62ce8b2daa3c23494738554ff93835cf337731a8d534d
                      • Instruction Fuzzy Hash: BB112571D003488BDB20DFAAC8457EEFBF5EF88324F208819D519A7240CA79A945CBA4
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 06D3B96D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: cd53d5014181546ba27bab139944401d710749a18c0bfd0d1eac1896aca9424d
                      • Instruction ID: 1d7639f6996c3344d9b6db1fa56a24eded10c1b9543e3386220b641058371845
                      • Opcode Fuzzy Hash: cd53d5014181546ba27bab139944401d710749a18c0bfd0d1eac1896aca9424d
                      • Instruction Fuzzy Hash: C811F5B58043489FDB20DF99D885BDEFFF8EB58320F10845AE954A7210C375A944CFA5
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06D3C0C9,?,?), ref: 06D3C270
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: c66bd3b1412bf8aa47a64bd20c97fe7699e9c86bb612bf53a15b5619b4159060
                      • Instruction ID: 2cf3065931c022cfd75bceae8972576d68c86f55291c2d08264f359759a5709e
                      • Opcode Fuzzy Hash: c66bd3b1412bf8aa47a64bd20c97fe7699e9c86bb612bf53a15b5619b4159060
                      • Instruction Fuzzy Hash: 731125B59002598FCB20CF9AC544BEEBBF0EB48320F10851AD458A7340C338AA45CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00EAAF3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 9b034e57e24c9824da0bd80b87289c59d9605e39c7a33b017dde982a6dc22fca
                      • Instruction ID: 220f73f96bd10006a2eca3222ae001e8394c58f9b988fd2d55c1ed53c7540c9e
                      • Opcode Fuzzy Hash: 9b034e57e24c9824da0bd80b87289c59d9605e39c7a33b017dde982a6dc22fca
                      • Instruction Fuzzy Hash: 621102B5D003498FDB24CF9AC444ADEFBF5AB88314F14842AD428B7200D379A945CFA5
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 06D3B96D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: eafcb48ddcab9afc2e3f1a9d1789f3cfb412a01cc8da5c12f02366dfc3cdc383
                      • Instruction ID: 93e06b05097bd9fb8c1c1ac9614ff61f46876d29bb13b449c46cc51cd930a313
                      • Opcode Fuzzy Hash: eafcb48ddcab9afc2e3f1a9d1789f3cfb412a01cc8da5c12f02366dfc3cdc383
                      • Instruction Fuzzy Hash: 8C11F5B58043489FDB10DF9AC444BDEFBF8EB58310F10841AE554A7310D375A944CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037577010.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e4d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 614dd79fafe06ddcaaa3e37e5e0668f3ee368066ec3f25d1ad7cefaece8ef14a
                      • Instruction ID: cc316155f6828f04a01ddb3767ce2c737663afbaf01495b7b3f335918ae66cbb
                      • Opcode Fuzzy Hash: 614dd79fafe06ddcaaa3e37e5e0668f3ee368066ec3f25d1ad7cefaece8ef14a
                      • Instruction Fuzzy Hash: 69210371608240DFCB15DF14E9C0F26BF65FB88328F20C569E8091B256C73AD816CAA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037577010.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e4d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a3c49a99ae62971aefe6327d88950cb331f4144cc4c63073c6c40c04c601bac2
                      • Instruction ID: 1769e0a763e2b32882c7e559bec40a53f760b9ed7375ed1495b93f0d29e32314
                      • Opcode Fuzzy Hash: a3c49a99ae62971aefe6327d88950cb331f4144cc4c63073c6c40c04c601bac2
                      • Instruction Fuzzy Hash: C7210371508204DFDB15DF14E9C0B16BF65FB98324F20C569E8095B25AC33AE856CAA2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037617980.0000000000E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e5d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d88e371ae2d472a7202685d34e0f9abdc1609eb326ec242150e6d1e10108e32
                      • Instruction ID: 765a8e6043abb44dfd28ebd0115304621f89c7ce7e5bfe99efc4f7db2a0eb22d
                      • Opcode Fuzzy Hash: 3d88e371ae2d472a7202685d34e0f9abdc1609eb326ec242150e6d1e10108e32
                      • Instruction Fuzzy Hash: B321F575508304DFDB25DF54D9C0B15BB65FB88319F20C96DDC095B266C336D84ACA61
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037617980.0000000000E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e5d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b0e373a9219914b32d4edc695b34bc9f51add712389340cc04b24084632f077
                      • Instruction ID: a888a08ee8c221e5e00458edbfc42c612ac08de595ec69ac8c56b0b4240fcc6d
                      • Opcode Fuzzy Hash: 7b0e373a9219914b32d4edc695b34bc9f51add712389340cc04b24084632f077
                      • Instruction Fuzzy Hash: F921F271608344DFDB25DF24D9C0B16BB66EB88319F20C96DDC0A5B396C33AD80BCA61
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037617980.0000000000E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e5d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 65457d26c246ee0285f52533ab66b65e31d31b7d267228780ebefac20683aa06
                      • Instruction ID: 577c711b9a372176ef0bc58d84f1592ec3907178a4e931ed7dad6e7ed01c4ba8
                      • Opcode Fuzzy Hash: 65457d26c246ee0285f52533ab66b65e31d31b7d267228780ebefac20683aa06
                      • Instruction Fuzzy Hash: 9821537550D3808FDB12CF24D994715BF71EB46314F28C5EAD8498B6A7C33A980ACB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037577010.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e4d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f623664561e51cdb3b7c6dab0e502b6861b08673b10d2042523d4f24fe653179
                      • Instruction ID: 6ab60a7d2b0375bf51627dd520eaa58981d0497c846a5bd95f10e76a0fec7f50
                      • Opcode Fuzzy Hash: f623664561e51cdb3b7c6dab0e502b6861b08673b10d2042523d4f24fe653179
                      • Instruction Fuzzy Hash: D411E676504280CFCB16CF14E9C4B16BF71FB98328F24C6A9D8495B656C33AD85ACBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037577010.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e4d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f623664561e51cdb3b7c6dab0e502b6861b08673b10d2042523d4f24fe653179
                      • Instruction ID: d7fcafdcff3d2e96820036e84e51b4a30849261c5eae52ce5f1d1d65872fea5a
                      • Opcode Fuzzy Hash: f623664561e51cdb3b7c6dab0e502b6861b08673b10d2042523d4f24fe653179
                      • Instruction Fuzzy Hash: 3D112676404240CFCB12CF10D9C0B16BF71FB98324F24C6A9D8090B656C33AE85ACBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037617980.0000000000E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e5d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 28c15376199bd4c658f6c9537d4671bac30d3464fc4f74d3f4a4b201944c628c
                      • Instruction ID: 25141e90991f617a54ddc1ae2382ee447607f06123c9c8af31bb4fe61822b1f4
                      • Opcode Fuzzy Hash: 28c15376199bd4c658f6c9537d4671bac30d3464fc4f74d3f4a4b201944c628c
                      • Instruction Fuzzy Hash: A911BE79508240DFCB12CF50C9C0B15BB61FB84318F24CAADDC494B266C33AD85ACB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037577010.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e4d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 29b5f7a0967c8da45dbea7b895658bc7d19919b3e0042f7157b0848b7e6be0ea
                      • Instruction ID: f96a2fc12c95038fb46a4b902d74a8ddef8c0b9aec7459d8534e2e13f3997543
                      • Opcode Fuzzy Hash: 29b5f7a0967c8da45dbea7b895658bc7d19919b3e0042f7157b0848b7e6be0ea
                      • Instruction Fuzzy Hash: 0B01DB3150C3449AE7208B25DDC8BA6FFD8EF85378F14C45BED055A286D278DC45CAB5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037577010.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e4d000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 00d480d71e659ef0ba9c7682aafc00717808bcdc19e35a5b165f12462522471c
                      • Instruction ID: 4a957f1b7054eebc8336c2ac230610ba295d9805e5b72a3af9f3e8577b220755
                      • Opcode Fuzzy Hash: 00d480d71e659ef0ba9c7682aafc00717808bcdc19e35a5b165f12462522471c
                      • Instruction Fuzzy Hash: D8F0C2314083449FE7208A15DCC8BA2FFD8EB91378F18C45AED085E286C2789C45CA74
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: V(7X
                      • API String ID: 0-214688200
                      • Opcode ID: 1e9e99aed8963aee35ae08ff0ba2277d2173ea12a67920e836089d76dfe98a5a
                      • Instruction ID: f7ecf8bb9cd7f7e64d0e180580051b8f26c787643c7416bdc3aad9c2b9ad8cef
                      • Opcode Fuzzy Hash: 1e9e99aed8963aee35ae08ff0ba2277d2173ea12a67920e836089d76dfe98a5a
                      • Instruction Fuzzy Hash: ECE10A74E002198FCB54DFA9C5809AEFBF2FF89304F248269E415AB356DB31A941DF64
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d5f1ce2fc42348aa3dc5de3711c882844fa03e6e0474a1d0e85e3d799d74e961
                      • Instruction ID: fdd2f8c8bb17ed39e08277c6eaad1b0fedf33ba3ef41ec8931bcd383ff5cc771
                      • Opcode Fuzzy Hash: d5f1ce2fc42348aa3dc5de3711c882844fa03e6e0474a1d0e85e3d799d74e961
                      • Instruction Fuzzy Hash: 33E11A74E002198FCB54DFA9C5809AEFBF2FF89304F648169E415AB356DB30A941DFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b07b8c84e36bddc2a16b79109a8ff56a486080d56eb17f749ce78b8c1f6c21ff
                      • Instruction ID: a52d3f309314003b6eba87ff31b943019ae2c32b4adbf495299098a391907389
                      • Opcode Fuzzy Hash: b07b8c84e36bddc2a16b79109a8ff56a486080d56eb17f749ce78b8c1f6c21ff
                      • Instruction Fuzzy Hash: 26E10A74E002198FCB54DFA9C5809AEFBF2FF89304F248169E415AB356DB31A941DFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed3cd97fecfe90be49d5664830831d4aeb78e66a9cc6e4d6e726a913bd62e738
                      • Instruction ID: b3202191459638600aeeb573fe1b757cfbe0a63985e2029f994cdf52cc7d8f31
                      • Opcode Fuzzy Hash: ed3cd97fecfe90be49d5664830831d4aeb78e66a9cc6e4d6e726a913bd62e738
                      • Instruction Fuzzy Hash: CBE10C74E002599FCB54DFA9C5809AEFBF2FF89304F248169E415AB35ADB30A941CF64
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b562946bdd23345fd395bfb0a85c511ee9697d8b0bdf4346dd76d8f0858af834
                      • Instruction ID: 63e91d3aa060b19d267df2d795ad43ca0739fceac039a898f372eaf22cf984ec
                      • Opcode Fuzzy Hash: b562946bdd23345fd395bfb0a85c511ee9697d8b0bdf4346dd76d8f0858af834
                      • Instruction Fuzzy Hash: 80E11BB4E006198FDB14DFA8C5809AEFBF2FF89304F648269D415AB356DB30A941CF64
                      Memory Dump Source
                      • Source File: 00000000.00000002.2037722718.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_ea0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a79467c449b1c0476e887cb108c966ce3611f4147e436c5ab3d69bc5858c7b3
                      • Instruction ID: 1e0e8b3b46093c73d899ab6f3bb0d5b6a3f35604a4b5e31cb1eec39629a960c1
                      • Opcode Fuzzy Hash: 1a79467c449b1c0476e887cb108c966ce3611f4147e436c5ab3d69bc5858c7b3
                      • Instruction Fuzzy Hash: 74A15C36E002158FCF05DFA4C88499EBBB2FF8A304B15557AE905BF265DB35E916CB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7423f83c26659d7cf16a5b4b1f8e982ff8d0c90fb0ab923fe62437e87eeddd11
                      • Instruction ID: 6f8b36fdce22f804843b4bdb223b1d7bb11710955d34daec9ebf8ada0e706ecb
                      • Opcode Fuzzy Hash: 7423f83c26659d7cf16a5b4b1f8e982ff8d0c90fb0ab923fe62437e87eeddd11
                      • Instruction Fuzzy Hash: C9513F70E102198FDB55DFA9C5809AEFBF2FF89304F24816AE419A7356D7309A41CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2041471823.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d30000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1aecc8611ba22ead73cecc5f86b9e7da6ecb2960f7f982a1797971874c07e4e2
                      • Instruction ID: 3df540492ce16fbb0c93f93808ee228962b44def58a4a43b4ea6e24290151e1a
                      • Opcode Fuzzy Hash: 1aecc8611ba22ead73cecc5f86b9e7da6ecb2960f7f982a1797971874c07e4e2
                      • Instruction Fuzzy Hash: 51513070E006198FDB15DFA9C5409AEFBF2FF89304F24816AD418AB356D7309A41CFA5

                      Execution Graph

                      Execution Coverage:4.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:5.3%
                      Total number of Nodes:1349
                      Total number of Limit Nodes:58
                      execution_graph 47260 434887 47261 434893 CallCatchBlock 47260->47261 47287 434596 47261->47287 47263 43489a 47265 4348c3 47263->47265 47585 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47263->47585 47273 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47265->47273 47586 444251 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47265->47586 47267 4348dc 47268 4348e2 CallCatchBlock 47267->47268 47587 4441f5 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47267->47587 47270 434962 47298 434b14 47270->47298 47273->47270 47588 4433e7 36 API calls 5 library calls 47273->47588 47280 434984 47281 43498e 47280->47281 47590 44341f 28 API calls _Atexit 47280->47590 47282 434997 47281->47282 47591 4433c2 28 API calls _Atexit 47281->47591 47592 43470d 13 API calls 2 library calls 47282->47592 47286 43499f 47286->47268 47288 43459f 47287->47288 47593 434c52 IsProcessorFeaturePresent 47288->47593 47290 4345ab 47594 438f31 10 API calls 4 library calls 47290->47594 47292 4345b0 47297 4345b4 47292->47297 47595 4440bf 47292->47595 47295 4345cb 47295->47263 47297->47263 47667 436e90 47298->47667 47301 434968 47302 4441a2 47301->47302 47669 44f059 47302->47669 47304 434971 47307 40e9c5 47304->47307 47305 4441ab 47305->47304 47673 446815 36 API calls 47305->47673 47675 41cb50 LoadLibraryA GetProcAddress 47307->47675 47309 40e9e1 GetModuleFileNameW 47680 40f3c3 47309->47680 47311 40e9fd 47695 4020f6 47311->47695 47314 4020f6 28 API calls 47315 40ea1b 47314->47315 47701 41be1b 47315->47701 47319 40ea2d 47727 401e8d 47319->47727 47321 40ea36 47322 40ea93 47321->47322 47323 40ea49 47321->47323 47733 401e65 47322->47733 48001 40fbb3 118 API calls 47323->48001 47326 40eaa3 47330 401e65 22 API calls 47326->47330 47327 40ea5b 47328 401e65 22 API calls 47327->47328 47329 40ea67 47328->47329 48002 410f37 36 API calls __EH_prolog 47329->48002 47331 40eac2 47330->47331 47738 40531e 47331->47738 47334 40ea79 48003 40fb64 78 API calls 47334->48003 47335 40ead1 47743 406383 47335->47743 47338 40ea82 48004 40f3b0 71 API calls 47338->48004 47345 401fd8 11 API calls 47347 40eefb 47345->47347 47346 401fd8 11 API calls 47348 40eafb 47346->47348 47589 4432f6 GetModuleHandleW 47347->47589 47349 401e65 22 API calls 47348->47349 47350 40eb04 47349->47350 47760 401fc0 47350->47760 47352 40eb0f 47353 401e65 22 API calls 47352->47353 47354 40eb28 47353->47354 47355 401e65 22 API calls 47354->47355 47356 40eb43 47355->47356 47357 40ebae 47356->47357 48005 406c1e 47356->48005 47358 401e65 22 API calls 47357->47358 47364 40ebbb 47358->47364 47360 40eb70 47361 401fe2 28 API calls 47360->47361 47362 40eb7c 47361->47362 47365 401fd8 11 API calls 47362->47365 47363 40ec02 47764 40d069 47363->47764 47364->47363 47370 413549 3 API calls 47364->47370 47366 40eb85 47365->47366 48010 413549 RegOpenKeyExA 47366->48010 47368 40ec08 47369 40ea8b 47368->47369 47767 41b2c3 47368->47767 47369->47345 47376 40ebe6 47370->47376 47374 40ec23 47377 40ec76 47374->47377 47784 407716 47374->47784 47375 40f34f 48093 4139a9 30 API calls 47375->48093 47376->47363 48013 4139a9 30 API calls 47376->48013 47380 401e65 22 API calls 47377->47380 47383 40ec7f 47380->47383 47382 40f365 48094 412475 65 API calls ___scrt_fastfail 47382->48094 47391 40ec90 47383->47391 47392 40ec8b 47383->47392 47386 40ec42 48014 407738 30 API calls 47386->48014 47387 40ec4c 47389 401e65 22 API calls 47387->47389 47401 40ec55 47389->47401 47390 40f36f 47394 41bc5e 28 API calls 47390->47394 47397 401e65 22 API calls 47391->47397 48017 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47392->48017 47393 40ec47 48015 407260 98 API calls 47393->48015 47398 40f37f 47394->47398 47399 40ec99 47397->47399 47893 413a23 RegOpenKeyExW 47398->47893 47788 41bc5e 47399->47788 47401->47377 47405 40ec71 47401->47405 47402 40eca4 47792 401f13 47402->47792 48016 407260 98 API calls 47405->48016 47409 401f09 11 API calls 47411 40f39c 47409->47411 47413 401f09 11 API calls 47411->47413 47415 40f3a5 47413->47415 47414 401e65 22 API calls 47417 40ecc1 47414->47417 47896 40dd42 47415->47896 47420 401e65 22 API calls 47417->47420 47422 40ecdb 47420->47422 47421 40f3af 47423 401e65 22 API calls 47422->47423 47424 40ecf5 47423->47424 47425 401e65 22 API calls 47424->47425 47426 40ed0e 47425->47426 47428 401e65 22 API calls 47426->47428 47458 40ed7b 47426->47458 47427 40ed8a 47429 40ed93 47427->47429 47457 40ee0f ___scrt_fastfail 47427->47457 47433 40ed23 _wcslen 47428->47433 47430 401e65 22 API calls 47429->47430 47431 40ed9c 47430->47431 47434 401e65 22 API calls 47431->47434 47432 40ef06 ___scrt_fastfail 48078 4136f8 RegOpenKeyExA 47432->48078 47435 401e65 22 API calls 47433->47435 47433->47458 47436 40edae 47434->47436 47437 40ed3e 47435->47437 47439 401e65 22 API calls 47436->47439 47440 401e65 22 API calls 47437->47440 47441 40edc0 47439->47441 47442 40ed53 47440->47442 47444 401e65 22 API calls 47441->47444 48018 40da34 47442->48018 47443 40ef51 47445 401e65 22 API calls 47443->47445 47446 40ede9 47444->47446 47447 40ef76 47445->47447 47451 401e65 22 API calls 47446->47451 47814 402093 47447->47814 47450 401f13 28 API calls 47453 40ed72 47450->47453 47455 40edfa 47451->47455 47454 401f09 11 API calls 47453->47454 47454->47458 48076 40cdf9 45 API calls _wcslen 47455->48076 47456 40ef88 47820 41376f RegCreateKeyA 47456->47820 47804 413947 47457->47804 47458->47427 47458->47432 47462 40eea3 ctype 47467 401e65 22 API calls 47462->47467 47463 40ee0a 47463->47457 47465 401e65 22 API calls 47466 40efaa 47465->47466 47826 43baac 47466->47826 47468 40eeba 47467->47468 47468->47443 47472 40eece 47468->47472 47471 40efc1 48081 41cd9b 87 API calls ___scrt_fastfail 47471->48081 47474 401e65 22 API calls 47472->47474 47473 40efe4 47478 402093 28 API calls 47473->47478 47476 40eed7 47474->47476 47479 41bc5e 28 API calls 47476->47479 47477 40efc8 CreateThread 47477->47473 48863 41d45d 10 API calls 47477->48863 47480 40eff9 47478->47480 47481 40eee3 47479->47481 47483 402093 28 API calls 47480->47483 48077 40f474 104 API calls 47481->48077 47484 40f008 47483->47484 47830 41b4ef 47484->47830 47485 40eee8 47485->47443 47487 40eeef 47485->47487 47487->47369 47489 401e65 22 API calls 47490 40f019 47489->47490 47491 401e65 22 API calls 47490->47491 47492 40f02b 47491->47492 47493 401e65 22 API calls 47492->47493 47494 40f04b 47493->47494 47495 43baac _strftime 40 API calls 47494->47495 47496 40f058 47495->47496 47497 401e65 22 API calls 47496->47497 47498 40f063 47497->47498 47499 401e65 22 API calls 47498->47499 47500 40f074 47499->47500 47501 401e65 22 API calls 47500->47501 47502 40f089 47501->47502 47503 401e65 22 API calls 47502->47503 47504 40f09a 47503->47504 47505 40f0a1 StrToIntA 47504->47505 47854 409de4 47505->47854 47508 401e65 22 API calls 47509 40f0bc 47508->47509 47510 40f101 47509->47510 47511 40f0c8 47509->47511 47513 401e65 22 API calls 47510->47513 48082 4344ea 47511->48082 47515 40f111 47513->47515 47518 40f159 47515->47518 47519 40f11d 47515->47519 47516 401e65 22 API calls 47517 40f0e4 47516->47517 47520 40f0eb CreateThread 47517->47520 47522 401e65 22 API calls 47518->47522 47521 4344ea new 22 API calls 47519->47521 47520->47510 48861 419fb4 103 API calls 2 library calls 47520->48861 47523 40f126 47521->47523 47524 40f162 47522->47524 47525 401e65 22 API calls 47523->47525 47527 40f1cc 47524->47527 47528 40f16e 47524->47528 47526 40f138 47525->47526 47531 40f13f CreateThread 47526->47531 47529 401e65 22 API calls 47527->47529 47530 401e65 22 API calls 47528->47530 47532 40f1d5 47529->47532 47533 40f17e 47530->47533 47531->47518 48866 419fb4 103 API calls 2 library calls 47531->48866 47534 40f1e1 47532->47534 47535 40f21a 47532->47535 47536 401e65 22 API calls 47533->47536 47538 401e65 22 API calls 47534->47538 47879 41b60d GetComputerNameExW GetUserNameW 47535->47879 47539 40f193 47536->47539 47541 40f1ea 47538->47541 48089 40d9e8 31 API calls 47539->48089 47546 401e65 22 API calls 47541->47546 47542 401f13 28 API calls 47543 40f22e 47542->47543 47545 401f09 11 API calls 47543->47545 47548 40f237 47545->47548 47549 40f1ff 47546->47549 47547 40f1a6 47550 401f13 28 API calls 47547->47550 47551 40f240 SetProcessDEPPolicy 47548->47551 47552 40f243 CreateThread 47548->47552 47559 43baac _strftime 40 API calls 47549->47559 47553 40f1b2 47550->47553 47551->47552 47554 40f264 47552->47554 47555 40f258 CreateThread 47552->47555 48834 40f7a7 47552->48834 47556 401f09 11 API calls 47553->47556 47557 40f279 47554->47557 47558 40f26d CreateThread 47554->47558 47555->47554 48862 4120f7 138 API calls 47555->48862 47560 40f1bb CreateThread 47556->47560 47562 40f2cc 47557->47562 47564 402093 28 API calls 47557->47564 47558->47557 48864 4126db 38 API calls ___scrt_fastfail 47558->48864 47561 40f20c 47559->47561 47560->47527 48865 401be9 50 API calls _strftime 47560->48865 48090 40c162 7 API calls 47561->48090 47890 4134ff RegOpenKeyExA 47562->47890 47565 40f29c 47564->47565 48091 4052fd 28 API calls 47565->48091 47571 40f2ed 47572 41bc5e 28 API calls 47571->47572 47574 40f2fd 47572->47574 48092 41361b 31 API calls 47574->48092 47579 40f313 47580 401f09 11 API calls 47579->47580 47583 40f31e 47580->47583 47581 40f346 DeleteFileW 47582 40f34d 47581->47582 47581->47583 47582->47390 47583->47390 47583->47581 47584 40f334 Sleep 47583->47584 47584->47583 47585->47263 47586->47267 47587->47273 47588->47270 47589->47280 47590->47281 47591->47282 47592->47286 47593->47290 47594->47292 47599 44fb68 47595->47599 47598 438f5a 8 API calls 3 library calls 47598->47297 47601 44fb81 47599->47601 47603 44fb85 47599->47603 47617 434fcb 47601->47617 47602 4345bd 47602->47295 47602->47598 47603->47601 47605 449ca6 47603->47605 47606 449cb2 CallCatchBlock 47605->47606 47624 445888 EnterCriticalSection 47606->47624 47608 449cb9 47625 450183 47608->47625 47610 449cc8 47616 449cd7 47610->47616 47636 449b3a 23 API calls 47610->47636 47613 449cd2 47637 449bf0 GetStdHandle GetFileType 47613->47637 47614 449ce8 CallCatchBlock 47614->47603 47638 449cf3 LeaveCriticalSection std::_Lockit::~_Lockit 47616->47638 47618 434fd6 IsProcessorFeaturePresent 47617->47618 47619 434fd4 47617->47619 47621 435018 47618->47621 47619->47602 47666 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47621->47666 47623 4350fb 47623->47602 47624->47608 47626 45018f CallCatchBlock 47625->47626 47627 4501b3 47626->47627 47628 45019c 47626->47628 47639 445888 EnterCriticalSection 47627->47639 47647 4405dd 20 API calls __dosmaperr 47628->47647 47631 4501eb 47648 450212 LeaveCriticalSection std::_Lockit::~_Lockit 47631->47648 47632 4501bf 47632->47631 47640 4500d4 47632->47640 47634 4501a1 __cftof CallCatchBlock 47634->47610 47636->47613 47637->47616 47638->47614 47639->47632 47649 445af3 47640->47649 47642 4500f3 47657 446782 47642->47657 47643 4500e6 47643->47642 47656 448a84 11 API calls 2 library calls 47643->47656 47646 450145 47646->47632 47647->47634 47648->47634 47650 445b00 ___crtLCMapStringA 47649->47650 47651 445b40 47650->47651 47652 445b2b RtlAllocateHeap 47650->47652 47663 442f80 7 API calls 2 library calls 47650->47663 47664 4405dd 20 API calls __dosmaperr 47651->47664 47652->47650 47654 445b3e 47652->47654 47654->47643 47656->47643 47658 44678d RtlFreeHeap 47657->47658 47659 4467b6 _free 47657->47659 47658->47659 47660 4467a2 47658->47660 47659->47646 47665 4405dd 20 API calls __dosmaperr 47660->47665 47662 4467a8 GetLastError 47662->47659 47663->47650 47664->47654 47665->47662 47666->47623 47668 434b27 GetStartupInfoW 47667->47668 47668->47301 47670 44f06b 47669->47670 47671 44f062 47669->47671 47670->47305 47674 44ef58 49 API calls 4 library calls 47671->47674 47673->47305 47674->47670 47676 41cb8f LoadLibraryA GetProcAddress 47675->47676 47677 41cb7f GetModuleHandleA GetProcAddress 47675->47677 47678 41cbb8 44 API calls 47676->47678 47679 41cba8 LoadLibraryA GetProcAddress 47676->47679 47677->47676 47678->47309 47679->47678 48095 41b4a8 FindResourceA 47680->48095 47684 40f3ed ctype 48105 4020b7 47684->48105 47687 401fe2 28 API calls 47688 40f413 47687->47688 47689 401fd8 11 API calls 47688->47689 47690 40f41c 47689->47690 47691 43bd51 new 21 API calls 47690->47691 47692 40f42d ctype 47691->47692 48111 406dd8 47692->48111 47694 40f460 47694->47311 47696 40210c 47695->47696 47697 4023ce 11 API calls 47696->47697 47698 402126 47697->47698 47699 402569 28 API calls 47698->47699 47700 402134 47699->47700 47700->47314 48148 4020df 47701->48148 47703 41be2e 47707 41bea0 47703->47707 47713 401fe2 28 API calls 47703->47713 47718 401fd8 11 API calls 47703->47718 47722 41be9e 47703->47722 48152 4041a2 47703->48152 48155 41ce34 47703->48155 47704 401fd8 11 API calls 47705 41bed0 47704->47705 47706 401fd8 11 API calls 47705->47706 47708 41bed8 47706->47708 47709 4041a2 28 API calls 47707->47709 47711 401fd8 11 API calls 47708->47711 47712 41beac 47709->47712 47714 40ea24 47711->47714 47715 401fe2 28 API calls 47712->47715 47713->47703 47723 40fb17 47714->47723 47716 41beb5 47715->47716 47717 401fd8 11 API calls 47716->47717 47719 41bebd 47717->47719 47718->47703 47720 41ce34 28 API calls 47719->47720 47720->47722 47722->47704 47724 40fb23 47723->47724 47726 40fb2a 47723->47726 48197 402163 11 API calls 47724->48197 47726->47319 47728 402163 47727->47728 47732 40219f 47728->47732 48198 402730 11 API calls 47728->48198 47730 402184 48199 402712 11 API calls std::_Deallocate 47730->48199 47732->47321 47734 401e6d 47733->47734 47735 401e75 47734->47735 48200 402158 22 API calls 47734->48200 47735->47326 47739 4020df 11 API calls 47738->47739 47740 40532a 47739->47740 48201 4032a0 47740->48201 47742 405346 47742->47335 48206 4051ef 47743->48206 47745 406391 48210 402055 47745->48210 47748 401fe2 47749 401ff1 47748->47749 47756 402039 47748->47756 47750 4023ce 11 API calls 47749->47750 47751 401ffa 47750->47751 47752 40203c 47751->47752 47753 402015 47751->47753 47754 40267a 11 API calls 47752->47754 48244 403098 28 API calls 47753->48244 47754->47756 47757 401fd8 47756->47757 47758 4023ce 11 API calls 47757->47758 47759 401fe1 47758->47759 47759->47346 47761 401fd2 47760->47761 47762 401fc9 47760->47762 47761->47352 48245 4025e0 28 API calls 47762->48245 48246 401fab 47764->48246 47766 40d073 CreateMutexA GetLastError 47766->47368 48247 41bfb7 47767->48247 47772 401fe2 28 API calls 47773 41b2ff 47772->47773 47774 401fd8 11 API calls 47773->47774 47775 41b307 47774->47775 47776 4135a6 31 API calls 47775->47776 47778 41b35d 47775->47778 47777 41b330 47776->47777 47779 41b33b StrToIntA 47777->47779 47778->47374 47780 41b352 47779->47780 47781 41b349 47779->47781 47783 401fd8 11 API calls 47780->47783 48255 41cf69 22 API calls 47781->48255 47783->47778 47785 40772a 47784->47785 47786 413549 3 API calls 47785->47786 47787 407731 47786->47787 47787->47386 47787->47387 47789 41bc72 47788->47789 48256 40b904 47789->48256 47791 41bc7a 47791->47402 47793 401f22 47792->47793 47794 401f6a 47792->47794 47795 402252 11 API calls 47793->47795 47801 401f09 47794->47801 47796 401f2b 47795->47796 47797 401f6d 47796->47797 47799 401f46 47796->47799 48289 402336 47797->48289 48288 40305c 28 API calls 47799->48288 47802 402252 11 API calls 47801->47802 47803 401f12 47802->47803 47803->47414 47805 413965 47804->47805 47806 406dd8 28 API calls 47805->47806 47807 41397a 47806->47807 47808 4020f6 28 API calls 47807->47808 47809 41398a 47808->47809 47810 41376f 14 API calls 47809->47810 47811 413994 47810->47811 47812 401fd8 11 API calls 47811->47812 47813 4139a1 47812->47813 47813->47462 47815 40209b 47814->47815 47816 4023ce 11 API calls 47815->47816 47817 4020a6 47816->47817 48293 4024ed 47817->48293 47821 4137bf 47820->47821 47822 413788 47820->47822 47823 401fd8 11 API calls 47821->47823 47825 41379a RegSetValueExA RegCloseKey 47822->47825 47824 40ef9e 47823->47824 47824->47465 47825->47821 47827 43bac5 _strftime 47826->47827 48297 43ae03 47827->48297 47829 40efb7 47829->47471 47829->47473 47831 41b5a0 47830->47831 47832 41b505 GetLocalTime 47830->47832 47834 401fd8 11 API calls 47831->47834 47833 40531e 28 API calls 47832->47833 47836 41b547 47833->47836 47835 41b5a8 47834->47835 47837 401fd8 11 API calls 47835->47837 47838 406383 28 API calls 47836->47838 47839 40f00d 47837->47839 47840 41b553 47838->47840 47839->47489 48325 402f10 47840->48325 47843 406383 28 API calls 47844 41b56b 47843->47844 48330 407200 77 API calls 47844->48330 47846 41b579 47847 401fd8 11 API calls 47846->47847 47848 41b585 47847->47848 47849 401fd8 11 API calls 47848->47849 47850 41b58e 47849->47850 47851 401fd8 11 API calls 47850->47851 47852 41b597 47851->47852 47853 401fd8 11 API calls 47852->47853 47853->47831 47855 409e02 _wcslen 47854->47855 47856 409e24 47855->47856 47857 409e0d 47855->47857 47859 40da34 31 API calls 47856->47859 47858 40da34 31 API calls 47857->47858 47860 409e15 47858->47860 47861 409e2c 47859->47861 47862 401f13 28 API calls 47860->47862 47863 401f13 28 API calls 47861->47863 47878 409e1f 47862->47878 47864 409e3a 47863->47864 47865 401f09 11 API calls 47864->47865 47867 409e42 47865->47867 47866 401f09 11 API calls 47868 409e79 47866->47868 48349 40915b 28 API calls 47867->48349 48334 40a109 47868->48334 47870 409e54 48350 403014 47870->48350 47875 401f13 28 API calls 47876 409e69 47875->47876 47877 401f09 11 API calls 47876->47877 47877->47878 47878->47866 48402 40417e 47879->48402 47884 403014 28 API calls 47885 41b672 47884->47885 47886 401f09 11 API calls 47885->47886 47887 41b67b 47886->47887 47888 401f09 11 API calls 47887->47888 47889 40f223 47888->47889 47889->47542 47891 413520 RegQueryValueExA RegCloseKey 47890->47891 47892 40f2e4 47890->47892 47891->47892 47892->47415 47892->47571 47894 40f392 47893->47894 47895 413a3f RegDeleteValueW 47893->47895 47894->47409 47895->47894 47897 40dd5b 47896->47897 47898 4134ff 3 API calls 47897->47898 47899 40dd62 47898->47899 47903 40dd81 47899->47903 48496 401707 47899->48496 47901 40dd6f 48499 413877 RegCreateKeyA 47901->48499 47904 414f2a 47903->47904 47905 4020df 11 API calls 47904->47905 47906 414f3e 47905->47906 48513 41b8b3 47906->48513 47909 4020df 11 API calls 47910 414f54 47909->47910 47911 401e65 22 API calls 47910->47911 47912 414f62 47911->47912 47913 43baac _strftime 40 API calls 47912->47913 47914 414f6f 47913->47914 47915 414f81 47914->47915 47916 414f74 Sleep 47914->47916 47917 402093 28 API calls 47915->47917 47916->47915 47918 414f90 47917->47918 47919 401e65 22 API calls 47918->47919 47920 414f99 47919->47920 47921 4020f6 28 API calls 47920->47921 47922 414fa4 47921->47922 47923 41be1b 28 API calls 47922->47923 47924 414fac 47923->47924 48517 40489e WSAStartup 47924->48517 47926 414fb6 47927 401e65 22 API calls 47926->47927 47928 414fbf 47927->47928 47929 401e65 22 API calls 47928->47929 47977 41503e 47928->47977 47930 414fd8 47929->47930 47933 401e65 22 API calls 47930->47933 47931 401e65 22 API calls 47931->47977 47932 4020f6 28 API calls 47932->47977 47934 414fe9 47933->47934 47936 401e65 22 API calls 47934->47936 47935 41be1b 28 API calls 47935->47977 47937 414ffa 47936->47937 47938 401e65 22 API calls 47937->47938 47940 41500b 47938->47940 47939 406c1e 28 API calls 47939->47977 47942 401e65 22 API calls 47940->47942 47941 401fe2 28 API calls 47941->47977 47943 41501c 47942->47943 47944 401e65 22 API calls 47943->47944 47945 41502e 47944->47945 48664 40473d 89 API calls 47945->48664 47948 41518c WSAGetLastError 48665 41cae1 30 API calls 47948->48665 47954 41519c 47955 41b4ef 80 API calls 47954->47955 47958 401e8d 11 API calls 47954->47958 47959 401e65 22 API calls 47954->47959 47960 43baac _strftime 40 API calls 47954->47960 47954->47977 47997 402093 28 API calls 47954->47997 47998 415a71 CreateThread 47954->47998 47999 401fd8 11 API calls 47954->47999 48000 401f09 11 API calls 47954->48000 48666 4052fd 28 API calls 47954->48666 48668 40b051 85 API calls 47954->48668 48669 404e26 99 API calls 47954->48669 47955->47954 47957 40531e 28 API calls 47957->47977 47958->47954 47959->47954 47961 415acf Sleep 47960->47961 47961->47954 47962 406383 28 API calls 47962->47977 47963 402f10 28 API calls 47963->47977 47964 402093 28 API calls 47964->47977 47965 41b4ef 80 API calls 47965->47977 47966 401fd8 11 API calls 47966->47977 47969 40905c 28 API calls 47969->47977 47971 4136f8 3 API calls 47971->47977 47972 4135a6 31 API calls 47972->47977 47973 40417e 28 API calls 47973->47977 47977->47931 47977->47932 47977->47935 47977->47939 47977->47941 47977->47948 47977->47954 47977->47957 47977->47962 47977->47963 47977->47964 47977->47965 47977->47966 47977->47969 47977->47971 47977->47972 47977->47973 47979 401e65 22 API calls 47977->47979 48518 414ee9 47977->48518 48524 40482d 47977->48524 48531 404f51 47977->48531 48546 4048c8 connect 47977->48546 48606 41b7e0 47977->48606 48609 4145bd 47977->48609 48612 441e81 47977->48612 48616 40dd89 47977->48616 48622 41bc42 47977->48622 48625 41bd1e 47977->48625 48629 41bb8e 47977->48629 47980 415439 GetTickCount 47979->47980 47981 41bb8e 28 API calls 47980->47981 47993 415456 47981->47993 47983 41bb8e 28 API calls 47983->47993 47986 41bd1e 28 API calls 47986->47993 47988 402f10 28 API calls 47988->47993 47989 402ea1 28 API calls 47989->47993 47990 406383 28 API calls 47990->47993 47992 401fd8 11 API calls 47992->47993 47993->47983 47993->47986 47993->47988 47993->47989 47993->47990 47993->47992 47994 401f09 11 API calls 47993->47994 48634 41bae6 47993->48634 48636 41ba96 47993->48636 48641 40f8d1 GetLocaleInfoA 47993->48641 48644 402f31 28 API calls 47993->48644 48645 404c10 47993->48645 48667 404aa1 61 API calls ctype 47993->48667 47994->47993 47997->47954 47998->47954 48820 41ad17 105 API calls 47998->48820 47999->47954 48000->47954 48001->47327 48002->47334 48003->47338 48006 4020df 11 API calls 48005->48006 48007 406c2a 48006->48007 48008 4032a0 28 API calls 48007->48008 48009 406c47 48008->48009 48009->47360 48011 413573 RegQueryValueExA RegCloseKey 48010->48011 48012 40eba4 48010->48012 48011->48012 48012->47357 48012->47375 48013->47363 48014->47393 48015->47387 48016->47377 48017->47391 48821 401f86 48018->48821 48021 40da70 48825 41b5b4 29 API calls 48021->48825 48022 40daa5 48025 41bfb7 GetCurrentProcess 48022->48025 48023 40db99 GetLongPathNameW 48027 40417e 28 API calls 48023->48027 48024 40da66 48024->48023 48028 40daaa 48025->48028 48030 40dbae 48027->48030 48031 40db00 48028->48031 48032 40daae 48028->48032 48029 40da79 48033 401f13 28 API calls 48029->48033 48034 40417e 28 API calls 48030->48034 48035 40417e 28 API calls 48031->48035 48036 40417e 28 API calls 48032->48036 48037 40da83 48033->48037 48038 40dbbd 48034->48038 48039 40db0e 48035->48039 48040 40dabc 48036->48040 48041 401f09 11 API calls 48037->48041 48828 40ddd1 28 API calls 48038->48828 48045 40417e 28 API calls 48039->48045 48046 40417e 28 API calls 48040->48046 48041->48024 48043 40dbd0 48829 402fa5 28 API calls 48043->48829 48048 40db24 48045->48048 48049 40dad2 48046->48049 48047 40dbdb 48830 402fa5 28 API calls 48047->48830 48827 402fa5 28 API calls 48048->48827 48826 402fa5 28 API calls 48049->48826 48053 40dbe5 48057 401f09 11 API calls 48053->48057 48054 40db2f 48058 401f13 28 API calls 48054->48058 48055 40dadd 48056 401f13 28 API calls 48055->48056 48060 40dae8 48056->48060 48061 40dbef 48057->48061 48059 40db3a 48058->48059 48062 401f09 11 API calls 48059->48062 48063 401f09 11 API calls 48060->48063 48064 401f09 11 API calls 48061->48064 48066 40db43 48062->48066 48067 40daf1 48063->48067 48065 40dbf8 48064->48065 48068 401f09 11 API calls 48065->48068 48069 401f09 11 API calls 48066->48069 48070 401f09 11 API calls 48067->48070 48071 40dc01 48068->48071 48069->48037 48070->48037 48072 401f09 11 API calls 48071->48072 48073 40dc0a 48072->48073 48074 401f09 11 API calls 48073->48074 48075 40dc13 48074->48075 48075->47450 48076->47463 48077->47485 48079 41371e RegQueryValueExA RegCloseKey 48078->48079 48080 413742 48078->48080 48079->48080 48080->47443 48081->47477 48086 4344ef 48082->48086 48083 43bd51 new 21 API calls 48083->48086 48084 40f0d1 48084->47516 48086->48083 48086->48084 48831 442f80 7 API calls 2 library calls 48086->48831 48832 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48086->48832 48833 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48086->48833 48089->47547 48090->47535 48092->47579 48093->47382 48096 41b4c5 LoadResource LockResource SizeofResource 48095->48096 48097 40f3de 48095->48097 48096->48097 48098 43bd51 48097->48098 48103 446137 ___crtLCMapStringA 48098->48103 48099 446175 48115 4405dd 20 API calls __dosmaperr 48099->48115 48100 446160 RtlAllocateHeap 48102 446173 48100->48102 48100->48103 48102->47684 48103->48099 48103->48100 48114 442f80 7 API calls 2 library calls 48103->48114 48106 4020bf 48105->48106 48116 4023ce 48106->48116 48108 4020ca 48120 40250a 48108->48120 48110 4020d9 48110->47687 48112 4020b7 28 API calls 48111->48112 48113 406dec 48112->48113 48113->47694 48114->48103 48115->48102 48117 402428 48116->48117 48118 4023d8 48116->48118 48117->48108 48118->48117 48127 4027a7 11 API calls std::_Deallocate 48118->48127 48121 40251a 48120->48121 48122 402520 48121->48122 48123 402535 48121->48123 48128 402569 48122->48128 48138 4028e8 28 API calls 48123->48138 48126 402533 48126->48110 48127->48117 48139 402888 48128->48139 48130 40257d 48131 402592 48130->48131 48132 4025a7 48130->48132 48144 402a34 22 API calls 48131->48144 48146 4028e8 28 API calls 48132->48146 48135 40259b 48145 4029da 22 API calls 48135->48145 48137 4025a5 48137->48126 48138->48126 48140 402890 48139->48140 48141 402898 48140->48141 48147 402ca3 22 API calls 48140->48147 48141->48130 48144->48135 48145->48137 48146->48137 48149 4020e7 48148->48149 48150 4023ce 11 API calls 48149->48150 48151 4020f2 48150->48151 48151->47703 48166 40423a 48152->48166 48156 41ce41 48155->48156 48157 41cea0 48156->48157 48160 41ce51 48156->48160 48158 41ceba 48157->48158 48159 41cfe0 28 API calls 48157->48159 48181 41d146 28 API calls 48158->48181 48159->48158 48162 41ce89 48160->48162 48172 41cfe0 48160->48172 48180 41d146 28 API calls 48162->48180 48163 41ce9c 48163->47703 48167 404243 48166->48167 48168 4023ce 11 API calls 48167->48168 48169 40424e 48168->48169 48170 402569 28 API calls 48169->48170 48171 4041b5 48170->48171 48171->47703 48174 41cfe8 48172->48174 48173 41d01a 48173->48162 48174->48173 48175 41d01e 48174->48175 48178 41d002 48174->48178 48192 402725 22 API calls 48175->48192 48182 41d051 48178->48182 48180->48163 48181->48163 48183 41d05b __EH_prolog 48182->48183 48193 402717 22 API calls 48183->48193 48185 41d06e 48194 41d15d 11 API calls 48185->48194 48187 41d094 48188 41d0cc 48187->48188 48195 402730 11 API calls 48187->48195 48188->48173 48190 41d0b3 48196 402712 11 API calls std::_Deallocate 48190->48196 48193->48185 48194->48187 48195->48190 48196->48188 48197->47726 48198->47730 48199->47732 48203 4032aa 48201->48203 48202 4032c9 48202->47742 48203->48202 48205 4028e8 28 API calls 48203->48205 48205->48202 48207 4051fb 48206->48207 48216 405274 48207->48216 48209 405208 48209->47745 48211 402061 48210->48211 48212 4023ce 11 API calls 48211->48212 48213 40207b 48212->48213 48240 40267a 48213->48240 48217 405282 48216->48217 48218 405288 48217->48218 48219 40529e 48217->48219 48227 4025f0 48218->48227 48221 4052f5 48219->48221 48222 4052b6 48219->48222 48237 4028a4 22 API calls 48221->48237 48226 40529c 48222->48226 48236 4028e8 28 API calls 48222->48236 48226->48209 48228 402888 22 API calls 48227->48228 48229 402602 48228->48229 48230 402672 48229->48230 48231 402629 48229->48231 48239 4028a4 22 API calls 48230->48239 48235 40263b 48231->48235 48238 4028e8 28 API calls 48231->48238 48235->48226 48236->48226 48238->48235 48241 40268b 48240->48241 48242 4023ce 11 API calls 48241->48242 48243 40208d 48242->48243 48243->47748 48244->47756 48245->47761 48248 41bfc4 GetCurrentProcess 48247->48248 48249 41b2d1 48247->48249 48248->48249 48250 4135a6 RegOpenKeyExA 48249->48250 48251 4135d4 RegQueryValueExA RegCloseKey 48250->48251 48252 4135fe 48250->48252 48251->48252 48253 402093 28 API calls 48252->48253 48254 413613 48253->48254 48254->47772 48255->47780 48257 40b90c 48256->48257 48262 402252 48257->48262 48259 40b917 48266 40b92c 48259->48266 48261 40b926 48261->47791 48263 40225c 48262->48263 48264 4022ac 48262->48264 48263->48264 48273 402779 11 API calls std::_Deallocate 48263->48273 48264->48259 48267 40b966 48266->48267 48268 40b938 48266->48268 48285 4028a4 22 API calls 48267->48285 48274 4027e6 48268->48274 48272 40b942 48272->48261 48273->48264 48275 4027ef 48274->48275 48276 402851 48275->48276 48277 4027f9 48275->48277 48287 4028a4 22 API calls 48276->48287 48280 402802 48277->48280 48282 402815 48277->48282 48286 402aea 28 API calls __EH_prolog 48280->48286 48283 402813 48282->48283 48284 402252 11 API calls 48282->48284 48283->48272 48284->48283 48286->48283 48288->47794 48290 402347 48289->48290 48291 402252 11 API calls 48290->48291 48292 4023c7 48291->48292 48292->47794 48294 4024f9 48293->48294 48295 40250a 28 API calls 48294->48295 48296 4020b1 48295->48296 48296->47456 48313 43ba0a 48297->48313 48299 43ae50 48319 43a7b7 36 API calls 3 library calls 48299->48319 48301 43ae15 48301->48299 48302 43ae2a 48301->48302 48312 43ae2f __cftof 48301->48312 48318 4405dd 20 API calls __dosmaperr 48302->48318 48305 43ae5c 48306 43ae8b 48305->48306 48320 43ba4f 40 API calls __Toupper 48305->48320 48309 43aef7 48306->48309 48321 43b9b6 20 API calls 2 library calls 48306->48321 48322 43b9b6 20 API calls 2 library calls 48309->48322 48310 43afbe _strftime 48310->48312 48323 4405dd 20 API calls __dosmaperr 48310->48323 48312->47829 48314 43ba22 48313->48314 48315 43ba0f 48313->48315 48314->48301 48324 4405dd 20 API calls __dosmaperr 48315->48324 48317 43ba14 __cftof 48317->48301 48318->48312 48319->48305 48320->48305 48321->48309 48322->48310 48323->48312 48324->48317 48331 401fb0 48325->48331 48327 402f1e 48328 402055 11 API calls 48327->48328 48329 402f2d 48328->48329 48329->47843 48330->47846 48332 4025f0 28 API calls 48331->48332 48333 401fbd 48332->48333 48333->48327 48335 40a127 48334->48335 48336 413549 3 API calls 48335->48336 48337 40a12e 48336->48337 48338 40a142 48337->48338 48339 40a15c 48337->48339 48340 409e9b 48338->48340 48341 40a147 48338->48341 48342 40905c 28 API calls 48339->48342 48340->47508 48355 40905c 48341->48355 48344 40a16a 48342->48344 48362 40a179 86 API calls 48344->48362 48348 40a15a 48348->48340 48349->47870 48379 403222 48350->48379 48352 403022 48383 403262 48352->48383 48356 409072 48355->48356 48357 402252 11 API calls 48356->48357 48358 40908c 48357->48358 48363 404267 48358->48363 48360 40909a 48361 40a22d 29 API calls 48360->48361 48361->48348 48375 40a273 163 API calls 48361->48375 48362->48340 48376 40a267 86 API calls 48362->48376 48377 40a289 48 API calls 48362->48377 48378 40a27d 128 API calls 48362->48378 48364 402888 22 API calls 48363->48364 48365 40427b 48364->48365 48366 404290 48365->48366 48367 4042a5 48365->48367 48373 4042df 22 API calls 48366->48373 48368 4027e6 28 API calls 48367->48368 48372 4042a3 48368->48372 48370 404299 48374 402c48 22 API calls 48370->48374 48372->48360 48373->48370 48374->48372 48380 40322e 48379->48380 48389 403618 48380->48389 48382 40323b 48382->48352 48384 40326e 48383->48384 48385 402252 11 API calls 48384->48385 48386 403288 48385->48386 48387 402336 11 API calls 48386->48387 48388 403031 48387->48388 48388->47875 48390 403626 48389->48390 48391 403644 48390->48391 48392 40362c 48390->48392 48394 40369e 48391->48394 48396 40365c 48391->48396 48400 4036a6 28 API calls 48392->48400 48401 4028a4 22 API calls 48394->48401 48398 4027e6 28 API calls 48396->48398 48399 403642 48396->48399 48398->48399 48399->48382 48400->48399 48403 404186 48402->48403 48404 402252 11 API calls 48403->48404 48405 404191 48404->48405 48413 4041bc 48405->48413 48408 4042fc 48424 404353 48408->48424 48410 40430a 48411 403262 11 API calls 48410->48411 48412 404319 48411->48412 48412->47884 48414 4041c8 48413->48414 48417 4041d9 48414->48417 48416 40419c 48416->48408 48418 4041e9 48417->48418 48419 404206 48418->48419 48420 4041ef 48418->48420 48421 4027e6 28 API calls 48419->48421 48422 404267 28 API calls 48420->48422 48423 404204 48421->48423 48422->48423 48423->48416 48425 40435f 48424->48425 48428 404371 48425->48428 48427 40436d 48427->48410 48429 40437f 48428->48429 48430 404385 48429->48430 48431 40439e 48429->48431 48494 4034e6 28 API calls 48430->48494 48432 402888 22 API calls 48431->48432 48433 4043a6 48432->48433 48435 404419 48433->48435 48436 4043bf 48433->48436 48495 4028a4 22 API calls 48435->48495 48438 4027e6 28 API calls 48436->48438 48447 40439c 48436->48447 48438->48447 48447->48427 48494->48447 48502 43aa9a 48496->48502 48500 4138b9 48499->48500 48501 41388f RegSetValueExA RegCloseKey 48499->48501 48500->47903 48501->48500 48505 43aa1b 48502->48505 48504 40170d 48504->47901 48506 43aa2a 48505->48506 48508 43aa3e 48505->48508 48511 4405dd 20 API calls __dosmaperr 48506->48511 48510 43aa2f __alldvrm __cftof 48508->48510 48512 448957 11 API calls 2 library calls 48508->48512 48510->48504 48511->48510 48512->48510 48516 41b8f9 ctype ___scrt_fastfail 48513->48516 48514 402093 28 API calls 48515 414f49 48514->48515 48515->47909 48516->48514 48517->47926 48519 414f02 WSASetLastError 48518->48519 48520 414ef8 48518->48520 48519->47977 48670 414d86 29 API calls ___std_exception_copy 48520->48670 48522 414efd 48522->48519 48525 404846 socket 48524->48525 48526 404839 48524->48526 48528 404860 CreateEventW 48525->48528 48529 404842 48525->48529 48671 40489e WSAStartup 48526->48671 48528->47977 48529->47977 48530 40483e 48530->48525 48530->48529 48532 404f65 48531->48532 48533 404fea 48531->48533 48534 404f6e 48532->48534 48535 404fc0 CreateEventA CreateThread 48532->48535 48536 404f7d GetLocalTime 48532->48536 48533->47977 48534->48535 48535->48533 48673 405150 48535->48673 48537 41bb8e 28 API calls 48536->48537 48538 404f91 48537->48538 48672 4052fd 28 API calls 48538->48672 48547 404a1b 48546->48547 48548 4048ee 48546->48548 48549 40497e 48547->48549 48550 404a21 WSAGetLastError 48547->48550 48548->48549 48551 404923 48548->48551 48553 40531e 28 API calls 48548->48553 48549->47977 48550->48549 48552 404a31 48550->48552 48677 420c60 27 API calls 48551->48677 48554 404932 48552->48554 48555 404a36 48552->48555 48557 40490f 48553->48557 48561 402093 28 API calls 48554->48561 48682 41cae1 30 API calls 48555->48682 48562 402093 28 API calls 48557->48562 48559 40492b 48559->48554 48560 404941 48559->48560 48570 404950 48560->48570 48571 404987 48560->48571 48564 404a80 48561->48564 48565 40491e 48562->48565 48563 404a40 48683 4052fd 28 API calls 48563->48683 48567 402093 28 API calls 48564->48567 48568 41b4ef 80 API calls 48565->48568 48572 404a8f 48567->48572 48568->48551 48574 402093 28 API calls 48570->48574 48679 421a40 54 API calls 48571->48679 48575 41b4ef 80 API calls 48572->48575 48580 40495f 48574->48580 48575->48549 48578 40498f 48581 4049c4 48578->48581 48582 404994 48578->48582 48584 402093 28 API calls 48580->48584 48681 420e06 28 API calls 48581->48681 48585 402093 28 API calls 48582->48585 48587 40496e 48584->48587 48589 4049a3 48585->48589 48590 41b4ef 80 API calls 48587->48590 48592 402093 28 API calls 48589->48592 48593 404973 48590->48593 48591 4049cc 48594 4049f9 CreateEventW CreateEventW 48591->48594 48596 402093 28 API calls 48591->48596 48595 4049b2 48592->48595 48678 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48593->48678 48594->48549 48597 41b4ef 80 API calls 48595->48597 48599 4049e2 48596->48599 48601 4049b7 48597->48601 48600 402093 28 API calls 48599->48600 48602 4049f1 48600->48602 48680 4210b2 52 API calls 48601->48680 48604 41b4ef 80 API calls 48602->48604 48605 4049f6 48604->48605 48605->48594 48684 41b7b6 GlobalMemoryStatusEx 48606->48684 48608 41b7f5 48608->47977 48685 414580 48609->48685 48613 441e8d 48612->48613 48715 441c7d 48613->48715 48615 441eae 48615->47977 48617 40dda5 48616->48617 48618 4134ff 3 API calls 48617->48618 48620 40ddac 48618->48620 48619 40ddc4 48619->47977 48620->48619 48621 413549 3 API calls 48620->48621 48621->48619 48623 4020b7 28 API calls 48622->48623 48624 41bc57 48623->48624 48624->47977 48626 41bd2b 48625->48626 48627 4020b7 28 API calls 48626->48627 48628 41bd3d 48627->48628 48628->47977 48630 441e81 20 API calls 48629->48630 48631 41bbb2 48630->48631 48632 402093 28 API calls 48631->48632 48633 41bbc0 48632->48633 48633->47977 48635 41bafc GetTickCount 48634->48635 48635->47993 48637 436e90 ___scrt_fastfail 48636->48637 48638 41bab5 GetForegroundWindow GetWindowTextW 48637->48638 48639 40417e 28 API calls 48638->48639 48640 41badf 48639->48640 48640->47993 48642 402093 28 API calls 48641->48642 48643 40f8f6 48642->48643 48643->47993 48644->47993 48646 4020df 11 API calls 48645->48646 48647 404c27 48646->48647 48648 4020df 11 API calls 48647->48648 48652 404c30 48648->48652 48649 43bd51 new 21 API calls 48649->48652 48651 404c96 48651->48652 48654 404ca1 48651->48654 48652->48649 48652->48651 48653 4020b7 28 API calls 48652->48653 48655 401fe2 28 API calls 48652->48655 48658 401fd8 11 API calls 48652->48658 48720 404cc3 48652->48720 48732 404b96 57 API calls 48652->48732 48653->48652 48733 404e26 99 API calls 48654->48733 48655->48652 48657 404ca8 48659 401fd8 11 API calls 48657->48659 48658->48652 48660 404cb1 48659->48660 48661 401fd8 11 API calls 48660->48661 48662 404cba 48661->48662 48662->47954 48664->47977 48665->47954 48667->47993 48668->47954 48669->47954 48670->48522 48671->48530 48676 40515c 102 API calls 48673->48676 48675 405159 48676->48675 48677->48559 48678->48549 48679->48578 48680->48593 48681->48591 48682->48563 48684->48608 48688 414553 48685->48688 48689 414568 ___scrt_initialize_default_local_stdio_options 48688->48689 48692 43f79d 48689->48692 48695 43c4f0 48692->48695 48696 43c530 48695->48696 48697 43c518 48695->48697 48696->48697 48699 43c538 48696->48699 48710 4405dd 20 API calls __dosmaperr 48697->48710 48711 43a7b7 36 API calls 3 library calls 48699->48711 48701 43c548 48712 43cc76 20 API calls 2 library calls 48701->48712 48702 43c51d __cftof 48704 434fcb __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 48702->48704 48706 414576 48704->48706 48705 43c5c0 48713 43d2e4 51 API calls 3 library calls 48705->48713 48706->47977 48709 43c5cb 48714 43cce0 20 API calls _free 48709->48714 48710->48702 48711->48701 48712->48705 48713->48709 48714->48702 48716 441c94 48715->48716 48718 441ccb __cftof 48716->48718 48719 4405dd 20 API calls __dosmaperr 48716->48719 48718->48615 48719->48718 48721 4020df 11 API calls 48720->48721 48725 404cde 48721->48725 48722 404e13 48723 401fd8 11 API calls 48722->48723 48724 404e1c 48723->48724 48724->48651 48725->48722 48726 4041a2 28 API calls 48725->48726 48727 401fc0 28 API calls 48725->48727 48728 4020f6 28 API calls 48725->48728 48730 401fe2 28 API calls 48725->48730 48731 401fd8 11 API calls 48725->48731 48726->48725 48729 404dad CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 48727->48729 48728->48725 48729->48725 48734 415aea 48729->48734 48730->48725 48731->48725 48732->48652 48733->48657 48735 4020f6 28 API calls 48734->48735 48736 415b0c SetEvent 48735->48736 48737 415b21 48736->48737 48738 4041a2 28 API calls 48737->48738 48739 415b3b 48738->48739 48740 4020f6 28 API calls 48739->48740 48741 415b4b 48740->48741 48742 4020f6 28 API calls 48741->48742 48743 415b5d 48742->48743 48744 41be1b 28 API calls 48743->48744 48745 415b66 48744->48745 48746 417089 48745->48746 48747 415b86 GetTickCount 48745->48747 48748 415d2f 48745->48748 48749 401e8d 11 API calls 48746->48749 48750 41bb8e 28 API calls 48747->48750 48748->48746 48811 415ce5 48748->48811 48751 417092 48749->48751 48752 415b97 48750->48752 48754 401fd8 11 API calls 48751->48754 48755 41bae6 GetTickCount 48752->48755 48756 41709e 48754->48756 48757 415ba3 48755->48757 48758 401fd8 11 API calls 48756->48758 48759 41bb8e 28 API calls 48757->48759 48760 4170aa 48758->48760 48761 415bae 48759->48761 48762 41ba96 30 API calls 48761->48762 48763 415bbc 48762->48763 48764 41bd1e 28 API calls 48763->48764 48765 415bca 48764->48765 48766 401e65 22 API calls 48765->48766 48767 415bd8 48766->48767 48813 402f31 28 API calls 48767->48813 48769 415be6 48814 402ea1 28 API calls 48769->48814 48771 415bf5 48772 402f10 28 API calls 48771->48772 48773 415c04 48772->48773 48815 402ea1 28 API calls 48773->48815 48775 415c13 48776 402f10 28 API calls 48775->48776 48777 415c1f 48776->48777 48816 402ea1 28 API calls 48777->48816 48779 415c29 48817 404aa1 61 API calls ctype 48779->48817 48781 415c38 48782 401fd8 11 API calls 48781->48782 48783 415c41 48782->48783 48784 401fd8 11 API calls 48783->48784 48785 415c4d 48784->48785 48786 401fd8 11 API calls 48785->48786 48787 415c59 48786->48787 48788 401fd8 11 API calls 48787->48788 48789 415c65 48788->48789 48790 401fd8 11 API calls 48789->48790 48791 415c71 48790->48791 48792 401fd8 11 API calls 48791->48792 48793 415c7d 48792->48793 48794 401f09 11 API calls 48793->48794 48795 415c86 48794->48795 48796 401fd8 11 API calls 48795->48796 48797 415c8f 48796->48797 48798 401fd8 11 API calls 48797->48798 48799 415c98 48798->48799 48800 401e65 22 API calls 48799->48800 48801 415ca3 48800->48801 48802 43baac _strftime 40 API calls 48801->48802 48803 415cb0 48802->48803 48804 415cb5 48803->48804 48805 415cdb 48803->48805 48807 415cc3 48804->48807 48808 415cce 48804->48808 48806 401e65 22 API calls 48805->48806 48806->48811 48818 404ff4 82 API calls 48807->48818 48810 404f51 105 API calls 48808->48810 48812 415cc9 48810->48812 48811->48746 48819 4050e4 84 API calls 48811->48819 48812->48746 48813->48769 48814->48771 48815->48775 48816->48779 48817->48781 48818->48812 48819->48812 48822 401f8e 48821->48822 48823 402252 11 API calls 48822->48823 48824 401f99 48823->48824 48824->48021 48824->48022 48824->48024 48825->48029 48826->48055 48827->48054 48828->48043 48829->48047 48830->48053 48831->48086 48836 40f7c2 48834->48836 48835 413549 3 API calls 48835->48836 48836->48835 48837 40f866 48836->48837 48839 40f856 Sleep 48836->48839 48856 40f7f4 48836->48856 48840 40905c 28 API calls 48837->48840 48838 40905c 28 API calls 48838->48856 48839->48836 48843 40f871 48840->48843 48842 41bc5e 28 API calls 48842->48856 48844 41bc5e 28 API calls 48843->48844 48845 40f87d 48844->48845 48869 413814 14 API calls 48845->48869 48848 401f09 11 API calls 48848->48856 48849 40f890 48850 401f09 11 API calls 48849->48850 48852 40f89c 48850->48852 48851 402093 28 API calls 48851->48856 48853 402093 28 API calls 48852->48853 48854 40f8ad 48853->48854 48857 41376f 14 API calls 48854->48857 48855 41376f 14 API calls 48855->48856 48856->48838 48856->48839 48856->48842 48856->48848 48856->48851 48856->48855 48867 40d096 112 API calls ___scrt_fastfail 48856->48867 48868 413814 14 API calls 48856->48868 48858 40f8c0 48857->48858 48870 412850 TerminateProcess WaitForSingleObject 48858->48870 48860 40f8c8 ExitProcess 48871 4127ee 62 API calls 48862->48871 48868->48856 48869->48849 48870->48860 48872 4269e6 48873 4269fb 48872->48873 48880 426a8d 48872->48880 48874 426a48 48873->48874 48875 426b44 48873->48875 48876 426abd 48873->48876 48877 426b1d 48873->48877 48873->48880 48882 426af2 48873->48882 48886 426a7d 48873->48886 48900 424edd 49 API calls ctype 48873->48900 48874->48880 48874->48886 48901 41fb6c 52 API calls 48874->48901 48875->48880 48905 426155 28 API calls 48875->48905 48876->48880 48876->48882 48903 41fb6c 52 API calls 48876->48903 48877->48875 48877->48880 48888 425ae1 48877->48888 48882->48877 48904 4256f0 21 API calls 48882->48904 48886->48876 48886->48880 48902 424edd 49 API calls ctype 48886->48902 48889 425b00 ___scrt_fastfail 48888->48889 48891 425b0f 48889->48891 48894 425b34 48889->48894 48906 41ebbb 21 API calls 48889->48906 48891->48894 48899 425b14 48891->48899 48907 4205d8 46 API calls 48891->48907 48894->48875 48895 425b1d 48895->48894 48914 424d05 21 API calls 2 library calls 48895->48914 48897 425bb7 48897->48894 48908 432ec4 48897->48908 48899->48894 48899->48895 48913 41da5f 49 API calls 48899->48913 48900->48874 48901->48874 48902->48876 48903->48876 48904->48877 48905->48880 48906->48891 48907->48897 48909 432ed2 48908->48909 48910 432ece 48908->48910 48911 43bd51 new 21 API calls 48909->48911 48910->48899 48912 432ed7 48911->48912 48912->48899 48913->48895 48914->48894 48915 415d06 48930 41b380 48915->48930 48917 415d0f 48918 4020f6 28 API calls 48917->48918 48919 415d1e 48918->48919 48941 404aa1 61 API calls ctype 48919->48941 48921 415d2a 48922 417089 48921->48922 48923 401fd8 11 API calls 48921->48923 48924 401e8d 11 API calls 48922->48924 48923->48922 48925 417092 48924->48925 48926 401fd8 11 API calls 48925->48926 48927 41709e 48926->48927 48928 401fd8 11 API calls 48927->48928 48929 4170aa 48928->48929 48931 4020df 11 API calls 48930->48931 48932 41b38e 48931->48932 48933 43bd51 new 21 API calls 48932->48933 48934 41b39e InternetOpenW InternetOpenUrlW 48933->48934 48935 41b3c5 InternetReadFile 48934->48935 48938 41b3e8 48935->48938 48936 4020b7 28 API calls 48936->48938 48937 41b415 InternetCloseHandle InternetCloseHandle 48939 41b427 48937->48939 48938->48935 48938->48936 48938->48937 48940 401fd8 11 API calls 48938->48940 48939->48917 48940->48938 48941->48921 48942 426c4b 48947 426cc8 send 48942->48947 48948 43be58 48950 43be64 _swprintf CallCatchBlock 48948->48950 48949 43be72 48964 4405dd 20 API calls __dosmaperr 48949->48964 48950->48949 48953 43be9c 48950->48953 48952 43be77 __cftof CallCatchBlock 48959 445888 EnterCriticalSection 48953->48959 48955 43bea7 48960 43bf48 48955->48960 48959->48955 48962 43bf56 48960->48962 48961 43beb2 48965 43becf LeaveCriticalSection std::_Lockit::~_Lockit 48961->48965 48962->48961 48966 44976c 37 API calls 2 library calls 48962->48966 48964->48952 48965->48952 48966->48962 48967 41dfbd 48968 41dfd2 ctype ___scrt_fastfail 48967->48968 48969 41e1d5 48968->48969 48970 432ec4 21 API calls 48968->48970 48975 41e189 48969->48975 48981 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 48969->48981 48974 41e182 ___scrt_fastfail 48970->48974 48972 41e1e6 48973 432ec4 21 API calls 48972->48973 48972->48975 48977 41e21f ___scrt_fastfail 48973->48977 48974->48975 48976 432ec4 21 API calls 48974->48976 48979 41e1af ___scrt_fastfail 48976->48979 48977->48975 48982 43354a 48977->48982 48979->48975 48980 432ec4 21 API calls 48979->48980 48980->48969 48981->48972 48985 433469 48982->48985 48984 433552 48984->48975 48986 433482 48985->48986 48987 433478 48985->48987 48986->48987 48988 432ec4 21 API calls 48986->48988 48987->48984 48989 4334a3 48988->48989 48989->48987 48991 433837 CryptAcquireContextA 48989->48991 48992 433858 CryptGenRandom 48991->48992 48993 433853 48991->48993 48992->48993 48994 43386d CryptReleaseContext 48992->48994 48993->48987 48994->48993 48995 40165e 48996 401666 48995->48996 48998 401669 48995->48998 48997 4016a8 48999 4344ea new 22 API calls 48997->48999 48998->48997 49000 401696 48998->49000 49001 40169c 48999->49001 49002 4344ea new 22 API calls 49000->49002 49002->49001 49003 426bdc 49009 426cb1 recv 49003->49009 49010 42f8ed 49011 42f8f8 49010->49011 49012 42f90c 49011->49012 49014 432eee 49011->49014 49015 432efd 49014->49015 49017 432ef9 49014->49017 49018 440f0d 49015->49018 49017->49012 49019 446185 49018->49019 49020 446192 49019->49020 49021 44619d 49019->49021 49031 446137 49020->49031 49022 4461a5 49021->49022 49029 4461ae ___crtLCMapStringA 49021->49029 49024 446782 _free 20 API calls 49022->49024 49027 44619a 49024->49027 49025 4461b3 49038 4405dd 20 API calls __dosmaperr 49025->49038 49026 4461d8 RtlReAllocateHeap 49026->49027 49026->49029 49027->49017 49029->49025 49029->49026 49039 442f80 7 API calls 2 library calls 49029->49039 49032 446175 49031->49032 49036 446145 ___crtLCMapStringA 49031->49036 49041 4405dd 20 API calls __dosmaperr 49032->49041 49033 446160 RtlAllocateHeap 49035 446173 49033->49035 49033->49036 49035->49027 49036->49032 49036->49033 49040 442f80 7 API calls 2 library calls 49036->49040 49038->49027 49039->49029 49040->49036 49041->49035

                      Control-flow Graph

                      APIs
                      • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                      • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                      • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                      • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                      • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                      • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                      • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                      • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                      • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                      • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                      • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                      • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                      • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                      • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                      • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad$HandleModule
                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                      • API String ID: 4236061018-3687161714
                      • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                      • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                      • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                      • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1082 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1087 41b3c5-41b3e6 InternetReadFile 1082->1087 1088 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1087->1088 1089 41b40c-41b40f 1087->1089 1088->1089 1091 41b411-41b413 1089->1091 1092 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1089->1092 1091->1087 1091->1092 1096 41b427-41b431 1092->1096
                      APIs
                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                      • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                      • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                      Strings
                      • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleOpen$FileRead
                      • String ID: http://geoplugin.net/json.gp
                      • API String ID: 3121278467-91888290
                      • Opcode ID: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                      • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                      • Opcode Fuzzy Hash: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                      • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00413549: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00413569
                        • Part of subcall function 00413549: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                        • Part of subcall function 00413549: RegCloseKey.KERNELBASE(?), ref: 00413592
                      • Sleep.KERNELBASE(00000BB8), ref: 0040F85B
                      • ExitProcess.KERNEL32 ref: 0040F8CA
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseExitOpenProcessQuerySleepValue
                      • String ID: 5.1.0 Pro$override$pth_unenc
                      • API String ID: 2281282204-182549033
                      • Opcode ID: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                      • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                      • Opcode Fuzzy Hash: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                      • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1265 404f51-404f5f 1266 404f65-404f6c 1265->1266 1267 404fea 1265->1267 1269 404f74-404f7b 1266->1269 1270 404f6e-404f72 1266->1270 1268 404fec-404ff1 1267->1268 1271 404fc0-404fe8 CreateEventA CreateThread 1269->1271 1272 404f7d-404fbb GetLocalTime call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1269->1272 1270->1271 1271->1268 1272->1271
                      APIs
                      • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$EventLocalThreadTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 2532271599-1507639952
                      • Opcode ID: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                      • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                      • Opcode Fuzzy Hash: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                      • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                      APIs
                      • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,0119BD08), ref: 00433849
                      • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Crypt$Context$AcquireRandomRelease
                      • String ID:
                      • API String ID: 1815803762-0
                      • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                      • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                      • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                      • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                      APIs
                      • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,004750E4), ref: 0041B62A
                      • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Name$ComputerUser
                      • String ID:
                      • API String ID: 4229901323-0
                      • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                      • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                      • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                      • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                      APIs
                      • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                      • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                      • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                      • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 102 40f34f-40f36a call 401fab call 4139a9 call 412475 69->102 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 98 40ebec-40ec02 call 401fab call 4139a9 80->98 93 40ec1c 88->93 94 40ec1e-40ec2a call 41b2c3 88->94 92 40eef1 89->92 92->49 93->94 104 40ec33-40ec37 94->104 105 40ec2c-40ec2e 94->105 98->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 102->126 108 40ec76-40ec89 call 401e65 call 401fab 104->108 109 40ec39 call 407716 104->109 105->104 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 118 40ec3e-40ec40 109->118 121 40ec42-40ec47 call 407738 call 407260 118->121 122 40ec4c-40ec5f call 401e65 call 401fab 118->122 121->122 122->108 141 40ec61-40ec67 122->141 157 40f3a5-40f3af call 40dd42 call 414f2a 126->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 203 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->203 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->234 182 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->182 183 40ee0f-40ee19 call 409057 180->183 193 40ee1e-40ee42 call 40247c call 434798 182->193 183->193 210 40ee51 193->210 211 40ee44-40ee4f call 436e90 193->211 203->177 217 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 210->217 211->217 271 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 217->271 286 40efc1 234->286 287 40efdc-40efde 234->287 271->234 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 271->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->234 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->92 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 356 40f159-40f16c call 401e65 call 401fab 347->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->357 367 40f1cc-40f1df call 401e65 call 401fab 356->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->368 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 416 40f287-40f28c 412->416 417 40f2cc-40f2df call 401fab call 4134ff 412->417 415 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->415 415->417 416->415 426 40f2e4-40f2e7 417->426 426->157 428 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 426->428 443 40f346-40f34b DeleteFileW 428->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                      APIs
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe,00000104), ref: 0040E9EE
                        • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                      • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                      • API String ID: 2830904901-1371141609
                      • Opcode ID: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                      • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                      • Opcode Fuzzy Hash: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                      • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 566 415210-415225 call 404f51 call 4048c8 560->566 567 4151e5-41520b call 402093 * 2 call 41b4ef 560->567 582 415aa3-415ab5 call 404e26 call 4021fa 561->582 566->582 583 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 566->583 567->582 597 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 582->597 598 415add-415ae5 call 401e8d 582->598 648 415380-41538d call 405aa6 583->648 649 415392-4153b9 call 401fab call 4135a6 583->649 597->598 598->477 648->649 655 4153c0-41577f call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 649->655 656 4153bb-4153bd 649->656 782 415781 call 404aa1 655->782 656->655 783 415786-415a0a call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 782->783 901 415a0f-415a16 783->901 902 415a18-415a1f 901->902 903 415a2a-415a31 901->903 902->903 904 415a21-415a23 902->904 905 415a33-415a38 call 40b051 903->905 906 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->906 904->903 905->906 917 415a71-415a7d CreateThread 906->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 906->918 917->918 918->582
                      APIs
                      • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                      • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                      • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$ErrorLastLocalTime
                      • String ID: | $%I64u$5.1.0 Pro$8SG$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                      • API String ID: 524882891-2767410394
                      • Opcode ID: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                      • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                      • Opcode Fuzzy Hash: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                      • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                      Control-flow Graph

                      APIs
                      • connect.WS2_32(?,?,?), ref: 004048E0
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                      • WSAGetLastError.WS2_32 ref: 00404A21
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                      • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                      • API String ID: 994465650-2151626615
                      • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                      • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                      • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                      • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1000 40da34-40da59 call 401f86 1003 40db83-40dba9 call 401f04 GetLongPathNameW call 40417e 1000->1003 1004 40da5f 1000->1004 1025 40dbae-40dc1b call 40417e call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1003->1025 1006 40da70-40da7e call 41b5b4 call 401f13 1004->1006 1007 40da91-40da96 1004->1007 1008 40db51-40db56 1004->1008 1009 40daa5-40daac call 41bfb7 1004->1009 1010 40da66-40da6b 1004->1010 1011 40db58-40db5d 1004->1011 1012 40da9b-40daa0 1004->1012 1013 40db6e 1004->1013 1014 40db5f-40db64 call 43c0cf 1004->1014 1034 40da83 1006->1034 1016 40db73-40db78 call 43c0cf 1007->1016 1008->1016 1026 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1009->1026 1027 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1009->1027 1010->1016 1011->1016 1012->1016 1013->1016 1022 40db69-40db6c 1014->1022 1028 40db79-40db7e call 409057 1016->1028 1022->1013 1022->1028 1026->1034 1039 40da87-40da8c call 401f09 1027->1039 1028->1003 1034->1039 1039->1003
                      APIs
                      • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040DB9A
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LongNamePath
                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                      • API String ID: 82841172-425784914
                      • Opcode ID: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                      • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                      • Opcode Fuzzy Hash: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                      • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1100 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1111 41b35d-41b366 1100->1111 1112 41b31c-41b32b call 4135a6 1100->1112 1113 41b368-41b36d 1111->1113 1114 41b36f 1111->1114 1117 41b330-41b347 call 401fab StrToIntA 1112->1117 1116 41b374-41b37f call 40537d 1113->1116 1114->1116 1122 41b355-41b358 call 401fd8 1117->1122 1123 41b349-41b352 call 41cf69 1117->1123 1122->1111 1123->1122
                      APIs
                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                        • Part of subcall function 004135A6: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                        • Part of subcall function 004135A6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                        • Part of subcall function 004135A6: RegCloseKey.KERNELBASE(?), ref: 004135F2
                      • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCurrentOpenProcessQueryValue
                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                      • API String ID: 1866151309-2070987746
                      • Opcode ID: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                      • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                      • Opcode Fuzzy Hash: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                      • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CountEventTick
                      • String ID: !D@$NG
                      • API String ID: 180926312-2721294649
                      • Opcode ID: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                      • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                      • Opcode Fuzzy Hash: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                      • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1282 41376f-413786 RegCreateKeyA 1283 413788-4137bd call 40247c call 401fab RegSetValueExA RegCloseKey 1282->1283 1284 4137bf 1282->1284 1286 4137c1-4137cf call 401fd8 1283->1286 1284->1286
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                      • RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                      • RegCloseKey.KERNELBASE(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: pth_unenc
                      • API String ID: 1818849710-4028850238
                      • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                      • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                      • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                      • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54

                      Control-flow Graph

                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                      • CreateThread.KERNELBASE(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                      • FindCloseChangeNotification.KERNELBASE(?,?,00000000), ref: 00404DDB
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                      • String ID:
                      • API String ID: 2579639479-0
                      • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                      • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                      • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                      • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1340 40d069-40d095 call 401fab CreateMutexA GetLastError
                      APIs
                      • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                      • GetLastError.KERNEL32 ref: 0040D083
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateErrorLastMutex
                      • String ID: SG
                      • API String ID: 1925916568-3189917014
                      • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                      • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                      • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                      • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1343 4135a6-4135d2 RegOpenKeyExA 1344 4135d4-4135fc RegQueryValueExA RegCloseKey 1343->1344 1345 413607 1343->1345 1346 413609 1344->1346 1347 4135fe-413605 1344->1347 1345->1346 1348 41360e-41361a call 402093 1346->1348 1347->1348
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                      • RegCloseKey.KERNELBASE(?), ref: 004135F2
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                      • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                      • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                      • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1351 4136f8-41371c RegOpenKeyExA 1352 413768 1351->1352 1353 41371e-413740 RegQueryValueExA RegCloseKey 1351->1353 1355 41376a-41376e 1352->1355 1353->1352 1354 413742-413766 call 406cb7 call 406d3c 1353->1354 1354->1355
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                      • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                      • RegCloseKey.KERNELBASE(00000000), ref: 00413738
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                      • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                      • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                      • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00413569
                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                      • RegCloseKey.KERNELBASE(?), ref: 00413592
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                      • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                      • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                      • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                      • RegCloseKey.KERNELBASE(?,?,?,0040C19C,00466C48), ref: 00413535
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                      • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                      • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                      • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                      • RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                      • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID:
                      • API String ID: 1818849710-0
                      • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                      • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                      • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                      • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcslen
                      • String ID: pQG
                      • API String ID: 176396367-3769108836
                      • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                      • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                      • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                      • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0041B7CA
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID: @
                      • API String ID: 1890195054-2766056989
                      • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                      • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                      • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                      • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                      APIs
                      • _free.LIBCMT ref: 004461A6
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap$_free
                      • String ID:
                      • API String ID: 1482568997-0
                      • Opcode ID: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                      • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                      • Opcode Fuzzy Hash: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                      • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                      APIs
                      • socket.WS2_32(?,00000001,00000006), ref: 00404852
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                        • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEventStartupsocket
                      • String ID:
                      • API String ID: 1953588214-0
                      • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                      • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                      • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                      • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                      • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                      • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                      • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                      APIs
                      • GetForegroundWindow.USER32 ref: 0041BAB8
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$ForegroundText
                      • String ID:
                      • API String ID: 29597999-0
                      • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                      • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                      • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                      • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                      APIs
                        • Part of subcall function 00445AF3: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
                      • _free.LIBCMT ref: 00450140
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap_free
                      • String ID:
                      • API String ID: 614378929-0
                      • Opcode ID: fdbd8fd48d54792b4aab90f4371f9c4c5731c6c52bc699df08f3ae970cc02b1f
                      • Instruction ID: a633634cbf7549e5c455a263606fb7810d0d6e042387cb83ce13a77316281608
                      • Opcode Fuzzy Hash: fdbd8fd48d54792b4aab90f4371f9c4c5731c6c52bc699df08f3ae970cc02b1f
                      • Instruction Fuzzy Hash: 67014E761007449BE3218F59D881D5AFBD8FB85374F25061EE5D4532C1EA746805C779
                      APIs
                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                      • Instruction ID: e1e4bc9e3ed5bc60ab2f969cc6486aa84e060793a1580145f61584a75d3ee698
                      • Opcode Fuzzy Hash: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                      • Instruction Fuzzy Hash: 9DF09031600D6967BF316A229C06B5BB749EB42760B548027BD08AA297CA38F80186BC
                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                      • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                      • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                      • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                      APIs
                      • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Startup
                      • String ID:
                      • API String ID: 724789610-0
                      • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                      • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                      • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                      • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                      • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                      • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                      • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: recv
                      • String ID:
                      • API String ID: 1507349165-0
                      • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                      • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                      • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                      • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 00407CB9
                      • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                      • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                        • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                        • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                        • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                      • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                      • DeleteFileA.KERNEL32(?), ref: 00408652
                        • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                        • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                        • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                        • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                      • Sleep.KERNEL32(000007D0), ref: 004086F8
                      • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                        • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                      • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                      • API String ID: 1067849700-181434739
                      • Opcode ID: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                      • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                      • Opcode Fuzzy Hash: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                      • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 004056E6
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • __Init_thread_footer.LIBCMT ref: 00405723
                      • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                      • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                      • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                      • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                      • CloseHandle.KERNEL32 ref: 00405A23
                      • CloseHandle.KERNEL32 ref: 00405A2B
                      • CloseHandle.KERNEL32 ref: 00405A3D
                      • CloseHandle.KERNEL32 ref: 00405A45
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                      • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                      • API String ID: 2994406822-18413064
                      • Opcode ID: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                      • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                      • Opcode Fuzzy Hash: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                      • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                      APIs
                      • GetCurrentProcessId.KERNEL32 ref: 00412106
                        • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                        • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                        • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                      • CloseHandle.KERNEL32(00000000), ref: 00412155
                      • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                      • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                      • API String ID: 3018269243-13974260
                      • Opcode ID: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                      • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                      • Opcode Fuzzy Hash: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                      • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                      • FindClose.KERNEL32(00000000), ref: 0040BBC9
                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                      • FindClose.KERNEL32(00000000), ref: 0040BD12
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                      • API String ID: 1164774033-3681987949
                      • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                      • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                      • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                      • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                      APIs
                      • OpenClipboard.USER32 ref: 004168C2
                      • EmptyClipboard.USER32 ref: 004168D0
                      • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                      • GlobalLock.KERNEL32(00000000), ref: 004168F9
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                      • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                      • CloseClipboard.USER32 ref: 00416955
                      • OpenClipboard.USER32 ref: 0041695C
                      • GetClipboardData.USER32(0000000D), ref: 0041696C
                      • GlobalLock.KERNEL32(00000000), ref: 00416975
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                      • CloseClipboard.USER32 ref: 00416984
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                      • String ID: !D@
                      • API String ID: 3520204547-604454484
                      • Opcode ID: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                      • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                      • Opcode Fuzzy Hash: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                      • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                      • FindClose.KERNEL32(00000000), ref: 0040BDC9
                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                      • FindClose.KERNEL32(00000000), ref: 0040BEAF
                      • FindClose.KERNEL32(00000000), ref: 0040BED0
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$File$FirstNext
                      • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 3527384056-432212279
                      • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                      • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                      • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                      • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                      • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                      • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                      • API String ID: 3756808967-1743721670
                      • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                      • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                      • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                      • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0$1$2$3$4$5$6$7$VG
                      • API String ID: 0-1861860590
                      • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                      • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                      • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                      • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                      APIs
                      • _wcslen.LIBCMT ref: 00407521
                      • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Object_wcslen
                      • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                      • API String ID: 240030777-3166923314
                      • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                      • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                      • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                      • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                      APIs
                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                      • GetLastError.KERNEL32 ref: 0041A7BB
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                      • String ID:
                      • API String ID: 3587775597-0
                      • Opcode ID: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                      • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                      • Opcode Fuzzy Hash: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                      • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                      • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                      • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                      • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                      • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                      • String ID: lJD$lJD$lJD
                      • API String ID: 745075371-479184356
                      • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                      • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                      • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                      • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                      • FindClose.KERNEL32(00000000), ref: 0040C47D
                      • FindClose.KERNEL32(00000000), ref: 0040C4A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 1164774033-405221262
                      • Opcode ID: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                      • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                      • Opcode Fuzzy Hash: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                      • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                      • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                      • String ID:
                      • API String ID: 2341273852-0
                      • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                      • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                      • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                      • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$CreateFirstNext
                      • String ID: 8SG$PXG$PXG$NG$PG
                      • API String ID: 341183262-3812160132
                      • Opcode ID: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                      • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                      • Opcode Fuzzy Hash: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                      • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                      APIs
                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                      • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                      • GetLastError.KERNEL32 ref: 0040A2ED
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                      • TranslateMessage.USER32(?), ref: 0040A34A
                      • DispatchMessageA.USER32(?), ref: 0040A355
                      Strings
                      • Keylogger initialization failure: error , xrefs: 0040A301
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                      • String ID: Keylogger initialization failure: error
                      • API String ID: 3219506041-952744263
                      • Opcode ID: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                      • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                      • Opcode Fuzzy Hash: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                      • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                      APIs
                      • GetForegroundWindow.USER32 ref: 0040A416
                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                      • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                      • GetKeyState.USER32(00000010), ref: 0040A433
                      • GetKeyboardState.USER32(?), ref: 0040A43E
                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                      • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                      • String ID:
                      • API String ID: 1888522110-0
                      • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                      • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                      • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                      • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                      APIs
                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                      • GetProcAddress.KERNEL32(00000000), ref: 00414271
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressCloseCreateLibraryLoadProcsend
                      • String ID: SHDeleteKeyW$Shlwapi.dll
                      • API String ID: 2127411465-314212984
                      • Opcode ID: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                      • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                      • Opcode Fuzzy Hash: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                      • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                      APIs
                      • _free.LIBCMT ref: 00449212
                      • _free.LIBCMT ref: 00449236
                      • _free.LIBCMT ref: 004493BD
                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                      • _free.LIBCMT ref: 00449589
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                      • String ID:
                      • API String ID: 314583886-0
                      • Opcode ID: a0df98c9171fe928957a71b0f613fe22cde1b567892c52a540cd8d6d0b3e47ec
                      • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                      • Opcode Fuzzy Hash: a0df98c9171fe928957a71b0f613fe22cde1b567892c52a540cd8d6d0b3e47ec
                      • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                      APIs
                        • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                        • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                        • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                        • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                        • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                      • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                      • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                      • GetProcAddress.KERNEL32(00000000), ref: 00416872
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                      • String ID: !D@$PowrProf.dll$SetSuspendState
                      • API String ID: 1589313981-2876530381
                      • Opcode ID: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                      • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                      • Opcode Fuzzy Hash: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                      • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                      • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                      • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP$['E
                      • API String ID: 2299586839-2532616801
                      • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                      • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                      • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                      • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                      • GetLastError.KERNEL32 ref: 0040BA58
                      Strings
                      • UserProfile, xrefs: 0040BA1E
                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                      • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                      • [Chrome StoredLogins not found], xrefs: 0040BA72
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • API String ID: 2018770650-1062637481
                      • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                      • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                      • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                      • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                      APIs
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                      • GetLastError.KERNEL32 ref: 0041799D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                      • String ID: SeShutdownPrivilege
                      • API String ID: 3534403312-3733053543
                      • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                      • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                      • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                      • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                      APIs
                      • __EH_prolog.LIBCMT ref: 00409258
                        • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                      • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                      • FindClose.KERNEL32(00000000), ref: 004093C1
                        • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                        • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                        • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                      • FindClose.KERNEL32(00000000), ref: 004095B9
                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                      • String ID:
                      • API String ID: 1824512719-0
                      • Opcode ID: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                      • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                      • Opcode Fuzzy Hash: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                      • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ManagerStart
                      • String ID:
                      • API String ID: 276877138-0
                      • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                      • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                      • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                      • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                      • _wcschr.LIBVCRUNTIME ref: 00451E4A
                      • _wcschr.LIBVCRUNTIME ref: 00451E58
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                      • String ID: sJD
                      • API String ID: 4212172061-3536923933
                      • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                      • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                      • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                      • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                      APIs
                      • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                      • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                      • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                      • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID: SETTINGS
                      • API String ID: 3473537107-594951305
                      • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                      • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                      • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                      • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                      APIs
                      • __EH_prolog.LIBCMT ref: 0040966A
                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstH_prologNext
                      • String ID:
                      • API String ID: 1157919129-0
                      • Opcode ID: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                      • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                      • Opcode Fuzzy Hash: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                      • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                      APIs
                      • __EH_prolog.LIBCMT ref: 00408811
                      • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                      • String ID:
                      • API String ID: 1771804793-0
                      • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                      • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                      • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                      • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                      Strings
                      • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, xrefs: 00407007, 0040712F
                      • open, xrefs: 00406FB6
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadExecuteFileShell
                      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe$open
                      • API String ID: 2825088817-4124665414
                      • Opcode ID: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                      • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                      • Opcode Fuzzy Hash: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                      • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$FirstNextsend
                      • String ID: XPG$XPG
                      • API String ID: 4113138495-1962359302
                      • Opcode ID: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                      • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                      • Opcode Fuzzy Hash: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                      • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                      APIs
                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                        • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                        • Part of subcall function 0041376F: RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                        • Part of subcall function 0041376F: RegCloseKey.KERNELBASE(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateInfoParametersSystemValue
                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                      • API String ID: 4127273184-3576401099
                      • Opcode ID: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                      • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                      • Opcode Fuzzy Hash: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                      • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorInfoLastLocale$_free$_abort
                      • String ID:
                      • API String ID: 2829624132-0
                      • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                      • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                      • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                      • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                      • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                      • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                      • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                      • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                      • ExitProcess.KERNEL32 ref: 004432EF
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                      • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                      • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                      • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                      APIs
                      • OpenClipboard.USER32(00000000), ref: 0040B711
                      • GetClipboardData.USER32(0000000D), ref: 0040B71D
                      • CloseClipboard.USER32 ref: 0040B725
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$CloseDataOpen
                      • String ID:
                      • API String ID: 2058664381-0
                      • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                      • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                      • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                      • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: 467a2b870f27eeaba5f3d85303d6c443c91537f9433fd9512f86f3d9895b4a39
                      • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                      • Opcode Fuzzy Hash: 467a2b870f27eeaba5f3d85303d6c443c91537f9433fd9512f86f3d9895b4a39
                      • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID: lJD
                      • API String ID: 1084509184-3316369744
                      • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                      • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                      • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                      • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID: lJD
                      • API String ID: 1084509184-3316369744
                      • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                      • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                      • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                      • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: GetLocaleInfoEx
                      • API String ID: 2299586839-2904428671
                      • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                      • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                      • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                      • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                      • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$FreeProcess
                      • String ID:
                      • API String ID: 3859560861-0
                      • Opcode ID: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                      • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                      • Opcode Fuzzy Hash: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                      • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                      • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                      • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                      • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$InfoLocale_abort
                      • String ID:
                      • API String ID: 1663032902-0
                      • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                      • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                      • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                      • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$InfoLocale_abort_free
                      • String ID:
                      • API String ID: 2692324296-0
                      • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                      • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                      • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                      • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                      APIs
                        • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                      • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalEnterEnumLocalesSectionSystem
                      • String ID:
                      • API String ID: 1272433827-0
                      • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                      • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                      • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                      • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                      • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                      • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                      • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                      • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                      • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                      • Instruction Fuzzy Hash:
                      APIs
                      • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                      • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                        • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                      • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                      • DeleteDC.GDI32(00000000), ref: 00418F2A
                      • DeleteDC.GDI32(00000000), ref: 00418F2D
                      • DeleteObject.GDI32(00000000), ref: 00418F30
                      • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                      • DeleteDC.GDI32(00000000), ref: 00418F62
                      • DeleteDC.GDI32(00000000), ref: 00418F65
                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                      • GetIconInfo.USER32(?,?), ref: 00418FBD
                      • DeleteObject.GDI32(?), ref: 00418FEC
                      • DeleteObject.GDI32(?), ref: 00418FF9
                      • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                      • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                      • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                      • DeleteDC.GDI32(?), ref: 0041917C
                      • DeleteDC.GDI32(00000000), ref: 0041917F
                      • DeleteObject.GDI32(00000000), ref: 00419182
                      • GlobalFree.KERNEL32(?), ref: 0041918D
                      • DeleteObject.GDI32(00000000), ref: 00419241
                      • GlobalFree.KERNEL32(?), ref: 00419248
                      • DeleteDC.GDI32(?), ref: 00419258
                      • DeleteDC.GDI32(00000000), ref: 00419263
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                      • String ID: DISPLAY
                      • API String ID: 479521175-865373369
                      • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                      • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                      • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                      • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                      APIs
                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                      • GetProcAddress.KERNEL32(00000000), ref: 00418139
                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                      • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                      • GetProcAddress.KERNEL32(00000000), ref: 00418161
                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                      • GetProcAddress.KERNEL32(00000000), ref: 00418175
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                      • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                      • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                      • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                      • ResumeThread.KERNEL32(?), ref: 00418435
                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                      • GetCurrentProcess.KERNEL32(?), ref: 00418457
                      • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                      • GetLastError.KERNEL32 ref: 0041847A
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                      • API String ID: 4188446516-3035715614
                      • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                      • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                      • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                      • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                      APIs
                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                        • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                        • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                      • ExitProcess.KERNEL32 ref: 0040D7D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                      • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                      • API String ID: 1861856835-332907002
                      • Opcode ID: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                      • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                      • Opcode Fuzzy Hash: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                      • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                      APIs
                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                        • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                      • ExitProcess.KERNEL32 ref: 0040D419
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                      • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                      • API String ID: 3797177996-2557013105
                      • Opcode ID: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                      • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                      • Opcode Fuzzy Hash: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                      • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                      APIs
                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                      • ExitProcess.KERNEL32(00000000), ref: 004124A0
                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                      • CloseHandle.KERNEL32(00000000), ref: 0041253B
                      • GetCurrentProcessId.KERNEL32 ref: 00412541
                      • PathFileExistsW.SHLWAPI(?), ref: 00412572
                      • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                      • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                      • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                        • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                      • Sleep.KERNEL32(000001F4), ref: 00412682
                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                      • CloseHandle.KERNEL32(00000000), ref: 004126A9
                      • GetCurrentProcessId.KERNEL32 ref: 004126AF
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                      • String ID: .exe$8SG$WDH$exepath$open$temp_
                      • API String ID: 2649220323-436679193
                      • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                      • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                      • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                      • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                      APIs
                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                      • SetEvent.KERNEL32 ref: 0041B219
                      • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                      • CloseHandle.KERNEL32 ref: 0041B23A
                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                      • API String ID: 738084811-2094122233
                      • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                      • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                      • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                      • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                      APIs
                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                      • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                      • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                      • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Write$Create
                      • String ID: RIFF$WAVE$data$fmt
                      • API String ID: 1602526932-4212202414
                      • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                      • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                      • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                      • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe,00000001,0040764D,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                      • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                      • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                      • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                      • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                      • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                      • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                      • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                      • API String ID: 1646373207-1466501957
                      • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                      • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                      • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                      • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                      APIs
                      • _wcslen.LIBCMT ref: 0040CE07
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                      • _wcslen.LIBCMT ref: 0040CEE6
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe,00000000,00000000), ref: 0040CF84
                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                      • _wcslen.LIBCMT ref: 0040CFC6
                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                      • ExitProcess.KERNEL32 ref: 0040D062
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                      • String ID: 6$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe$del$open
                      • API String ID: 1579085052-3113230464
                      • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                      • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                      • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                      • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                      APIs
                      • lstrlenW.KERNEL32(?), ref: 0041C036
                      • _memcmp.LIBVCRUNTIME ref: 0041C04E
                      • lstrlenW.KERNEL32(?), ref: 0041C067
                      • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                      • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                      • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                      • _wcslen.LIBCMT ref: 0041C13B
                      • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                      • GetLastError.KERNEL32 ref: 0041C173
                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                      • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                      • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                      • GetLastError.KERNEL32 ref: 0041C1D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                      • String ID: ?
                      • API String ID: 3941738427-1684325040
                      • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                      • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                      • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                      • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$EnvironmentVariable$_wcschr
                      • String ID:
                      • API String ID: 3899193279-0
                      • Opcode ID: 8c398c17f7198d8e95fa4204fbdfe0aa09a5082618e125736fc7a2c78f972757
                      • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                      • Opcode Fuzzy Hash: 8c398c17f7198d8e95fa4204fbdfe0aa09a5082618e125736fc7a2c78f972757
                      • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                      • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                      • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                      • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                      • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                      • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                      • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                      • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                      • Sleep.KERNEL32(00000064), ref: 00412E94
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                      • String ID: /stext "$0TG$0TG$NG$NG
                      • API String ID: 1223786279-2576077980
                      • Opcode ID: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                      • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                      • Opcode Fuzzy Hash: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                      • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                      APIs
                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                      • LoadLibraryA.KERNEL32(?), ref: 00414E17
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                      • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                      • LoadLibraryA.KERNEL32(?), ref: 00414E76
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                      • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                      • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                      • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                      • API String ID: 2490988753-744132762
                      • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                      • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                      • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                      • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                      APIs
                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                      • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumOpen
                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                      • API String ID: 1332880857-3714951968
                      • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                      • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                      • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                      • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                      APIs
                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                      • GetCursorPos.USER32(?), ref: 0041D5E9
                      • SetForegroundWindow.USER32(?), ref: 0041D5F2
                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                      • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                      • ExitProcess.KERNEL32 ref: 0041D665
                      • CreatePopupMenu.USER32 ref: 0041D66B
                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                      • String ID: Close
                      • API String ID: 1657328048-3535843008
                      • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                      • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                      • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                      • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$Info
                      • String ID:
                      • API String ID: 2509303402-0
                      • Opcode ID: 8630906f26d86e97c2d01feafad3d8567ddb50c678f2cb36b5e7577a775c1f69
                      • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                      • Opcode Fuzzy Hash: 8630906f26d86e97c2d01feafad3d8567ddb50c678f2cb36b5e7577a775c1f69
                      • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                      • __aulldiv.LIBCMT ref: 00408D4D
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                      • CloseHandle.KERNEL32(00000000), ref: 00408F64
                      • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                      • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                      • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                      • API String ID: 3086580692-2582957567
                      • Opcode ID: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                      • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                      • Opcode Fuzzy Hash: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                      • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                      APIs
                      • Sleep.KERNEL32(00001388), ref: 0040A740
                        • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                        • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                        • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                        • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                      • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                      • String ID: 8SG$8SG$pQG$pQG$PG$PG
                      • API String ID: 3795512280-1152054767
                      • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                      • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                      • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                      • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 0045130A
                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                      • _free.LIBCMT ref: 004512FF
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00451321
                      • _free.LIBCMT ref: 00451336
                      • _free.LIBCMT ref: 00451341
                      • _free.LIBCMT ref: 00451363
                      • _free.LIBCMT ref: 00451376
                      • _free.LIBCMT ref: 00451384
                      • _free.LIBCMT ref: 0045138F
                      • _free.LIBCMT ref: 004513C7
                      • _free.LIBCMT ref: 004513CE
                      • _free.LIBCMT ref: 004513EB
                      • _free.LIBCMT ref: 00451403
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                      • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                      • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                      • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                      APIs
                      • __EH_prolog.LIBCMT ref: 00419FB9
                      • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                      • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                      • GetLocalTime.KERNEL32(?), ref: 0041A105
                      • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                      • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                      • API String ID: 489098229-1431523004
                      • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                      • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                      • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                      • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                      APIs
                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                        • Part of subcall function 004136F8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                        • Part of subcall function 004136F8: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                        • Part of subcall function 004136F8: RegCloseKey.KERNELBASE(00000000), ref: 00413738
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                      • ExitProcess.KERNEL32 ref: 0040D9C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                      • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                      • API String ID: 1913171305-3159800282
                      • Opcode ID: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                      • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                      • Opcode Fuzzy Hash: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                      • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: f13b302446b66475bb18d5d42f55ab1b7190c32ccf1072046f607fb9a40aa2ef
                      • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                      • Opcode Fuzzy Hash: f13b302446b66475bb18d5d42f55ab1b7190c32ccf1072046f607fb9a40aa2ef
                      • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                      • closesocket.WS2_32(000000FF), ref: 00404E5A
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                      • String ID:
                      • API String ID: 3658366068-0
                      • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                      • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                      • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                      • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                      APIs
                        • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                      • GetLastError.KERNEL32 ref: 00455CEF
                      • __dosmaperr.LIBCMT ref: 00455CF6
                      • GetFileType.KERNEL32(00000000), ref: 00455D02
                      • GetLastError.KERNEL32 ref: 00455D0C
                      • __dosmaperr.LIBCMT ref: 00455D15
                      • CloseHandle.KERNEL32(00000000), ref: 00455D35
                      • CloseHandle.KERNEL32(?), ref: 00455E7F
                      • GetLastError.KERNEL32 ref: 00455EB1
                      • __dosmaperr.LIBCMT ref: 00455EB8
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                      • String ID: H
                      • API String ID: 4237864984-2852464175
                      • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                      • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                      • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                      • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                      APIs
                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                      • __alloca_probe_16.LIBCMT ref: 00453EEA
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                      • __alloca_probe_16.LIBCMT ref: 00453F94
                      • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                      • __freea.LIBCMT ref: 00454003
                      • __freea.LIBCMT ref: 0045400F
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                      • String ID: \@E
                      • API String ID: 201697637-1814623452
                      • Opcode ID: fb6195c260b9ae5d4324619eca1f95c452dc13a98459a94436f4153b7f964d62
                      • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                      • Opcode Fuzzy Hash: fb6195c260b9ae5d4324619eca1f95c452dc13a98459a94436f4153b7f964d62
                      • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: \&G$\&G$`&G
                      • API String ID: 269201875-253610517
                      • Opcode ID: 35855cba5d6c4479db42c2a2077b1ccffa38a8944c9ee792822c488c6fc6ed1e
                      • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                      • Opcode Fuzzy Hash: 35855cba5d6c4479db42c2a2077b1ccffa38a8944c9ee792822c488c6fc6ed1e
                      • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 65535$udp
                      • API String ID: 0-1267037602
                      • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                      • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                      • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                      • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 0040AD38
                      • Sleep.KERNEL32(000001F4), ref: 0040AD43
                      • GetForegroundWindow.USER32 ref: 0040AD49
                      • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                      • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                      • Sleep.KERNEL32(000003E8), ref: 0040AE54
                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                      • String ID: [${ User has been idle for $ minutes }$]
                      • API String ID: 911427763-3954389425
                      • Opcode ID: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                      • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                      • Opcode Fuzzy Hash: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                      • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                      • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                      • __dosmaperr.LIBCMT ref: 0043A8A6
                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                      • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                      • __dosmaperr.LIBCMT ref: 0043A8E3
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                      • __dosmaperr.LIBCMT ref: 0043A937
                      • _free.LIBCMT ref: 0043A943
                      • _free.LIBCMT ref: 0043A94A
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                      • String ID:
                      • API String ID: 2441525078-0
                      • Opcode ID: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                      • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                      • Opcode Fuzzy Hash: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                      • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 004054BF
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                      • TranslateMessage.USER32(?), ref: 0040557E
                      • DispatchMessageA.USER32(?), ref: 00405589
                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                      • String ID: CloseChat$DisplayMessage$GetMessage
                      • API String ID: 2956720200-749203953
                      • Opcode ID: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                      • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                      • Opcode Fuzzy Hash: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                      • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                      APIs
                        • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                      • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                      • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                      • String ID: 0VG$0VG$<$@$Temp
                      • API String ID: 1704390241-2575729100
                      • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                      • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                      • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                      • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                      APIs
                      • OpenClipboard.USER32 ref: 00416941
                      • EmptyClipboard.USER32 ref: 0041694F
                      • CloseClipboard.USER32 ref: 00416955
                      • OpenClipboard.USER32 ref: 0041695C
                      • GetClipboardData.USER32(0000000D), ref: 0041696C
                      • GlobalLock.KERNEL32(00000000), ref: 00416975
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                      • CloseClipboard.USER32 ref: 00416984
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                      • String ID: !D@
                      • API String ID: 2172192267-604454484
                      • Opcode ID: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                      • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                      • Opcode Fuzzy Hash: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                      • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                      APIs
                      • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                      • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                      • CloseHandle.KERNEL32(00000000), ref: 0041345F
                      • CloseHandle.KERNEL32(?), ref: 00413465
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                      • String ID:
                      • API String ID: 297527592-0
                      • Opcode ID: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                      • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                      • Opcode Fuzzy Hash: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                      • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                      • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                      • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                      • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                      APIs
                      • _free.LIBCMT ref: 00448135
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00448141
                      • _free.LIBCMT ref: 0044814C
                      • _free.LIBCMT ref: 00448157
                      • _free.LIBCMT ref: 00448162
                      • _free.LIBCMT ref: 0044816D
                      • _free.LIBCMT ref: 00448178
                      • _free.LIBCMT ref: 00448183
                      • _free.LIBCMT ref: 0044818E
                      • _free.LIBCMT ref: 0044819C
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                      • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                      • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                      • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Eventinet_ntoa
                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                      • API String ID: 3578746661-3604713145
                      • Opcode ID: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                      • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                      • Opcode Fuzzy Hash: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                      • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                      APIs
                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DecodePointer
                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                      • API String ID: 3527080286-3064271455
                      • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                      • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                      • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                      • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • Sleep.KERNEL32(00000064), ref: 00417521
                      • DeleteFileW.KERNEL32(00000000), ref: 00417555
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CreateDeleteExecuteShellSleep
                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                      • API String ID: 1462127192-2001430897
                      • Opcode ID: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                      • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                      • Opcode Fuzzy Hash: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                      • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                      APIs
                      • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                      • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe), ref: 0040749E
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CurrentProcess
                      • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                      • API String ID: 2050909247-4242073005
                      • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                      • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                      • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                      • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                      APIs
                      • _strftime.LIBCMT ref: 00401D50
                        • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                      • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                      • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                      • API String ID: 3809562944-243156785
                      • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                      • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                      • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                      • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                      • int.LIBCPMT ref: 00410E81
                        • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                        • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                      • std::_Facet_Register.LIBCPMT ref: 00410EC1
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                      • __Init_thread_footer.LIBCMT ref: 00410F29
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                      • String ID: ,kG$0kG
                      • API String ID: 3815856325-2015055088
                      • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                      • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                      • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                      • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                      APIs
                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                      • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                      • waveInStart.WINMM ref: 00401CFE
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                      • String ID: dMG$|MG$PG
                      • API String ID: 1356121797-532278878
                      • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                      • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                      • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                      • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                        • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                        • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                        • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                      • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                      • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                      • TranslateMessage.USER32(?), ref: 0041D4E9
                      • DispatchMessageA.USER32(?), ref: 0041D4F3
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                      • String ID: Remcos
                      • API String ID: 1970332568-165870891
                      • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                      • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                      • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                      • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                      • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                      • Opcode Fuzzy Hash: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                      • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • _memcmp.LIBVCRUNTIME ref: 00445423
                      • _free.LIBCMT ref: 00445494
                      • _free.LIBCMT ref: 004454AD
                      • _free.LIBCMT ref: 004454DF
                      • _free.LIBCMT ref: 004454E8
                      • _free.LIBCMT ref: 004454F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorLast$_abort_memcmp
                      • String ID: C
                      • API String ID: 1679612858-1037565863
                      • Opcode ID: 0768c3d9e3dd940518f99a63cbcd3aeb961d046fc1a72f364ae26972a0ea9dca
                      • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                      • Opcode Fuzzy Hash: 0768c3d9e3dd940518f99a63cbcd3aeb961d046fc1a72f364ae26972a0ea9dca
                      • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: tcp$udp
                      • API String ID: 0-3725065008
                      • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                      • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                      • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                      • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 004018BE
                      • ExitThread.KERNEL32 ref: 004018F6
                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                      • String ID: PkG$XMG$NG$NG
                      • API String ID: 1649129571-3151166067
                      • Opcode ID: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                      • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                      • Opcode Fuzzy Hash: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                      • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                      APIs
                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                        • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                        • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                      • String ID: .part
                      • API String ID: 1303771098-3499674018
                      • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                      • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                      • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                      • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                      • __alloca_probe_16.LIBCMT ref: 0044ACDB
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                      • __alloca_probe_16.LIBCMT ref: 0044ADC0
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                      • __freea.LIBCMT ref: 0044AE30
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • __freea.LIBCMT ref: 0044AE39
                      • __freea.LIBCMT ref: 0044AE5E
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                      • String ID:
                      • API String ID: 3864826663-0
                      • Opcode ID: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                      • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                      • Opcode Fuzzy Hash: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                      • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                      APIs
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                      • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: InputSend
                      • String ID:
                      • API String ID: 3431551938-0
                      • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                      • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                      • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                      • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16_free
                      • String ID: a/p$am/pm$zD
                      • API String ID: 2936374016-2723203690
                      • Opcode ID: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                      • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                      • Opcode Fuzzy Hash: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                      • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                      APIs
                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Enum$InfoQueryValue
                      • String ID: [regsplt]$xUG$TG
                      • API String ID: 3554306468-1165877943
                      • Opcode ID: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                      • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                      • Opcode Fuzzy Hash: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                      • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                      APIs
                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                      • __fassign.LIBCMT ref: 0044B479
                      • __fassign.LIBCMT ref: 0044B494
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                      • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                      • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                      • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                      • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: D[E$D[E
                      • API String ID: 269201875-3695742444
                      • Opcode ID: bc4a191701c62eeb9847f09c94d148ade9b95fc5d58c951cd89fb7ba37de2388
                      • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                      • Opcode Fuzzy Hash: bc4a191701c62eeb9847f09c94d148ade9b95fc5d58c951cd89fb7ba37de2388
                      • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                      APIs
                      • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                        • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                        • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumInfoOpenQuerysend
                      • String ID: xUG$NG$NG$TG
                      • API String ID: 3114080316-2811732169
                      • Opcode ID: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                      • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                      • Opcode Fuzzy Hash: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                      • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                      APIs
                        • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                        • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                        • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                      • _wcslen.LIBCMT ref: 0041B763
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                      • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                      • API String ID: 37874593-122982132
                      • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                      • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                      • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                      • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                      APIs
                        • Part of subcall function 004135A6: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 004135CA
                        • Part of subcall function 004135A6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 004135E7
                        • Part of subcall function 004135A6: RegCloseKey.KERNELBASE(?), ref: 004135F2
                      • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                      • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                      • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                      • API String ID: 1133728706-4073444585
                      • Opcode ID: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                      • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                      • Opcode Fuzzy Hash: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                      • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                      • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                      • Opcode Fuzzy Hash: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                      • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                      APIs
                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                      • CloseHandle.KERNEL32(00000000), ref: 0041C459
                      • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                      • CloseHandle.KERNEL32(00000000), ref: 0041C477
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreatePointerWrite
                      • String ID: hpF
                      • API String ID: 1852769593-151379673
                      • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                      • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                      • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                      • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                      APIs
                        • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                      • _free.LIBCMT ref: 00450F48
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00450F53
                      • _free.LIBCMT ref: 00450F5E
                      • _free.LIBCMT ref: 00450FB2
                      • _free.LIBCMT ref: 00450FBD
                      • _free.LIBCMT ref: 00450FC8
                      • _free.LIBCMT ref: 00450FD3
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                      • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                      • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                      • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                      • int.LIBCPMT ref: 00411183
                        • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                        • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                      • std::_Facet_Register.LIBCPMT ref: 004111C3
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                      • String ID: (mG
                      • API String ID: 2536120697-4059303827
                      • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                      • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                      • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                      • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                      APIs
                      • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                      • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: fe039640f614891bfb869f3d54459c43faa771a51d809113de29b3036e5dc2e7
                      • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                      • Opcode Fuzzy Hash: fe039640f614891bfb869f3d54459c43faa771a51d809113de29b3036e5dc2e7
                      • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                      APIs
                      • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe), ref: 004075D0
                        • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                        • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                      • CoUninitialize.OLE32 ref: 00407629
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: InitializeObjectUninitialize_wcslen
                      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                      • API String ID: 3851391207-1846269792
                      • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                      • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                      • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                      • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                      • GetLastError.KERNEL32 ref: 0040BAE7
                      Strings
                      • UserProfile, xrefs: 0040BAAD
                      • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                      • [Chrome Cookies not found], xrefs: 0040BB01
                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      • API String ID: 2018770650-304995407
                      • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                      • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                      • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                      • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                      APIs
                      • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                      • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                      • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$AllocOutputShowWindow
                      • String ID: Remcos v$5.1.0 Pro$CONOUT$
                      • API String ID: 2425139147-1043272453
                      • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                      • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                      • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                      • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                      APIs
                      • __allrem.LIBCMT ref: 0043AC69
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                      • __allrem.LIBCMT ref: 0043AC9C
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                      • __allrem.LIBCMT ref: 0043ACD1
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 1992179935-0
                      • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                      • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                      • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                      • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                      APIs
                      • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                        • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: H_prologSleep
                      • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                      • API String ID: 3469354165-3054508432
                      • Opcode ID: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                      • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                      • Opcode Fuzzy Hash: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                      • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                      APIs
                        • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                      • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                      • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                      • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                        • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                      • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                      • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                        • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                        • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                      • String ID:
                      • API String ID: 3950776272-0
                      • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                      • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                      • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                      • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: __cftoe
                      • String ID:
                      • API String ID: 4189289331-0
                      • Opcode ID: 3a22baf89f7933cc554f06987bfa64c005347e38fd474961e410d74fa9d433f0
                      • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                      • Opcode Fuzzy Hash: 3a22baf89f7933cc554f06987bfa64c005347e38fd474961e410d74fa9d433f0
                      • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                      • String ID:
                      • API String ID: 493672254-0
                      • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                      • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                      • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                      • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                      APIs
                      • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • _free.LIBCMT ref: 0044824C
                      • _free.LIBCMT ref: 00448274
                      • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • _abort.LIBCMT ref: 00448293
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: 35dcf3de7c71c62167c4cd53af3f8df7186468cbd06746618ca28f838e92064e
                      • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                      • Opcode Fuzzy Hash: 35dcf3de7c71c62167c4cd53af3f8df7186468cbd06746618ca28f838e92064e
                      • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                      • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                      • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                      • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                      • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                      • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                      • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                      • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                      • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                      • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                      • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                      • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                      APIs
                      • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                      • wsprintfW.USER32 ref: 0040B1F3
                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: EventLocalTimewsprintf
                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                      • API String ID: 1497725170-248792730
                      • Opcode ID: 5930b91d6002e4bc173ab4be93e7cb7fd053249898d40d7797ac70fa62357d50
                      • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                      • Opcode Fuzzy Hash: 5930b91d6002e4bc173ab4be93e7cb7fd053249898d40d7797ac70fa62357d50
                      • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                      • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                      • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseCreateHandleSizeSleep
                      • String ID: XQG
                      • API String ID: 1958988193-3606453820
                      • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                      • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                      • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                      • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                      APIs
                      • RegisterClassExA.USER32(00000030), ref: 0041D55B
                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                      • GetLastError.KERNEL32 ref: 0041D580
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ClassCreateErrorLastRegisterWindow
                      • String ID: 0$MsgWindowClass
                      • API String ID: 2877667751-2410386613
                      • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                      • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                      • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                      • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                      APIs
                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                      • CloseHandle.KERNEL32(?), ref: 004077AA
                      • CloseHandle.KERNEL32(?), ref: 004077AF
                      Strings
                      • C:\Windows\System32\cmd.exe, xrefs: 00407796
                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreateProcess
                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                      • API String ID: 2922976086-4183131282
                      • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                      • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                      • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                      • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                      Strings
                      • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe, xrefs: 004076C4
                      • SG, xrefs: 004076DA
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: SG$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                      • API String ID: 0-2960836648
                      • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                      • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                      • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                      • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                      • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                      • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                      • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                      • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                      • String ID: KeepAlive | Disabled
                      • API String ID: 2993684571-305739064
                      • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                      • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                      • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                      • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                      APIs
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                      • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                      • Sleep.KERNEL32(00002710), ref: 0041AE07
                      • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: PlaySound$HandleLocalModuleSleepTime
                      • String ID: Alarm triggered
                      • API String ID: 614609389-2816303416
                      • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                      • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                      • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                      • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                      APIs
                      • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                      • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                      Strings
                      • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$AttributeText$BufferHandleInfoScreen
                      • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                      • API String ID: 3024135584-2418719853
                      • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                      • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                      • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                      • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                      • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                      • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                      • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                      APIs
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • _free.LIBCMT ref: 00444E06
                      • _free.LIBCMT ref: 00444E1D
                      • _free.LIBCMT ref: 00444E3C
                      • _free.LIBCMT ref: 00444E57
                      • _free.LIBCMT ref: 00444E6E
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$AllocateHeap
                      • String ID:
                      • API String ID: 3033488037-0
                      • Opcode ID: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                      • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                      • Opcode Fuzzy Hash: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                      • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                      APIs
                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                      • _free.LIBCMT ref: 004493BD
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00449589
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                      • String ID:
                      • API String ID: 1286116820-0
                      • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                      • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                      • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                      • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                      APIs
                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                      • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                        • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                      • String ID:
                      • API String ID: 4269425633-0
                      • Opcode ID: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                      • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                      • Opcode Fuzzy Hash: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                      • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                      • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                      • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                      • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                      • __alloca_probe_16.LIBCMT ref: 004511B1
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                      • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                      • __freea.LIBCMT ref: 0045121D
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                      • String ID:
                      • API String ID: 313313983-0
                      • Opcode ID: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                      • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                      • Opcode Fuzzy Hash: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                      • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                      • _free.LIBCMT ref: 0044F3BF
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                      • String ID:
                      • API String ID: 336800556-0
                      • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                      • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                      • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                      • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                      APIs
                      • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                      • _free.LIBCMT ref: 004482D3
                      • _free.LIBCMT ref: 004482FA
                      • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                      • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: ce9cc6301b23d983ade5427f2db299c0b586cbcb428296df669d0de5b5bf801f
                      • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                      • Opcode Fuzzy Hash: ce9cc6301b23d983ade5427f2db299c0b586cbcb428296df669d0de5b5bf801f
                      • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                      APIs
                      • _free.LIBCMT ref: 004509D4
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 004509E6
                      • _free.LIBCMT ref: 004509F8
                      • _free.LIBCMT ref: 00450A0A
                      • _free.LIBCMT ref: 00450A1C
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                      • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                      • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                      • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                      APIs
                      • _free.LIBCMT ref: 00444066
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00444078
                      • _free.LIBCMT ref: 0044408B
                      • _free.LIBCMT ref: 0044409C
                      • _free.LIBCMT ref: 004440AD
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                      • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                      • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                      • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                      APIs
                      • _strpbrk.LIBCMT ref: 0044E738
                      • _free.LIBCMT ref: 0044E855
                        • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                        • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                        • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                      • String ID: *?$.
                      • API String ID: 2812119850-3972193922
                      • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                      • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                      • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                      • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                      APIs
                      • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                        • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                        • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateFileKeyboardLayoutNameconnectsend
                      • String ID: XQG$NG$PG
                      • API String ID: 1634807452-3565412412
                      • Opcode ID: 947ec9e57d3c7c0e40ae7c7d5bd58e9befcd0d1196b4417747cf782c3d5f7d46
                      • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                      • Opcode Fuzzy Hash: 947ec9e57d3c7c0e40ae7c7d5bd58e9befcd0d1196b4417747cf782c3d5f7d46
                      • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                      • String ID: `#D$`#D
                      • API String ID: 885266447-2450397995
                      • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                      • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                      • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                      • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe,00000104), ref: 00443475
                      • _free.LIBCMT ref: 00443540
                      • _free.LIBCMT ref: 0044354A
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exe
                      • API String ID: 2506810119-1723128490
                      • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                      • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                      • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                      • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                      • String ID: /sort "Visit Time" /stext "$0NG
                      • API String ID: 368326130-3219657780
                      • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                      • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                      • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                      • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                      APIs
                      • _wcslen.LIBCMT ref: 004162F5
                        • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                        • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                        • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                        • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcslen$CloseCreateValue
                      • String ID: !D@$okmode$PG
                      • API String ID: 3411444782-3370592832
                      • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                      • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                      • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                      • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                      APIs
                        • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                      Strings
                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                      • User Data\Default\Network\Cookies, xrefs: 0040C603
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                      • API String ID: 1174141254-1980882731
                      • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                      • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                      • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                      • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                      APIs
                        • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                      Strings
                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                      • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                      • API String ID: 1174141254-1980882731
                      • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                      • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                      • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                      • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                      • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
                      • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread$LocalTimewsprintf
                      • String ID: Offline Keylogger Started
                      • API String ID: 465354869-4114347211
                      • Opcode ID: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                      • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                      • Opcode Fuzzy Hash: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                      • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                      APIs
                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                      • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread$LocalTime$wsprintf
                      • String ID: Online Keylogger Started
                      • API String ID: 112202259-1258561607
                      • Opcode ID: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                      • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                      • Opcode Fuzzy Hash: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                      • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                      APIs
                      • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                      • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: CryptUnprotectData$crypt32
                      • API String ID: 2574300362-2380590389
                      • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                      • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                      • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                      • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                      • CloseHandle.KERNEL32(?), ref: 004051CA
                      • SetEvent.KERNEL32(?), ref: 004051D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandleObjectSingleWait
                      • String ID: Connection Timeout
                      • API String ID: 2055531096-499159329
                      • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                      • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                      • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                      • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8Throw
                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                      • API String ID: 2005118841-1866435925
                      • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                      • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                      • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                      • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                      APIs
                      • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                      • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                      • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: pth_unenc
                      • API String ID: 1818849710-4028850238
                      • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                      • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                      • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                      • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                        • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                        • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                      • String ID: bad locale name
                      • API String ID: 3628047217-1405518554
                      • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                      • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                      • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                      • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                      • ShowWindow.USER32(00000009), ref: 00416C61
                      • SetForegroundWindow.USER32 ref: 00416C6D
                        • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                        • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                        • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                      • String ID: !D@
                      • API String ID: 3446828153-604454484
                      • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                      • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                      • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                      • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: /C $cmd.exe$open
                      • API String ID: 587946157-3896048727
                      • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                      • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                      • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                      • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                      APIs
                      • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                      • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                      • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: TerminateThread$HookUnhookWindows
                      • String ID: pth_unenc
                      • API String ID: 3123878439-4028850238
                      • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                      • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                      • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                      • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                      APIs
                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                      • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: GetCursorInfo$User32.dll
                      • API String ID: 1646373207-2714051624
                      • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                      • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                      • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                      • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                      APIs
                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                      • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetLastInputInfo$User32.dll
                      • API String ID: 2574300362-1519888992
                      • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                      • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                      • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                      • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: __alldvrm$_strrchr
                      • String ID:
                      • API String ID: 1036877536-0
                      • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                      • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                      • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                      • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                      • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                      • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                      • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                      APIs
                      Strings
                      • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                      • Cleared browsers logins and cookies., xrefs: 0040C0F5
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                      • API String ID: 3472027048-1236744412
                      • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                      • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                      • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                      • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                      APIs
                        • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                        • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                        • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                      • Sleep.KERNEL32(000001F4), ref: 0040A573
                      • Sleep.KERNEL32(00000064), ref: 0040A5FD
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$SleepText$ForegroundLength
                      • String ID: [ $ ]
                      • API String ID: 3309952895-93608704
                      • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                      • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                      • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                      • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e504ac4fddb0f8a25c6be19684a152be264dadb57d82260706401bb5bc5fb7a8
                      • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                      • Opcode Fuzzy Hash: e504ac4fddb0f8a25c6be19684a152be264dadb57d82260706401bb5bc5fb7a8
                      • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 253450334f16ac4bada5e464aed069c53fdbe8794578123440a1a1ba72333804
                      • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                      • Opcode Fuzzy Hash: 253450334f16ac4bada5e464aed069c53fdbe8794578123440a1a1ba72333804
                      • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                      • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                      • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                      • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                      • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                      • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseCreateHandleReadSize
                      • String ID:
                      • API String ID: 3919263394-0
                      • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                      • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                      • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                      • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                      APIs
                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandleOpenProcess
                      • String ID:
                      • API String ID: 39102293-0
                      • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                      • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                      • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                      • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                      APIs
                      • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                        • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                      • _UnwindNestedFrames.LIBCMT ref: 00439891
                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                      • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                      • String ID:
                      • API String ID: 2633735394-0
                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                      • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                      • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                      APIs
                      • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                      • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                      • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                      • GetSystemMetrics.USER32(0000004F), ref: 00419402
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: MetricsSystem
                      • String ID:
                      • API String ID: 4116985748-0
                      • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                      • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                      • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                      • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                      APIs
                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                        • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                      • String ID:
                      • API String ID: 1761009282-0
                      • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                      • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                      • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                      • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                      APIs
                      • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorHandling__start
                      • String ID: pow
                      • API String ID: 3213639722-2276729525
                      • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                      • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                      • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                      • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                      APIs
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      • __Init_thread_footer.LIBCMT ref: 0040B797
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Init_thread_footer__onexit
                      • String ID: [End of clipboard]$[Text copied to clipboard]
                      • API String ID: 1881088180-3686566968
                      • Opcode ID: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                      • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                      • Opcode Fuzzy Hash: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                      • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                      APIs
                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ACP$OCP
                      • API String ID: 0-711371036
                      • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                      • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                      • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                      • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                      APIs
                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 481472006-1507639952
                      • Opcode ID: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                      • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                      • Opcode Fuzzy Hash: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                      • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                      APIs
                      • Sleep.KERNEL32 ref: 00416640
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadFileSleep
                      • String ID: !D@
                      • API String ID: 1931167962-604454484
                      • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                      • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                      • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                      • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                      APIs
                      • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: | $%02i:%02i:%02i:%03i
                      • API String ID: 481472006-2430845779
                      • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                      • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                      • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                      • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: alarm.wav$hYG
                      • API String ID: 1174141254-2782910960
                      • Opcode ID: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                      • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                      • Opcode Fuzzy Hash: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                      • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                      APIs
                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • CloseHandle.KERNEL32(?), ref: 0040B0B4
                      • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                      • String ID: Online Keylogger Stopped
                      • API String ID: 1623830855-1496645233
                      • Opcode ID: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                      • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                      • Opcode Fuzzy Hash: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                      • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                      APIs
                      • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                      • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$BufferHeaderPrepare
                      • String ID: XMG
                      • API String ID: 2315374483-813777761
                      • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                      • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                      • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                      • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                      APIs
                      • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocaleValid
                      • String ID: IsValidLocaleName$JD
                      • API String ID: 1901932003-2234456777
                      • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                      • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                      • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                      • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                      • API String ID: 1174141254-4188645398
                      • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                      • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                      • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                      • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                      • API String ID: 1174141254-2800177040
                      • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                      • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                      • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                      • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: AppData$\Opera Software\Opera Stable\
                      • API String ID: 1174141254-1629609700
                      • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                      • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                      • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                      • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                      APIs
                      • GetKeyState.USER32(00000011), ref: 0040B64B
                        • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                        • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                        • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                        • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                        • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                        • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                        • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                      • String ID: [AltL]$[AltR]
                      • API String ID: 2738857842-2658077756
                      • Opcode ID: 812230f2851c1f53bb267e032c67d7b388825b52a5818c82693134c1319f806e
                      • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                      • Opcode Fuzzy Hash: 812230f2851c1f53bb267e032c67d7b388825b52a5818c82693134c1319f806e
                      • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                      APIs
                      • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                      • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: uD
                      • API String ID: 0-2547262877
                      • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                      • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                      • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                      • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: !D@$open
                      • API String ID: 587946157-1586967515
                      • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                      • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                      • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                      • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                      APIs
                      • GetKeyState.USER32(00000012), ref: 0040B6A5
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: State
                      • String ID: [CtrlL]$[CtrlR]
                      • API String ID: 1649606143-2446555240
                      • Opcode ID: 5066be23c52cfaa6c6245271f0373fbb1ceb4cf0ed24aba14fe9ece54d79b194
                      • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                      • Opcode Fuzzy Hash: 5066be23c52cfaa6c6245271f0373fbb1ceb4cf0ed24aba14fe9ece54d79b194
                      • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                      APIs
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      • __Init_thread_footer.LIBCMT ref: 00410F29
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Init_thread_footer__onexit
                      • String ID: ,kG$0kG
                      • API String ID: 1881088180-2015055088
                      • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                      • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                      • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                      • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                      • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteOpenValue
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                      • API String ID: 2654517830-1051519024
                      • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                      • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                      • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                      • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                      APIs
                      • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                      • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteDirectoryFileRemove
                      • String ID: pth_unenc
                      • API String ID: 3325800564-4028850238
                      • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                      • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                      • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                      • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                      APIs
                      • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                      • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ObjectProcessSingleTerminateWait
                      • String ID: pth_unenc
                      • API String ID: 1872346434-4028850238
                      • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                      • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                      • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                      • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                      • GetLastError.KERNEL32 ref: 00440D35
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 1717984340-0
                      • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                      • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                      • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                      • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                      APIs
                      • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                      • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                      • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                      • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                      Memory Dump Source
                      • Source File: 00000004.00000002.4506449942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastRead
                      • String ID:
                      • API String ID: 4100373531-0
                      • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                      • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                      • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                      • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99