Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OhWWbQcp7Q.exe

Overview

General Information

Sample name:OhWWbQcp7Q.exe
renamed because original name is a hash value
Original sample name:2b4e54af556badc27f08c9a966dd55f090f4a5ef8978793e0ba296b05ddfb242.exe
Analysis ID:1547535
MD5:00345de133a4d119eacc29fb87f648e9
SHA1:63b3f141071e71d39866d7a4bd204b2b8615080d
SHA256:2b4e54af556badc27f08c9a966dd55f090f4a5ef8978793e0ba296b05ddfb242
Tags:cdt2023-ddns-netexeuser-JAMESWT_MHT
Infos:

Detection

AveMaria, UACMe
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AveMaria stealer
Yara detected UACMe UAC Bypass tool
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to create new users
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • OhWWbQcp7Q.exe (PID: 6892 cmdline: "C:\Users\user\Desktop\OhWWbQcp7Q.exe" MD5: 00345DE133A4D119EACC29FB87F648E9)
    • images.exe (PID: 3760 cmdline: "C:\ProgramData\images.exe" MD5: 00345DE133A4D119EACC29FB87F648E9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Ave Maria, AveMariaRAT, avemariaInformation stealer which uses AutoIT for wrapping.
  • Anunak
https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria
NameDescriptionAttributionBlogpost URLsLink
UACMeA toolkit maintained by hfiref0x which incorporates numerous UAC bypass techniques for Windows 7 - Windows 10. Typically, components of this tool are stripped out and reused by malicious actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.uacme
{"C2 url": "chromedata.accesscam.org", "port": 5221, "Proxy Port": 26368}
SourceRuleDescriptionAuthorStrings
OhWWbQcp7Q.exeJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
    OhWWbQcp7Q.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      OhWWbQcp7Q.exeJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
        OhWWbQcp7Q.exeWindows_Trojan_AveMaria_31d2bce9unknownunknown
        • 0x16630:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
        • 0x14e78:$a2: SMTP Password
        • 0x140b8:$a3: select signon_realm, origin_url, username_value, password_value from logins
        • 0x191f0:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        • 0x16538:$a5: for /F "usebackq tokens=*" %%A in ("
        • 0x148a8:$a6: \Torch\User Data\Default\Login Data
        • 0x19310:$a7: /n:%temp%\ellocnak.xml
        • 0x15414:$a8: "os_crypt":{"encrypted_key":"
        • 0x19340:$a9: Hey I'm Admin
        • 0x14d40:$a10: \logins.json
        • 0x1538c:$a11: Accounts\Account.rec0
        • 0x13c50:$a12: warzone160
        • 0x162e0:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
        OhWWbQcp7Q.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x144e8:$a1: \Opera Software\Opera Stable\Login Data
        • 0x14810:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x14158:$a3: \Google\Chrome\User Data\Default\Login Data
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        C:\ProgramData\images.exeJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
          C:\ProgramData\images.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            C:\ProgramData\images.exeJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
              C:\ProgramData\images.exeWindows_Trojan_AveMaria_31d2bce9unknownunknown
              • 0x16630:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
              • 0x14e78:$a2: SMTP Password
              • 0x140b8:$a3: select signon_realm, origin_url, username_value, password_value from logins
              • 0x191f0:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
              • 0x16538:$a5: for /F "usebackq tokens=*" %%A in ("
              • 0x148a8:$a6: \Torch\User Data\Default\Login Data
              • 0x19310:$a7: /n:%temp%\ellocnak.xml
              • 0x15414:$a8: "os_crypt":{"encrypted_key":"
              • 0x19340:$a9: Hey I'm Admin
              • 0x14d40:$a10: \logins.json
              • 0x1538c:$a11: Accounts\Account.rec0
              • 0x13c50:$a12: warzone160
              • 0x162e0:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
              C:\ProgramData\images.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x144e8:$a1: \Opera Software\Opera Stable\Login Data
              • 0x14810:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x14158:$a3: \Google\Chrome\User Data\Default\Login Data
              Click to see the 4 entries
              SourceRuleDescriptionAuthorStrings
              00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                00000000.00000000.1665942039.00000000002FF000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                  00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                    00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
                        Click to see the 64 entries
                        SourceRuleDescriptionAuthorStrings
                        1.3.images.exe.123c3b8.7.raw.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                          1.3.images.exe.123c3b8.7.raw.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
                          • 0xd80:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
                          0.3.OhWWbQcp7Q.exe.8151c0.7.raw.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                            0.3.OhWWbQcp7Q.exe.8151c0.7.raw.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
                            • 0x2318:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
                            1.3.images.exe.123c3b8.0.raw.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                              Click to see the 65 entries

                              System Summary

                              barindex
                              Source: Registry Key setAuthor: frack113: Data: Details: 10, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\OhWWbQcp7Q.exe, ProcessId: 6892, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\MaxConnectionsPer1_0Server
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2024-11-02T16:56:32.628540+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449733TCP
                              2024-11-02T16:57:12.782068+010020229301A Network Trojan was detected172.202.163.200443192.168.2.464519TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: OhWWbQcp7Q.exeAvira: detected
                              Source: C:\ProgramData\images.exeAvira: detection malicious, Label: TR/Redcap.ghjpt
                              Source: OhWWbQcp7Q.exeMalware Configuration Extractor: AveMaria {"C2 url": "chromedata.accesscam.org", "port": 5221, "Proxy Port": 26368}
                              Source: C:\ProgramData\images.exeReversingLabs: Detection: 89%
                              Source: OhWWbQcp7Q.exeReversingLabs: Detection: 89%
                              Source: Yara matchFile source: OhWWbQcp7Q.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.3.images.exe.12009a0.9.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702165776.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\ProgramData\images.exe, type: DROPPED
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                              Source: C:\ProgramData\images.exeJoe Sandbox ML: detected
                              Source: OhWWbQcp7Q.exeJoe Sandbox ML: detected
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BB15E lstrlenA,CryptStringToBinaryA,lstrcpyA,0_2_001BB15E
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BCAFC CryptUnprotectData,LocalAlloc,LocalFree,0_2_001BCAFC
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BCC54 CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,0_2_001BCC54
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BCCB4 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,0_2_001BCCB4
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BA632 RegQueryValueExW,GlobalAlloc,CryptUnprotectData,lstrcpyW,0_2_001BA632
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BCF58 LocalAlloc,BCryptDecrypt,LocalFree,0_2_001BCF58
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067B15E lstrlenA,CryptStringToBinaryA,lstrcpyA,1_2_0067B15E
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067CAFC CryptUnprotectData,LocalAlloc,LocalFree,1_2_0067CAFC
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067CC54 CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,1_2_0067CC54
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067CCB4 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,1_2_0067CCB4
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067A632 RegQueryValueExW,GlobalAlloc,CryptUnprotectData,lstrcpyW,1_2_0067A632
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067CF58 LocalAlloc,BCryptDecrypt,LocalFree,1_2_0067CF58

                              Exploits

                              barindex
                              Source: Yara matchFile source: OhWWbQcp7Q.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.3.images.exe.123c3b8.7.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.8151c0.7.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.3.images.exe.123c3b8.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.3417490.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.3.images.exe.1203b38.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.816758.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.8134d8.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.3.images.exe.123c3b8.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.813950.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.2962490.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.816758.6.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.82b948.12.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.82b948.16.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.8151c0.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.82b948.14.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.3.OhWWbQcp7Q.exe.8151c0.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1665942039.00000000002FF000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682866444.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000000.1683394560.00000000007BF000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682769402.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: OhWWbQcp7Q.exe PID: 6892, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: images.exe PID: 3760, type: MEMORYSTR
                              Source: Yara matchFile source: C:\ProgramData\images.exe, type: DROPPED
                              Source: OhWWbQcp7Q.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
                              Source: OhWWbQcp7Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B9DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,0_2_001B9DF6
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BFF27 FindFirstFileW,FindNextFileW,0_2_001BFF27
                              Source: C:\ProgramData\images.exeCode function: 1_2_00679DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,1_2_00679DF6
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067FF27 FindFirstFileW,FindNextFileW,1_2_0067FF27
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C002B GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,0_2_001C002B

                              Networking

                              barindex
                              Source: Malware configuration extractorURLs: chromedata.accesscam.org
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B27D3 URLDownloadToFileW,ShellExecuteW,0_2_001B27D3
                              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 128.90.129.125:5221
                              Source: Joe Sandbox ViewIP Address: 128.90.129.125 128.90.129.125
                              Source: Joe Sandbox ViewASN Name: PHMGMT-AS1US PHMGMT-AS1US
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:64519
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49733
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BD0A3 recv,0_2_001BD0A3
                              Source: global trafficDNS traffic detected: DNS query: chromedata.accesscam.org
                              Source: OhWWbQcp7Q.exe, images.exeString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeper
                              Source: OhWWbQcp7Q.exe, images.exe.0.drString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B89D5 GetAsyncKeyState,wsprintfW,GetAsyncKeyState,wsprintfW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyNameTextW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,CallNextHookEx,0_2_001B89D5
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B902E DefWindowProcA,GetRawInputData,GetRawInputData,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrcpyW,CreateFileW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,CloseHandle,PostQuitMessage,RegisterRawInputDevices,0_2_001B902E

                              E-Banking Fraud

                              barindex
                              Source: Yara matchFile source: OhWWbQcp7Q.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.3.images.exe.12009a0.9.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702165776.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\ProgramData\images.exe, type: DROPPED

                              System Summary

                              barindex
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: AveMaria_WarZone Author: unknown
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                              Source: 1.3.images.exe.123c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.8151c0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.3.images.exe.123c3b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.2.images.exe.3417490.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.3.images.exe.1203b38.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.816758.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.8134d8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.3.images.exe.123c3b8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.813950.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.2.OhWWbQcp7Q.exe.2962490.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.816758.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.82b948.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.82b948.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.3.images.exe.12009a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: 0.3.OhWWbQcp7Q.exe.8151c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.82b948.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.3.OhWWbQcp7Q.exe.8151c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                              Source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: AveMaria_WarZone Author: unknown
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C1BF80_2_001C1BF8
                              Source: C:\ProgramData\images.exeCode function: 1_2_00681BF81_2_00681BF8
                              Source: C:\ProgramData\images.exeCode function: String function: 006735E5 appears 40 times
                              Source: C:\ProgramData\images.exeCode function: String function: 00680969 appears 38 times
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: String function: 001B35E5 appears 40 times
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: String function: 001C0969 appears 38 times
                              Source: OhWWbQcp7Q.exeStatic PE information: Resource name: WM_DSP type: PE32 executable (GUI) Intel 80386, for MS Windows
                              Source: images.exe.0.drStatic PE information: Resource name: WM_DSP type: PE32 executable (GUI) Intel 80386, for MS Windows
                              Source: OhWWbQcp7Q.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: OhWWbQcp7Q.exe, type: SAMPLEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                              Source: 1.3.images.exe.123c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.8151c0.7.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.3.images.exe.123c3b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.2.images.exe.3417490.3.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.3.images.exe.1203b38.3.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.816758.4.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.8134d8.0.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.3.images.exe.123c3b8.5.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.813950.2.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.2.OhWWbQcp7Q.exe.2962490.2.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.816758.6.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.82b948.12.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.82b948.16.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.3.images.exe.12009a0.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: 0.3.OhWWbQcp7Q.exe.8151c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.82b948.14.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.3.OhWWbQcp7Q.exe.8151c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                              Source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                              Source: C:\ProgramData\images.exe, type: DROPPEDMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                              Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winEXE@3/2@1/1
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BF619 OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_001BF619
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067F619 OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,1_2_0067F619
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C20B8 RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_001C20B8
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C290F CoInitialize,CoCreateInstance,VariantInit,CoUninitialize,0_2_001C290F
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C30B3 LoadResource,SizeofResource,LockResource,GetTempPathA,GetTempPathA,lstrcatA,lstrcatA,GetTempPathA,lstrcatA,CreateFileA,WriteFile,CloseHandle,wsprintfA,ShellExecuteExA,0_2_001C30B3
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BD49C OpenSCManagerW,OpenServiceW,CloseServiceHandle,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_001BD49C
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeFile created: C:\Program Files\Microsoft DN1Jump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeFile created: C:\Users\user\AppData\Local\Microsoft Vision\Jump to behavior
                              Source: C:\ProgramData\images.exeMutant created: NULL
                              Source: OhWWbQcp7Q.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: OhWWbQcp7Q.exeReversingLabs: Detection: 89%
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeFile read: C:\Users\user\Desktop\OhWWbQcp7Q.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\OhWWbQcp7Q.exe "C:\Users\user\Desktop\OhWWbQcp7Q.exe"
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeProcess created: C:\ProgramData\images.exe "C:\ProgramData\images.exe"
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeProcess created: C:\ProgramData\images.exe "C:\ProgramData\images.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: devenum.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: devobj.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: msdmo.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: avicap32.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: msvfw32.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: devenum.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: devobj.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: msdmo.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: avicap32.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: msvfw32.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\ProgramData\images.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
                              Source: OhWWbQcp7Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: OhWWbQcp7Q.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BFA42 LoadLibraryA,GetProcAddress,0_2_001BFA42
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B1190 push eax; ret 0_2_001B11A4
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B1190 push eax; ret 0_2_001B11CC
                              Source: C:\ProgramData\images.exeCode function: 1_2_006739DF push C3C18B00h; retn 0004h1_2_006739EF
                              Source: C:\ProgramData\images.exeCode function: 1_2_00671190 push eax; ret 1_2_006711A4
                              Source: C:\ProgramData\images.exeCode function: 1_2_00671190 push eax; ret 1_2_006711CC
                              Source: C:\ProgramData\images.exeCode function: 1_2_00673D40 push C3C18B00h; retn 0004h1_2_00673D46
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BD418 NetUserAdd,NetLocalGroupAddMembers,0_2_001BD418
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B27D3 URLDownloadToFileW,ShellExecuteW,0_2_001B27D3
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeFile created: C:\ProgramData\images.exeJump to dropped file
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeFile created: C:\ProgramData\images.exeJump to dropped file
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BAC0A lstrcatW,GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,0_2_001BAC0A
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BA6C8 GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,0_2_001BA6C8
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067AC0A lstrcatW,GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,1_2_0067AC0A
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067A6C8 GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,1_2_0067A6C8
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BD508 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,GetLastError,Sleep,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_001BD508

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: OhWWbQcp7Q.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe, 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe, 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe, 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe, 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe, 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe, 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe, 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: OhWWbQcp7Q.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: OhWWbQcp7Q.exeString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: images.exe.0.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: images.exe.0.drString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeFile opened: C:\ProgramData\images.exe:Zone.Identifier read attributes | deleteJump to behavior
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: OpenSCManagerW,EnumServicesStatusExW,EnumServicesStatusExW,GetLastError,CloseServiceHandle,OpenSCManagerW,lstrcmpW,0_2_001BDA5B
                              Source: C:\ProgramData\images.exeCode function: OpenSCManagerW,EnumServicesStatusExW,EnumServicesStatusExW,GetLastError,CloseServiceHandle,OpenSCManagerW,lstrcmpW,1_2_0067DA5B
                              Source: C:\ProgramData\images.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_1-11921
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-11615
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exe TID: 3668Thread sleep count: 60 > 30Jump to behavior
                              Source: C:\ProgramData\images.exe TID: 3684Thread sleep count: 60 > 30Jump to behavior
                              Source: C:\ProgramData\images.exe TID: 3684Thread sleep time: -95000s >= -30000sJump to behavior
                              Source: C:\ProgramData\images.exeLast function: Thread delayed
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B9DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,0_2_001B9DF6
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BFF27 FindFirstFileW,FindNextFileW,0_2_001BFF27
                              Source: C:\ProgramData\images.exeCode function: 1_2_00679DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,1_2_00679DF6
                              Source: C:\ProgramData\images.exeCode function: 1_2_0067FF27 FindFirstFileW,FindNextFileW,1_2_0067FF27
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C002B GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,0_2_001C002B
                              Source: OhWWbQcp7Q.exe, 00000000.00000003.1684918601.0000000000808000.00000004.00000020.00020000.00000000.sdmp, OhWWbQcp7Q.exe, 00000000.00000003.1685008470.000000000080F000.00000004.00000020.00020000.00000000.sdmp, OhWWbQcp7Q.exe, 00000000.00000003.1682968555.0000000000808000.00000004.00000020.00020000.00000000.sdmp, OhWWbQcp7Q.exe, 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, OhWWbQcp7Q.exe, 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, OhWWbQcp7Q.exe, 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, images.exe, 00000001.00000003.1702302574.000000000120B000.00000004.00000020.00020000.00000000.sdmp, images.exe, 00000001.00000003.1702165776.000000000120B000.00000004.00000020.00020000.00000000.sdmp, images.exe, 00000001.00000003.1702087810.000000000120B000.00000004.00000020.00020000.00000000.sdmp, images.exe, 00000001.00000002.2923231738.000000000120B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeAPI call chain: ExitProcess graph end nodegraph_0-8560
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeAPI call chain: ExitProcess graph end nodegraph_0-10463
                              Source: C:\ProgramData\images.exeAPI call chain: ExitProcess graph end nodegraph_1-8935
                              Source: C:\ProgramData\images.exeAPI call chain: ExitProcess graph end nodegraph_1-10834
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BFA42 LoadLibraryA,GetProcAddress,0_2_001BFA42
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C094E mov eax, dword ptr fs:[00000030h]0_2_001C094E
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C0619 mov eax, dword ptr fs:[00000030h]0_2_001C0619
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C0620 mov eax, dword ptr fs:[00000030h]0_2_001C0620
                              Source: C:\ProgramData\images.exeCode function: 1_2_0068094E mov eax, dword ptr fs:[00000030h]1_2_0068094E
                              Source: C:\ProgramData\images.exeCode function: 1_2_00680620 mov eax, dword ptr fs:[00000030h]1_2_00680620
                              Source: C:\ProgramData\images.exeCode function: 1_2_00680619 mov eax, dword ptr fs:[00000030h]1_2_00680619
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B1085 GetProcessHeap,RtlAllocateHeap,0_2_001B1085

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B79E8 OpenProcess,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,0_2_001B79E8
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C1FD8 RegSetValueExA,OpenProcess,GetCurrentProcessId,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,0_2_001C1FD8
                              Source: C:\ProgramData\images.exeCode function: 1_2_006779E8 OpenProcess,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,1_2_006779E8
                              Source: C:\ProgramData\images.exeCode function: 1_2_00681FD8 RegSetValueExA,OpenProcess,GetCurrentProcessId,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,1_2_00681FD8
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, explorer.exe0_2_001C20B8
                              Source: C:\ProgramData\images.exeCode function: RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, explorer.exe1_2_006820B8
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001C18BA InitializeSecurityDescriptor,SetSecurityDescriptorDacl,RegCreateKeyExA,RegCloseKey,SetLastError,0_2_001C18BA
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BF56D AllocateAndInitializeSid,LookupAccountSidW,GetLastError,FreeSid,0_2_001BF56D
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001BF93F cpuid 0_2_001BF93F
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: 0_2_001B882F GetModuleHandleA,SHGetFolderPathW,lstrcatW,lstrcatW,GetLocalTime,wsprintfW,lstrcatW,CreateFileW,CloseHandle,GetMessageA,TranslateMessage,DispatchMessageA,GetMessageA,0_2_001B882F

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings MaxConnectionsPerServer 10Jump to behavior

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: OhWWbQcp7Q.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.3.images.exe.12009a0.9.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702165776.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\ProgramData\images.exe, type: DROPPED
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: \Google\Chrome\User Data\Default\Login Data0_2_001BC1B2
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: \Chromium\User Data\Default\Login Data0_2_001BC1B2
                              Source: C:\ProgramData\images.exeCode function: \Google\Chrome\User Data\Default\Login Data1_2_0067C1B2
                              Source: C:\ProgramData\images.exeCode function: \Chromium\User Data\Default\Login Data1_2_0067C1B2
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: POP3 Password0_2_001BA29A
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: SMTP Password0_2_001BA29A
                              Source: C:\Users\user\Desktop\OhWWbQcp7Q.exeCode function: IMAP Password0_2_001BA29A
                              Source: C:\ProgramData\images.exeCode function: POP3 Password1_2_0067A29A
                              Source: C:\ProgramData\images.exeCode function: SMTP Password1_2_0067A29A
                              Source: C:\ProgramData\images.exeCode function: IMAP Password1_2_0067A29A
                              Source: Yara matchFile source: OhWWbQcp7Q.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: OhWWbQcp7Q.exe PID: 6892, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: images.exe PID: 3760, type: MEMORYSTR
                              Source: Yara matchFile source: C:\ProgramData\images.exe, type: DROPPED

                              Remote Access Functionality

                              barindex
                              Source: Yara matchFile source: OhWWbQcp7Q.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.3.images.exe.12009a0.9.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.OhWWbQcp7Q.exe.1b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.0.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.images.exe.670000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702165776.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\ProgramData\images.exe, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                              Native API
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              1
                              Deobfuscate/Decode Files or Information
                              2
                              OS Credential Dumping
                              1
                              System Time Discovery
                              Remote Services1
                              Archive Collected Data
                              21
                              Ingress Tool Transfer
                              Exfiltration Over Other Network Medium1
                              Endpoint Denial of Service
                              CredentialsDomainsDefault Accounts2
                              Service Execution
                              1
                              Create Account
                              1
                              Access Token Manipulation
                              2
                              Obfuscated Files or Information
                              21
                              Input Capture
                              1
                              System Service Discovery
                              Remote Desktop Protocol21
                              Input Capture
                              2
                              Encrypted Channel
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain AccountsAt1
                              Windows Service
                              1
                              Windows Service
                              1
                              DLL Side-Loading
                              1
                              Credentials In Files
                              2
                              File and Directory Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Standard Port
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook111
                              Process Injection
                              3
                              Masquerading
                              NTDS12
                              System Information Discovery
                              Distributed Component Object ModelInput Capture1
                              Non-Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                              Virtualization/Sandbox Evasion
                              LSA Secrets111
                              Security Software Discovery
                              SSHKeylogging11
                              Application Layer Protocol
                              Scheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                              Access Token Manipulation
                              Cached Domain Credentials1
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                              Process Injection
                              DCSync1
                              Process Discovery
                              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                              Hidden Files and Directories
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Hidden Users
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              OhWWbQcp7Q.exe89%ReversingLabsWin32.Backdoor.Remcos
                              OhWWbQcp7Q.exe100%AviraTR/Redcap.ghjpt
                              OhWWbQcp7Q.exe100%Joe Sandbox ML
                              SourceDetectionScannerLabelLink
                              C:\ProgramData\images.exe100%AviraTR/Redcap.ghjpt
                              C:\ProgramData\images.exe100%Joe Sandbox ML
                              C:\ProgramData\images.exe89%ReversingLabsWin32.Backdoor.Remcos
                              No Antivirus matches
                              No Antivirus matches
                              No Antivirus matches
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              chromedata.accesscam.org
                              128.90.129.125
                              truetrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                chromedata.accesscam.orgtrue
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://github.com/syohex/java-simple-mine-sweeperC:OhWWbQcp7Q.exe, images.exe.0.drfalse
                                    unknown
                                    https://github.com/syohex/java-simple-mine-sweeperOhWWbQcp7Q.exe, images.exefalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      128.90.129.125
                                      chromedata.accesscam.orgUnited States
                                      22363PHMGMT-AS1UStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1547535
                                      Start date and time:2024-11-02 16:55:19 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 29s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:6
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:OhWWbQcp7Q.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:2b4e54af556badc27f08c9a966dd55f090f4a5ef8978793e0ba296b05ddfb242.exe
                                      Detection:MAL
                                      Classification:mal100.phis.troj.spyw.expl.evad.winEXE@3/2@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 65
                                      • Number of non-executed functions: 175
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • VT rate limit hit for: OhWWbQcp7Q.exe
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      128.90.129.125uVyl5BbR2M.exeGet hashmaliciousAsyncRATBrowse
                                        ahMvIr4vjN.exeGet hashmaliciousAsyncRATBrowse
                                          WlewaiA251.exeGet hashmaliciousAsyncRATBrowse
                                            meORoynQKS.exeGet hashmaliciousArrowRATBrowse
                                              OeyoNPTUuj.exeGet hashmaliciousAsyncRATBrowse
                                                NUO7hWbWCz.exeGet hashmaliciousAsyncRATBrowse
                                                  nRfBYvq4io.exeGet hashmaliciousAsyncRATBrowse
                                                    uqBq7FwS83.exeGet hashmaliciousAsyncRATBrowse
                                                      YTrJ5NViJC.exeGet hashmaliciousNjratBrowse
                                                        XprhPg52TO.exeGet hashmaliciousAsyncRATBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          chromedata.accesscam.orguVyl5BbR2M.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          ahMvIr4vjN.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          WlewaiA251.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          meORoynQKS.exeGet hashmaliciousArrowRATBrowse
                                                          • 128.90.129.125
                                                          OeyoNPTUuj.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          NUO7hWbWCz.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          nRfBYvq4io.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          uqBq7FwS83.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          YTrJ5NViJC.exeGet hashmaliciousNjratBrowse
                                                          • 128.90.129.125
                                                          XprhPg52TO.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          PHMGMT-AS1USuVyl5BbR2M.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          ahMvIr4vjN.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          WlewaiA251.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          meORoynQKS.exeGet hashmaliciousArrowRATBrowse
                                                          • 128.90.129.125
                                                          OeyoNPTUuj.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          NUO7hWbWCz.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          nRfBYvq4io.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          uqBq7FwS83.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          YTrJ5NViJC.exeGet hashmaliciousNjratBrowse
                                                          • 128.90.129.125
                                                          XprhPg52TO.exeGet hashmaliciousAsyncRATBrowse
                                                          • 128.90.129.125
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\OhWWbQcp7Q.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):115712
                                                          Entropy (8bit):6.376207291854624
                                                          Encrypted:false
                                                          SSDEEP:1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0
                                                          MD5:00345DE133A4D119EACC29FB87F648E9
                                                          SHA1:63B3F141071E71D39866D7A4BD204B2B8615080D
                                                          SHA-256:2B4E54AF556BADC27F08C9A966DD55F090F4A5EF8978793E0BA296B05DDFB242
                                                          SHA-512:F44554716CA9B88EF9823508947B9756774C93888308FC4AAD892DB99CC3373E45013F7AD6D188FEF608404A9D94E22C79C6DAD6021AE3C7C3C6BCB21DB3824A
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: C:\ProgramData\images.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\ProgramData\images.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: C:\ProgramData\images.exe, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: C:\ProgramData\images.exe, Author: unknown
                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\ProgramData\images.exe, Author: Florian Roth
                                                          • Rule: AveMaria_WarZone, Description: unknown, Source: C:\ProgramData\images.exe, Author: unknown
                                                          • Rule: Codoso_Gh0st_2, Description: Detects Codoso APT Gh0st Malware, Source: C:\ProgramData\images.exe, Author: Florian Roth
                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via IExecuteCommand COM object, Source: C:\ProgramData\images.exe, Author: ditekSHen
                                                          • Rule: MALWARE_Win_WarzoneRAT, Description: Detects AveMaria/WarzoneRAT, Source: C:\ProgramData\images.exe, Author: ditekSHen
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 89%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z]..><..><..><...3.?<..7D..?<...3.<<......?<......=<..;0..?<..7D..:<..7D..!<..><...<...U..N<...Um.?<...U..?<..Rich><..........PE..L.....I_.................0...........\.......@....@..........................@............@..................................w..........p,................... .......u...............................................@..p............................text............0.................. ..`.rdata...I...@...J...4..............@..@.data....P...........~..............@....rsrc...p,..........................@..@.reloc....... ......................@..B.bss.........0......................@..@................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\OhWWbQcp7Q.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):6.376207291854624
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:OhWWbQcp7Q.exe
                                                          File size:115'712 bytes
                                                          MD5:00345de133a4d119eacc29fb87f648e9
                                                          SHA1:63b3f141071e71d39866d7a4bd204b2b8615080d
                                                          SHA256:2b4e54af556badc27f08c9a966dd55f090f4a5ef8978793e0ba296b05ddfb242
                                                          SHA512:f44554716ca9b88ef9823508947b9756774c93888308fc4aad892db99cc3373e45013f7ad6d188fef608404a9d94e22c79c6dad6021ae3c7c3c6bcb21db3824a
                                                          SSDEEP:1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0
                                                          TLSH:CDB39E13F7E54835F3B201B01ABD7E7ACBEDF9700528849FA394858A2D31946E925357
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z]..><..><..><...3..?<..7D..?<...3..<<......?<......=<..;0..?<..7D..:<..7D..!<..><...<...U..N<...Um.?<...U..?<..Rich><.........
                                                          Icon Hash:90cececece8e8eb0
                                                          Entrypoint:0x405ce2
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x5F49FB9C [Sat Aug 29 06:54:20 2020 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:51a1d638436da72d7fa5fb524e02d427
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 44h
                                                          push esi
                                                          call dword ptr [004141E8h]
                                                          mov ecx, eax
                                                          mov al, byte ptr [ecx]
                                                          cmp al, 22h
                                                          jne 00007F6EC47B595Ah
                                                          inc ecx
                                                          mov dl, byte ptr [ecx]
                                                          test dl, dl
                                                          je 00007F6EC47B5943h
                                                          mov al, dl
                                                          mov dl, al
                                                          cmp al, 22h
                                                          je 00007F6EC47B593Bh
                                                          inc ecx
                                                          mov dl, byte ptr [ecx]
                                                          mov al, dl
                                                          test dl, dl
                                                          jne 00007F6EC47B5923h
                                                          lea eax, dword ptr [ecx+01h]
                                                          cmp dl, 00000022h
                                                          cmovne eax, ecx
                                                          mov ecx, eax
                                                          jmp 00007F6EC47B5940h
                                                          inc ecx
                                                          mov al, byte ptr [ecx]
                                                          cmp al, 20h
                                                          jnle 00007F6EC47B592Bh
                                                          jmp 00007F6EC47B5939h
                                                          cmp al, 20h
                                                          jnle 00007F6EC47B5939h
                                                          inc ecx
                                                          mov al, byte ptr [ecx]
                                                          test al, al
                                                          jne 00007F6EC47B5927h
                                                          and dword ptr [ebp-18h], 00000000h
                                                          lea eax, dword ptr [ebp-44h]
                                                          push eax
                                                          call dword ptr [00414140h]
                                                          call 00007F6EC47B5962h
                                                          mov edx, 0041902Ch
                                                          mov ecx, 00419000h
                                                          call 00007F6EC47B5980h
                                                          push 00000000h
                                                          call dword ptr [004141ECh]
                                                          push ecx
                                                          push ecx
                                                          call 00007F6EC47C3009h
                                                          mov esi, eax
                                                          call 00007F6EC47B5952h
                                                          push esi
                                                          call dword ptr [004141F0h]
                                                          int3
                                                          mov dword ptr [0054DB64h], 00000020h
                                                          call 00007F6EC47B5844h
                                                          mov dword ptr [0054D0E4h], eax
                                                          ret
                                                          mov eax, dword ptr [0054E01Ch]
                                                          test eax, eax
                                                          je 00007F6EC47B5940h
                                                          mov ecx, dword ptr [0054D0E4h]
                                                          lea edx, dword ptr [ecx+eax*4]
                                                          jmp 00007F6EC47B5936h
                                                          ret
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          mov edi, ecx
                                                          mov esi, edx
                                                          sub esi, edi
                                                          xor eax, eax
                                                          add esi, 00000000h
                                                          Programming Language:
                                                          • [C++] VS2008 SP1 build 30729
                                                          • [ C ] VS2005 build 50727
                                                          • [C++] VS2005 build 50727
                                                          • [ASM] VS2003 (.NET) build 3077
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1771c0x118.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x14f0000x2c70.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1520000xfa8.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x175a00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x140000x370.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x12eab0x130006dbe7c9f7981297db465fd69821e1c4bFalse0.5748226768092105data6.494947391542317IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x140000x49ce0x4a001271925bf242f5dd778122d822dac6d9False0.40466638513513514data5.281541653463336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x190000x1350d80x6000e383bc5047fd3f1a7a5e78591f96b14False0.5709635416666666data4.992963293914077IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x14f0000x2c700x2e00cdd112e1df434d31179f9eee936b7ff7False0.32778532608695654data3.9587156670856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x1520000xfa80x1000d7f0f9f1a21533bcdc70c4c071cede21False0.83251953125data6.690653232264333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          .bss0x1530000x10000x20015d865d72d9e55ae7ffc4c8fda8f54a6False0.38671875data3.250905567420535IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          WM_DSP0x14f0700x2c00PE32 executable (GUI) Intel 80386, for MS WindowsEnglishIndia0.3400213068181818
                                                          DLLImport
                                                          bcrypt.dllBCryptSetProperty, BCryptGenerateSymmetricKey, BCryptOpenAlgorithmProvider, BCryptDecrypt
                                                          KERNEL32.dllHeapFree, VirtualAlloc, HeapReAlloc, VirtualQuery, TerminateThread, CreateThread, WriteProcessMemory, GetCurrentProcess, OpenProcess, GetWindowsDirectoryA, VirtualProtectEx, VirtualAllocEx, CreateRemoteThread, CreateProcessA, GetModuleHandleW, IsWow64Process, WriteFile, CreateFileW, LoadLibraryW, GetLocalTime, GetCurrentThreadId, GetCurrentProcessId, ReadFile, FindFirstFileA, GetBinaryTypeW, FindNextFileA, GetFullPathNameA, GetTempPathW, GetPrivateProfileStringW, CreateFileA, GlobalAlloc, GetCurrentDirectoryW, SetCurrentDirectoryW, GetFileSize, FreeLibrary, SetDllDirectoryW, GetFileSizeEx, LoadLibraryA, LocalFree, WaitForSingleObject, WaitForMultipleObjects, CreatePipe, PeekNamedPipe, DuplicateHandle, SetEvent, GetStartupInfoA, CreateEventA, GetModuleFileNameW, LoadResource, FindResourceW, GetComputerNameW, GlobalMemoryStatusEx, LoadLibraryExW, FindFirstFileW, FindNextFileW, SetFilePointer, GetLogicalDriveStringsW, DeleteFileW, CopyFileW, GetDriveTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, GetProcessHeap, ReleaseMutex, TerminateProcess, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, SizeofResource, VirtualProtect, GetSystemDirectoryW, LockResource, GetWindowsDirectoryW, Process32First, Process32Next, WinExec, GetTempPathA, HeapAlloc, lstrcmpW, GetTickCount, lstrcpyW, WideCharToMultiByte, lstrcpyA, Sleep, MultiByteToWideChar, GetCommandLineA, GetModuleHandleA, ExitProcess, CreateProcessW, lstrcatA, lstrcmpA, lstrlenA, ExpandEnvironmentStringsW, lstrlenW, CloseHandle, lstrcatW, GetLastError, VirtualFree, GetProcAddress, SetLastError, GetModuleFileNameA, CreateDirectoryW, LocalAlloc, CreateMutexA
                                                          USER32.dllGetKeyState, GetMessageA, DispatchMessageA, CreateWindowExW, CallNextHookEx, GetAsyncKeyState, RegisterClassW, GetRawInputData, MapVirtualKeyA, DefWindowProcA, RegisterRawInputDevices, TranslateMessage, GetForegroundWindow, GetKeyNameTextW, PostQuitMessage, MessageBoxA, GetLastInputInfo, wsprintfW, GetWindowTextW, wsprintfA, ToUnicode
                                                          ADVAPI32.dllRegDeleteKeyW, RegCreateKeyExW, RegSetValueExA, RegDeleteValueW, LookupPrivilegeValueW, AdjustTokenPrivileges, AllocateAndInitializeSid, OpenProcessToken, InitializeSecurityDescriptor, RegDeleteKeyA, SetSecurityDescriptorDacl, RegOpenKeyExW, RegOpenKeyExA, RegEnumKeyExW, RegQueryValueExA, RegQueryInfoKeyW, RegCloseKey, OpenServiceW, ChangeServiceConfigW, QueryServiceConfigW, EnumServicesStatusExW, StartServiceW, RegSetValueExW, RegCreateKeyExA, OpenSCManagerW, CloseServiceHandle, GetTokenInformation, LookupAccountSidW, FreeSid, RegQueryValueExW
                                                          SHELL32.dllShellExecuteExA, ShellExecuteExW, SHGetSpecialFolderPathW, SHCreateDirectoryExW, ShellExecuteW, SHGetFolderPathW, SHGetKnownFolderPath
                                                          urlmon.dllURLDownloadToFileW
                                                          WS2_32.dllhtons, recv, connect, socket, send, WSAStartup, shutdown, closesocket, WSACleanup, InetNtopW, gethostbyname, inet_addr, getaddrinfo, setsockopt, freeaddrinfo
                                                          ole32.dllCoInitializeSecurity, CoCreateInstance, CoInitialize, CoUninitialize, CoTaskMemFree
                                                          SHLWAPI.dllStrStrW, PathRemoveFileSpecA, StrStrA, PathCombineA, PathFindFileNameW, PathFileExistsW, PathFindExtensionW
                                                          NETAPI32.dllNetLocalGroupAddMembers, NetUserAdd
                                                          OLEAUT32.dllVariantInit
                                                          CRYPT32.dllCryptUnprotectData, CryptStringToBinaryA, CryptStringToBinaryW
                                                          PSAPI.DLLGetModuleFileNameExW
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishIndia
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-11-02T16:56:32.628540+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449733TCP
                                                          2024-11-02T16:57:12.782068+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.464519TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 2, 2024 16:56:14.725898981 CET497305221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:14.730739117 CET522149730128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:14.730868101 CET497305221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:15.603915930 CET522149730128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:15.604090929 CET497305221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:20.614994049 CET497315221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:20.620167017 CET522149731128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:20.620254040 CET497315221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:21.464850903 CET522149731128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:21.464979887 CET497315221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:26.474457979 CET497325221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:26.479688883 CET522149732128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:26.479787111 CET497325221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:27.360249043 CET522149732128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:27.360374928 CET497325221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:32.364857912 CET497355221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:32.370065928 CET522149735128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:32.370140076 CET497355221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:33.236500025 CET522149735128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:33.236742020 CET497355221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:38.239952087 CET645125221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:38.244991064 CET522164512128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:38.245121002 CET645125221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:39.081250906 CET522164512128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:39.081408024 CET645125221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:44.083827972 CET645135221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:44.088784933 CET522164513128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:44.088908911 CET645135221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:44.955877066 CET522164513128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:44.955988884 CET645135221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:49.961847067 CET645145221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:49.967922926 CET522164514128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:49.968106031 CET645145221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:50.830710888 CET522164514128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:50.830843925 CET645145221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:55.833651066 CET645155221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:55.838592052 CET522164515128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:55.838670015 CET645155221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:56:56.680929899 CET522164515128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:56:56.681075096 CET645155221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:01.693044901 CET645165221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:01.697901011 CET522164516128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:01.697994947 CET645165221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:02.541167021 CET522164516128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:02.541250944 CET645165221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:07.553530931 CET645175221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:07.788666010 CET522164517128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:07.788752079 CET645175221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:08.638259888 CET522164517128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:08.638359070 CET645175221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:13.646056890 CET645305221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:13.651287079 CET522164530128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:13.651500940 CET645305221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:14.486818075 CET522164530128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:14.489553928 CET645305221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:19.505599022 CET645645221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:19.510457039 CET522164564128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:19.510565042 CET645645221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:20.369215012 CET522164564128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:20.369293928 CET645645221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:25.380609989 CET645945221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:25.385551929 CET522164594128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:25.385639906 CET645945221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:26.228087902 CET522164594128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:26.228230000 CET645945221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:31.241110086 CET646275221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:31.246128082 CET522164627128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:31.246284962 CET646275221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:32.118328094 CET522164627128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:32.118443966 CET646275221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:37.130604982 CET646605221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:37.135495901 CET522164660128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:37.135601044 CET646605221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:37.973843098 CET522164660128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:37.973918915 CET646605221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:42.990102053 CET646915221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:43.180336952 CET522164691128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:43.180442095 CET646915221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:44.041574955 CET522164691128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:44.041641951 CET646915221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:49.052228928 CET647175221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:49.057080030 CET522164717128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:49.057153940 CET647175221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:49.889766932 CET522164717128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:49.889982939 CET647175221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:54.896023035 CET647495221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:54.900887012 CET522164749128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:54.900947094 CET647495221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:57:55.773487091 CET522164749128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:57:55.773591995 CET647495221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:00.786699057 CET647845221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:00.791647911 CET522164784128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:58:00.791728973 CET647845221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:01.639043093 CET522164784128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:58:01.639132977 CET647845221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:06.646157026 CET647935221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:06.652089119 CET522164793128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:58:06.652196884 CET647935221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:07.520040989 CET522164793128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:58:07.520137072 CET647935221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:12.536711931 CET647945221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:12.541678905 CET522164794128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:58:12.541755915 CET647945221192.168.2.4128.90.129.125
                                                          Nov 2, 2024 16:58:13.387090921 CET522164794128.90.129.125192.168.2.4
                                                          Nov 2, 2024 16:58:13.387236118 CET647945221192.168.2.4128.90.129.125
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 2, 2024 16:56:14.621650934 CET5515953192.168.2.41.1.1.1
                                                          Nov 2, 2024 16:56:14.722695112 CET53551591.1.1.1192.168.2.4
                                                          Nov 2, 2024 16:56:34.699172974 CET53645631.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Nov 2, 2024 16:56:14.621650934 CET192.168.2.41.1.1.10xc391Standard query (0)chromedata.accesscam.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Nov 2, 2024 16:56:14.722695112 CET1.1.1.1192.168.2.40xc391No error (0)chromedata.accesscam.org128.90.129.125A (IP address)IN (0x0001)false

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:11:56:09
                                                          Start date:02/11/2024
                                                          Path:C:\Users\user\Desktop\OhWWbQcp7Q.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\OhWWbQcp7Q.exe"
                                                          Imagebase:0x1b0000
                                                          File size:115'712 bytes
                                                          MD5 hash:00345DE133A4D119EACC29FB87F648E9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000000.1665942039.00000000002FF000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000000.1665841407.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.1682866444.0000000000814000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.1682769402.0000000000814000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.1684884030.0000000000814000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.1682902231.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.1682968555.0000000000800000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.1682751830.0000000000805000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000002.1686330176.000000000294A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.1683534167.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.1684809257.0000000000808000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:11:56:11
                                                          Start date:02/11/2024
                                                          Path:C:\ProgramData\images.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\ProgramData\images.exe"
                                                          Imagebase:0x670000
                                                          File size:115'712 bytes
                                                          MD5 hash:00345DE133A4D119EACC29FB87F648E9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000003.1702151085.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000003.1702165776.0000000001200000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000000.1683394560.00000000007BF000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000003.1702087810.0000000001200000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000000.1683260743.0000000000684000.00000002.00000001.01000000.00000005.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000002.2923447659.00000000033FF000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000003.1702057537.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000001.00000003.1702130332.0000000001224000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: C:\ProgramData\images.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\ProgramData\images.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: C:\ProgramData\images.exe, Author: Joe Security
                                                          • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: C:\ProgramData\images.exe, Author: unknown
                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\ProgramData\images.exe, Author: Florian Roth
                                                          • Rule: AveMaria_WarZone, Description: unknown, Source: C:\ProgramData\images.exe, Author: unknown
                                                          • Rule: Codoso_Gh0st_2, Description: Detects Codoso APT Gh0st Malware, Source: C:\ProgramData\images.exe, Author: Florian Roth
                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via IExecuteCommand COM object, Source: C:\ProgramData\images.exe, Author: ditekSHen
                                                          • Rule: MALWARE_Win_WarzoneRAT, Description: Detects AveMaria/WarzoneRAT, Source: C:\ProgramData\images.exe, Author: ditekSHen
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 89%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:10.5%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:6.1%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:76
                                                            execution_graph 12861 1bed1f 12862 1b33f5 3 API calls 12861->12862 12863 1bed35 12862->12863 12872 1b4a75 12863->12872 12866 1b4f2b 15 API calls 12867 1bed46 12866->12867 12881 1b4a17 12867->12881 12871 1bed56 12873 1b309d 10 API calls 12872->12873 12874 1b4a93 12873->12874 12875 1b3437 3 API calls 12874->12875 12876 1b4a9c 12875->12876 12885 1b5ea5 VirtualFree 12876->12885 12878 1b4aa4 12886 1b5ea5 VirtualFree 12878->12886 12880 1b4ab0 12880->12866 12887 1b5ea5 VirtualFree 12881->12887 12883 1b4a28 12884 1b5ea5 VirtualFree 12883->12884 12884->12871 12885->12878 12886->12880 12887->12883 8687 1b121c 8690 1b99a8 8687->8690 8701 1b1875 8690->8701 8697 1c0969 lstrcmpA 8698 1b9a24 8697->8698 8699 1c0969 lstrcmpA 8698->8699 8700 1b1221 8699->8700 8711 1b5f53 GetProcessHeap HeapAlloc 8701->8711 8703 1b189e InitializeCriticalSection 8704 1bfece 8703->8704 8712 1c0298 CreateMutexA 8704->8712 8706 1b99e3 LoadLibraryW 8707 1c0969 8706->8707 8708 1c0983 8707->8708 8709 1b9a13 8708->8709 8710 1c0999 lstrcmpA 8708->8710 8709->8697 8710->8708 8710->8709 8711->8703 8712->8706 9813 1c3417 9816 1b2093 9813->9816 9822 1b2110 9816->9822 9818 1b20d1 9820 1b20ae 9820->9818 9825 1b2164 9820->9825 9830 1b1fcb 9820->9830 9842 1b5f53 GetProcessHeap HeapAlloc 9822->9842 9824 1b2139 9824->9820 9826 1b5ca3 3 API calls 9825->9826 9827 1b2179 9826->9827 9843 1b1f95 9827->9843 9831 1b1fe1 9830->9831 9832 1b2064 9830->9832 9850 1b5f53 GetProcessHeap HeapAlloc 9831->9850 9834 1b20da 3 API calls 9832->9834 9835 1b2081 9834->9835 9862 1b13ef 9835->9862 9837 1b2058 9837->9832 9858 1b1a7e 9837->9858 9838 1b200a 9838->9837 9851 1b20da 9838->9851 9842->9824 9844 1b362d 3 API calls 9843->9844 9845 1b1fa5 9844->9845 9846 1b362d 3 API calls 9845->9846 9847 1b1fb1 9846->9847 9848 1b362d 3 API calls 9847->9848 9849 1b1fbd 9848->9849 9849->9820 9850->9838 9852 1b3437 3 API calls 9851->9852 9853 1b20ea 9852->9853 9854 1b3437 3 API calls 9853->9854 9855 1b20f6 9854->9855 9856 1b3437 3 API calls 9855->9856 9857 1b2102 9856->9857 9857->9838 9859 1b1a91 9858->9859 9860 1b1aa0 9858->9860 9859->9860 9861 1b13ef VirtualFree 9859->9861 9860->9832 9861->9859 9869 1b5ea5 VirtualFree 9862->9869 9864 1b13fa 9870 1b5ea5 VirtualFree 9864->9870 9866 1b1406 9871 1b5ea5 VirtualFree 9866->9871 9868 1b1411 9868->9820 9869->9864 9870->9866 9871->9868 9872 1b4c0a 9873 1b4c1d 9872->9873 9915 1b4c64 9872->9915 9874 1b4c29 9873->9874 9875 1b4d56 9873->9875 9876 1b4d4a 9874->9876 9877 1b4c2f 9874->9877 9878 1b4ddf 9875->9878 9885 1b4dc8 9875->9885 9886 1b4d66 9875->9886 9914 1b4dce 9875->9914 10193 1bc938 9876->10193 9880 1b4c38 9877->9880 9881 1b4cdf 9877->9881 9892 1b4e29 9878->9892 9893 1b4df3 9878->9893 9878->9915 9928 1b4e35 9878->9928 9883 1b4c3e 9880->9883 9884 1b4cd3 9880->9884 9887 1b4d40 9881->9887 9888 1b4ce4 9881->9888 9889 1b4c9b 9883->9889 9890 1b4c43 9883->9890 10109 1b29fb 9884->10109 10346 1b27d3 9885->10346 9894 1b4dbe 9886->9894 9895 1b4d6d 9886->9895 10180 1b29b3 9887->10180 9896 1b4ceb 9888->9896 9897 1b4d32 9888->9897 9910 1b4ca0 9889->9910 9911 1b4cc7 9889->9911 9901 1b4c8f 9890->9901 9902 1b4c45 9890->9902 10429 1b2686 9892->10429 9903 1b4dfa 9893->9903 9904 1b4e20 9893->9904 10337 1b990a InitializeCriticalSection DeleteCriticalSection EnterCriticalSection GetModuleHandleA 9894->10337 9905 1b4db3 9895->9905 9906 1b4d71 9895->9906 9907 1b4d28 9896->9907 9908 1b4cef 9896->9908 10171 1c239e 9897->10171 10041 1b2be5 9901->10041 9917 1b4c4a 9902->9917 9918 1b4c7d 9902->9918 9919 1b4e19 9903->9919 9920 1b4dfe 9903->9920 10423 1b2650 9904->10423 10331 1b98c4 EnterCriticalSection 9905->10331 9921 1b4d9c 9906->9921 9935 1b4d79 9906->9935 9936 1b4d90 9906->9936 10165 1c2367 9907->10165 9922 1b4d1e 9908->9922 9923 1b4cf3 9908->9923 9929 1b4cbb 9910->9929 9930 1b4ca7 9910->9930 10084 1b2af6 SetLastError 9911->10084 10377 1b26c4 9914->10377 9931 1b4c73 9917->9931 9932 1b4c51 9917->9932 10001 1b2cec 9918->10001 10420 1b2639 9919->10420 9933 1b4e03 9920->9933 9934 1b4e10 9920->9934 10223 1be3fa InitializeCriticalSection DeleteCriticalSection EnterCriticalSection 9921->10223 10162 1b298b 9922->10162 9937 1b4cfb 9923->9937 9938 1b4e4e 9923->9938 10440 1b2968 9928->10440 10069 1b2aa1 9929->10069 9930->9915 10046 1b2a10 9930->10046 9988 1b2c8e 9931->9988 9945 1b4c69 9932->9945 9946 1b4c55 9932->9946 9933->9915 10390 1b2b80 9933->10390 10407 1b25cb 9934->10407 9935->9915 10201 1bd328 EnterCriticalSection 9935->10201 10210 1b275a 9936->10210 9947 1b4cff 9937->9947 9948 1b4d12 9937->9948 10445 1b2961 9938->10445 9975 1b2c47 9945->9975 9946->9915 9960 1b2bf4 9946->9960 9947->9915 10114 1c3936 9947->10114 10138 1b28cf 9948->10138 9961 1b362d 3 API calls 9960->9961 9962 1b2c09 9961->9962 10464 1bff27 9962->10464 9973 1b2c44 9973->9915 10549 1c002b 9975->10549 9977 1b2c58 10571 1b13a8 9977->10571 9982 1b4f2b 15 API calls 9983 1b2c76 9982->9983 10582 1b451b 9983->10582 9985 1b2c8b 9985->9915 10618 1c0d24 9988->10618 9990 1b2ca0 10646 1b131a 9990->10646 9995 1b4f2b 15 API calls 9996 1b2cbe 9995->9996 10657 1b4624 9996->10657 9998 1b2ce8 9998->9915 10000 1b2cc6 10000->9998 10661 1b1416 10000->10661 10694 1bf93f 10001->10694 10006 1c1e21 6 API calls 10007 1b2d32 10006->10007 10008 1b35e5 4 API calls 10007->10008 10009 1b2d58 10008->10009 10010 1b35e5 4 API calls 10009->10010 10011 1b2d61 10010->10011 10713 1bfa1f GlobalMemoryStatusEx 10011->10713 10013 1b2d66 10014 1b35e5 4 API calls 10013->10014 10015 1b2d77 10014->10015 10714 1bfc7e GetComputerNameW 10015->10714 10018 1bfc58 3 API calls 10019 1b2d84 10018->10019 10020 1bfbfc 4 API calls 10019->10020 10021 1b2d8a 10020->10021 10717 1bfa42 LoadLibraryA 10021->10717 10793 1b12ad 10041->10793 10045 1b2bf3 10045->9915 10047 1b33bf 4 API calls 10046->10047 10048 1b2a29 10047->10048 10960 1b33a3 lstrcmpA 10048->10960 10050 1b2a31 10961 1b5ea5 VirtualFree 10050->10961 10052 1b2a4c 10053 1b2a58 10052->10053 10054 1b2a50 10052->10054 10055 1b33bf 4 API calls 10053->10055 10962 1bedb5 10054->10962 10057 1b2a65 10055->10057 10973 1b33a3 lstrcmpA 10057->10973 10058 1b2a56 10058->9915 10060 1b2a6d 10974 1b5ea5 VirtualFree 10060->10974 10062 1b2a77 10063 1b2a7b 10062->10063 10064 1b2a8e 10062->10064 10975 1bea89 10063->10975 10991 1b33f5 10064->10991 11109 1c0cf6 OpenProcess 10069->11109 10071 1b2ab6 10072 1b2aba 10071->10072 10073 1b2ac5 GetLastError 10071->10073 10074 1b2c8e 38 API calls 10072->10074 10075 1b2ac1 10073->10075 10074->10075 11112 1c0c79 CreateToolhelp32Snapshot 10075->11112 10077 1b2ad8 11120 1b4346 10077->11120 10080 1b4f2b 15 API calls 10081 1b2ae9 10080->10081 11125 1b432f 10081->11125 10085 1b362d 3 API calls 10084->10085 10086 1b2b18 10085->10086 11130 1bff0b DeleteFileW 10086->11130 10088 1b2b1d 10089 1b2b22 10088->10089 10090 1b2b51 GetLastError 10088->10090 10091 1b362d 3 API calls 10089->10091 10108 1b2b4f 10090->10108 10092 1b2b2b 10091->10092 10095 1b362d 3 API calls 10092->10095 10093 1b362d 3 API calls 10094 1b2b62 10093->10094 11142 1b3fcb 10094->11142 10097 1b2b37 10095->10097 11133 1b39b5 10097->11133 10100 1b4f2b 15 API calls 10102 1b2b73 10100->10102 11147 1b3fb4 10102->11147 10105 1b2b47 11139 1b399e 10105->11139 10108->10093 10110 1b12ad 3 API calls 10109->10110 10111 1b2a07 10110->10111 10112 1b7574 24 API calls 10111->10112 10113 1b2a0e 10112->10113 10113->9915 10115 1b304c 2 API calls 10114->10115 10116 1c394d 10115->10116 10117 1c3959 10116->10117 10119 1c3ae8 10116->10119 10118 1c3962 10117->10118 10120 1c3aa6 10117->10120 10121 1c3a5d 10118->10121 10122 1c396b 10118->10122 10125 1b2f91 6 API calls 10119->10125 10127 1b2f91 6 API calls 10120->10127 10129 1b2f91 6 API calls 10121->10129 10123 1c3a14 10122->10123 10124 1c3974 10122->10124 10131 1b2f91 6 API calls 10123->10131 10126 1c39cb 10124->10126 10136 1c3979 10124->10136 10132 1c39a8 10125->10132 10134 1b2f91 6 API calls 10126->10134 10127->10132 10128 1c3b2e 10130 1b3036 2 API calls 10128->10130 10129->10132 10135 1c3b36 10130->10135 10131->10132 10132->10128 10133 1c3b28 SetEvent 10132->10133 10133->10128 10134->10132 10135->9915 10136->10128 10137 1b2f91 6 API calls 10136->10137 10137->10132 10139 1b362d 3 API calls 10138->10139 10140 1b28e7 10139->10140 11155 1c0203 10140->11155 10143 1b362d 3 API calls 10144 1b28f8 PathFileExistsW 10143->10144 11162 1b5ea5 VirtualFree 10144->11162 10146 1b290b 10147 1b291b 10146->10147 10148 1b2910 10146->10148 10150 1c0192 2 API calls 10147->10150 11163 1c01d1 CreateFileW 10148->11163 10151 1b2919 10150->10151 10152 1b2955 10151->10152 10153 1b304c 2 API calls 10151->10153 10154 1bfeed 4 API calls 10152->10154 10155 1b2938 10153->10155 10156 1b295d 10154->10156 11165 1c013d 10155->11165 10156->9915 10159 1b3036 2 API calls 10160 1b294d 10159->10160 10161 1c0125 CloseHandle 10160->10161 10161->10152 10163 1b4f2b 15 API calls 10162->10163 10164 1b29a0 10163->10164 10164->9915 11174 1c026f WaitForSingleObject 10165->11174 10167 1c2371 10168 1c2391 ReleaseMutex 10167->10168 11175 1c2c91 10167->11175 10168->9915 10170 1c238a 10170->10168 11178 1c026f WaitForSingleObject 10171->11178 10173 1c23ab 10174 1c23f8 ReleaseMutex 10173->10174 10178 1c23d2 10173->10178 11179 1b5f53 GetProcessHeap HeapAlloc 10173->11179 10174->9915 10177 1c23c6 10177->10178 10179 1c2ed4 20 API calls 10177->10179 11180 1c2d0a CoInitialize CoCreateInstance 10178->11180 10179->10178 11201 1c223e 10180->11201 10187 1b4f2b 15 API calls 10188 1b29e3 10187->10188 11229 1b479b 10188->11229 10191 1b29f8 10191->9915 10194 1bc94b 10193->10194 10195 1bc945 10193->10195 11269 1b5eff GetProcessHeap RtlAllocateHeap 10194->11269 10196 1b1a7e VirtualFree 10195->10196 10196->10194 10198 1bc964 11270 1b1f4b CreateThread 10198->11270 10200 1bc987 10200->9915 11271 1b1f76 10201->11271 10204 1b1f76 2 API calls 10205 1bd34f 10204->10205 11274 1b5584 shutdown closesocket 10205->11274 10207 1bd357 11275 1b5584 shutdown closesocket 10207->11275 10209 1bd362 LeaveCriticalSection 10209->9915 10211 1bd328 6 API calls 10210->10211 10212 1b2770 10211->10212 10213 1b33bf 4 API calls 10212->10213 10214 1b278e 10213->10214 11276 1b5c6d 10214->11276 10217 1b3554 11 API calls 10218 1b27a3 10217->10218 11279 1bd36c 10218->11279 10220 1b27a9 11294 1b5ea5 VirtualFree 10220->11294 10222 1b27b1 10222->9921 11299 1bde1f 10223->11299 10226 1be459 10228 1b35e5 4 API calls 10226->10228 10227 1be554 10229 1bf51d 2 API calls 10227->10229 10230 1be466 10228->10230 10231 1be559 10229->10231 11324 1c168e 10230->11324 10233 1be6cf 10231->10233 11358 1bf4ce LoadLibraryA 10231->11358 10236 1b4b91 3 API calls 10233->10236 10239 1be6e3 10236->10239 10237 1b3437 3 API calls 10240 1be47d 10237->10240 10238 1be567 10238->10233 10241 1be56f 10238->10241 10242 1b4f2b 15 API calls 10239->10242 11342 1b5ea5 VirtualFree 10240->11342 10244 1bfbfc 4 API calls 10241->10244 10245 1be6eb 10242->10245 10247 1be574 10244->10247 10248 1b4b6e VirtualFree 10245->10248 10246 1be485 11343 1b5ea5 VirtualFree 10246->11343 10250 1be579 10247->10250 10251 1be5a4 10247->10251 10252 1be6f3 LeaveCriticalSection 10248->10252 10255 1b4b91 3 API calls 10250->10255 10253 1b34a7 21 API calls 10251->10253 10256 1be6fc 10252->10256 10257 1be5af 10253->10257 10254 1be492 10258 1b35e5 4 API calls 10254->10258 10259 1be58d 10255->10259 10256->9915 10260 1b3437 3 API calls 10257->10260 10261 1be49f 10258->10261 10262 1b4f2b 15 API calls 10259->10262 10265 1be5ba 10260->10265 10263 1c168e 22 API calls 10261->10263 10264 1be595 10262->10264 10266 1be4ab 10263->10266 10267 1b4b6e VirtualFree 10264->10267 11361 1b5ea5 VirtualFree 10265->11361 10269 1b3437 3 API calls 10266->10269 10330 1be52a 10267->10330 10271 1be4b8 10269->10271 10270 1be5c2 10273 1b34a7 21 API calls 10270->10273 11344 1b5ea5 VirtualFree 10271->11344 10272 1be658 LeaveCriticalSection 10272->10256 10275 1be5cd 10273->10275 10277 1b3437 3 API calls 10275->10277 10276 1be4c0 11345 1b5ea5 VirtualFree 10276->11345 10279 1be5da 10277->10279 11362 1b5ea5 VirtualFree 10279->11362 10280 1be4cb 10282 1b3261 lstrlenW 10280->10282 10285 1be4d5 10282->10285 10283 1be5e2 RegCreateKeyExA RegSetValueExW RegCloseKey 11363 1bd418 NetUserAdd 10283->11363 10287 1be52c 10285->10287 10290 1b3261 lstrlenW 10285->10290 10291 1b4b91 3 API calls 10287->10291 10288 1be66b 10293 1b35e5 4 API calls 10288->10293 10289 1be638 10292 1b4b91 3 API calls 10289->10292 10294 1be4e0 10290->10294 10295 1be53c 10291->10295 10296 1be648 10292->10296 10297 1be67d 10293->10297 10294->10287 10298 1be4e4 10294->10298 10299 1b4f2b 15 API calls 10295->10299 10301 1b4f2b 15 API calls 10296->10301 11369 1c165b 10297->11369 10303 1b35e5 4 API calls 10298->10303 10300 1be544 10299->10300 10304 1b4b6e VirtualFree 10300->10304 10305 1be650 10301->10305 10307 1be4f2 10303->10307 10304->10330 10309 1b4b6e VirtualFree 10305->10309 10308 1b35e5 4 API calls 10307->10308 10311 1be4fc 10308->10311 10309->10272 11346 1b4b91 10311->11346 10312 1be690 10313 1b35e5 4 API calls 10312->10313 10315 1be69e 10313->10315 10317 1c165b 8 API calls 10315->10317 10319 1be6a6 10317->10319 10318 1b4f2b 15 API calls 10320 1be50f 10318->10320 11378 1b5ea5 VirtualFree 10319->11378 11351 1b4b6e 10320->11351 10323 1be6ae 11379 1b1f4b CreateThread 10323->11379 10327 1be6c3 LeaveCriticalSection 10327->10256 10328 1be51f 11357 1b5ea5 VirtualFree 10328->11357 10330->10272 10332 1b98da 10331->10332 10333 1b98ff LeaveCriticalSection 10331->10333 10334 1b1f76 2 API calls 10332->10334 10333->9915 10335 1b98e4 10334->10335 11399 1b1f4b CreateThread 10335->11399 10338 1b997c 10337->10338 10339 1b9965 10337->10339 10341 1b1f76 2 API calls 10338->10341 11400 1b1f4b CreateThread 10339->11400 10343 1b9981 10341->10343 10342 1b9970 10344 1b999b LeaveCriticalSection 10342->10344 11401 1b1f4b CreateThread 10343->11401 10344->9915 10347 1bf76b 5 API calls 10346->10347 10348 1b27e9 10347->10348 10349 1b34a7 21 API calls 10348->10349 10350 1b27f4 10349->10350 10351 1b346a 9 API calls 10350->10351 10352 1b2803 10351->10352 10353 1b3335 5 API calls 10352->10353 10354 1b280b 10353->10354 11402 1b5ea5 VirtualFree 10354->11402 10356 1b2813 10357 1b362d 3 API calls 10356->10357 10358 1b2822 10357->10358 11403 1b351d 10358->11403 10361 1b3335 5 API calls 10362 1b2837 10361->10362 11408 1b5ea5 VirtualFree 10362->11408 10364 1b283f 11409 1b5ea5 VirtualFree 10364->11409 10366 1b284b 10367 1b362d 3 API calls 10366->10367 10368 1b2857 URLDownloadToFileW 10367->10368 11410 1b5ea5 VirtualFree 10368->11410 10370 1b2870 10371 1b287d ShellExecuteW 10370->10371 10372 1b2874 10370->10372 10371->10372 10373 1b4f2b 15 API calls 10372->10373 10374 1b28b1 10373->10374 11411 1b5ea5 VirtualFree 10374->11411 10376 1b28b9 10376->9914 10378 1b5c6d 3 API calls 10377->10378 10379 1b26e4 10378->10379 10380 1b3554 11 API calls 10379->10380 10381 1b26eb 10380->10381 11412 1b5ea5 VirtualFree 10381->11412 10383 1b26f3 inet_addr 10384 1b2739 10383->10384 10385 1b2701 getaddrinfo 10383->10385 11413 1c3de9 10384->11413 10385->10384 10389 1b274a 10389->9878 10391 1b362d 3 API calls 10390->10391 10392 1b2b99 10391->10392 10393 1bff27 17 API calls 10392->10393 10394 1b2ba1 10393->10394 10395 1b1361 12 API calls 10394->10395 10396 1b2baf 10395->10396 10397 1b362d 3 API calls 10396->10397 10398 1b2bb8 10397->10398 11421 1b3bbb 10398->11421 10401 1b4f2b 15 API calls 10402 1b2bcb 10401->10402 11432 1b3b8b 10402->11432 10405 1b2be0 10405->9915 10406 1b1ad5 VirtualFree 10406->10405 10408 1b304c 2 API calls 10407->10408 10409 1b25e9 10408->10409 11446 1c1e8c VirtualAlloc 10409->11446 10411 1b25f6 10412 1b2619 10411->10412 10413 1b2612 10411->10413 11468 1b79e8 10412->11468 11449 1b7af1 10413->11449 10416 1b261e VirtualFree 10418 1b3036 2 API calls 10416->10418 10419 1b2634 10418->10419 10419->9915 10421 1b4f2b 15 API calls 10420->10421 10422 1b264e 10421->10422 10422->9915 10424 1b265c 10423->10424 10425 1b2683 10423->10425 10426 1b362d 3 API calls 10424->10426 10425->9915 10427 1b2668 ShellExecuteW 10426->10427 11553 1b5ea5 VirtualFree 10427->11553 10430 1b5c6d 3 API calls 10429->10430 10431 1b26a1 10430->10431 10432 1b3554 11 API calls 10431->10432 10433 1b26a8 10432->10433 11554 1bee22 10433->11554 10437 1b26b8 11558 1b5ea5 VirtualFree 10437->11558 10439 1b26c0 10439->9928 10441 1b4f2b 15 API calls 10440->10441 10442 1b2981 10441->10442 11648 1c32ed 10442->11648 10446 1c171c 10445->10446 11652 1c0f31 RegDeleteKeyW 10446->11652 10448 1c1732 10449 1c1739 TerminateThread 10448->10449 10450 1c1746 10448->10450 10449->10450 10451 1c1788 10450->10451 10452 1c106c 5 API calls 10450->10452 10453 1c1794 GetModuleFileNameA 10451->10453 10454 1c1762 10452->10454 10462 1c17c6 10453->10462 10455 1b362d 3 API calls 10454->10455 10456 1c176e 10455->10456 11653 1c0f4c 10456->11653 10460 1c1781 10461 1c0fae RegCloseKey 10460->10461 10461->10451 10463 1c181a CreateProcessA CloseHandle CloseHandle ExitProcess 10462->10463 10465 1b1875 2 API calls 10464->10465 10466 1bff4a FindFirstFileW 10465->10466 10478 1bff64 10466->10478 10467 1c0004 10468 1b1361 12 API calls 10467->10468 10469 1c000f 10468->10469 10471 1c001c 10469->10471 10472 1b1ad5 VirtualFree 10469->10472 10470 1b35e5 4 API calls 10470->10478 10521 1b5ea5 VirtualFree 10471->10521 10472->10471 10474 1b3437 3 API calls 10474->10478 10475 1b2c11 10482 1b1361 10475->10482 10477 1b362d 3 API calls 10477->10478 10478->10467 10478->10470 10478->10474 10478->10477 10507 1b5ea5 VirtualFree 10478->10507 10508 1b1776 10478->10508 10520 1b5ea5 VirtualFree 10478->10520 10481 1bffee FindNextFileW 10481->10478 10483 1b1875 2 API calls 10482->10483 10486 1b137c 10483->10486 10484 1b139f 10488 1b4450 10484->10488 10486->10484 10487 1b1776 6 API calls 10486->10487 10524 1b18c2 10486->10524 10487->10486 10489 1b1361 12 API calls 10488->10489 10490 1b4468 10489->10490 10491 1b2c27 10490->10491 10492 1b1ad5 VirtualFree 10490->10492 10493 1b4f2b 10491->10493 10492->10491 10494 1b4f40 10493->10494 10529 1b55a5 10494->10529 10496 1b4f49 10497 1b3036 2 API calls 10496->10497 10498 1b2c2f 10497->10498 10499 1b442d 10498->10499 10500 1b443d 10499->10500 10501 1b2c37 10499->10501 10502 1b1ad5 VirtualFree 10500->10502 10501->9973 10503 1b1ad5 10501->10503 10502->10501 10504 1b1af8 10503->10504 10505 1b1ae6 10503->10505 10504->9973 10505->10504 10548 1b5ea5 VirtualFree 10505->10548 10507->10478 10509 1b178d 10508->10509 10516 1b1837 10508->10516 10522 1b5f53 GetProcessHeap HeapAlloc 10509->10522 10511 1b3437 3 API calls 10512 1b1851 10511->10512 10523 1b5ea5 VirtualFree 10512->10523 10514 1b186e 10514->10478 10515 1b1825 10515->10516 10518 1b1ad5 VirtualFree 10515->10518 10516->10511 10517 1b3437 3 API calls 10519 1b17b6 10517->10519 10518->10516 10519->10515 10519->10517 10520->10481 10521->10475 10522->10519 10523->10514 10525 1b5ca3 3 API calls 10524->10525 10526 1b18d8 10525->10526 10527 1b362d 3 API calls 10526->10527 10528 1b18e8 10527->10528 10528->10486 10530 1b55ba 10529->10530 10531 1b55b6 10529->10531 10532 1b33bf 4 API calls 10530->10532 10531->10496 10533 1b55c7 10532->10533 10534 1b3003 7 API calls 10533->10534 10535 1b55d0 10534->10535 10547 1b5ea5 VirtualFree 10535->10547 10537 1b55d8 10538 1b304c 2 API calls 10537->10538 10539 1b55e5 10538->10539 10540 1b304c 2 API calls 10539->10540 10541 1b55f2 10540->10541 10542 1b60aa 4 API calls 10541->10542 10543 1b55fa send 10542->10543 10544 1b3036 2 API calls 10543->10544 10545 1b561e 10544->10545 10546 1b3036 2 API calls 10545->10546 10546->10531 10547->10537 10548->10505 10590 1b5f53 GetProcessHeap HeapAlloc 10549->10590 10551 1c0043 10591 1b19f6 10551->10591 10554 1c008d 10558 1b35e5 4 API calls 10554->10558 10561 1b3437 3 API calls 10554->10561 10568 1b3261 lstrlenW 10554->10568 10570 1c0103 10554->10570 10595 1b5ea5 VirtualFree 10554->10595 10596 1b1903 10554->10596 10608 1b5ea5 VirtualFree 10554->10608 10555 1c0070 10594 1b5f53 GetProcessHeap HeapAlloc 10555->10594 10557 1c0083 GetLogicalDriveStringsW 10557->10554 10558->10554 10559 1b13a8 12 API calls 10560 1c0111 10559->10560 10562 1c011e 10560->10562 10563 1b1b00 VirtualFree 10560->10563 10561->10554 10562->9977 10563->10562 10565 1c00b1 GetDriveTypeW 10566 1b362d 3 API calls 10565->10566 10566->10554 10568->10554 10570->10559 10572 1b19f6 2 API calls 10571->10572 10575 1b13c3 10572->10575 10573 1b13e6 10577 1b453e 10573->10577 10575->10573 10576 1b1903 6 API calls 10575->10576 10612 1b1a43 10575->10612 10576->10575 10578 1b13a8 12 API calls 10577->10578 10579 1b4556 10578->10579 10580 1b2c6e 10579->10580 10581 1b1b00 VirtualFree 10579->10581 10580->9982 10581->10580 10583 1b452b 10582->10583 10584 1b2c7e 10582->10584 10585 1b1b00 VirtualFree 10583->10585 10584->9985 10586 1b1b00 10584->10586 10585->10584 10587 1b1b23 10586->10587 10588 1b1b11 10586->10588 10587->9985 10588->10587 10617 1b5ea5 VirtualFree 10588->10617 10590->10551 10609 1b5f53 GetProcessHeap HeapAlloc 10591->10609 10593 1b1a1f GetLogicalDriveStringsW 10593->10554 10593->10555 10594->10557 10595->10565 10597 1b191a 10596->10597 10605 1b19be 10596->10605 10610 1b5f53 GetProcessHeap HeapAlloc 10597->10610 10599 1b3437 3 API calls 10600 1b19d8 10599->10600 10611 1b5ea5 VirtualFree 10600->10611 10602 1b19ef 10602->10554 10603 1b19ac 10603->10605 10607 1b1b00 VirtualFree 10603->10607 10604 1b1943 10604->10603 10606 1b3437 3 API calls 10604->10606 10605->10599 10606->10604 10607->10605 10608->10554 10609->10593 10610->10604 10611->10602 10613 1b5ca3 3 API calls 10612->10613 10614 1b1a59 10613->10614 10615 1b362d 3 API calls 10614->10615 10616 1b1a69 10615->10616 10616->10575 10617->10588 10619 1c0d46 10618->10619 10666 1b16e3 10619->10666 10622 1c0efd 10624 1b131a 12 API calls 10622->10624 10623 1c0d7b Process32FirstW 10625 1c0d8d CloseHandle 10623->10625 10626 1c0dce 10623->10626 10627 1c0f08 10624->10627 10628 1b131a 12 API calls 10625->10628 10629 1b32ff 9 API calls 10626->10629 10631 1c0dc9 10627->10631 10633 1b1416 VirtualFree 10627->10633 10632 1c0d9f 10628->10632 10630 1c0dec OpenProcess 10629->10630 10638 1c0e09 10630->10638 10631->9990 10632->10631 10635 1b1416 VirtualFree 10632->10635 10633->10627 10634 1c0e1c GetModuleFileNameExW 10634->10638 10635->10632 10636 1b35e5 lstrlenW lstrlenW lstrcpyW VirtualAlloc 10636->10638 10637 1b5ea5 VirtualFree 10637->10638 10638->10634 10638->10636 10638->10637 10639 1b3437 lstrlenW lstrcpyW VirtualAlloc 10638->10639 10640 1c0e80 CloseHandle 10638->10640 10641 1b362d lstrlenW lstrcpyW VirtualAlloc 10638->10641 10643 1b1416 VirtualFree 10638->10643 10669 1b15c0 10638->10669 10639->10638 10640->10638 10641->10638 10644 1c0edd Process32NextW 10643->10644 10644->10626 10645 1c0ef6 CloseHandle 10644->10645 10645->10622 10647 1b16e3 2 API calls 10646->10647 10650 1b1335 10647->10650 10648 1b1358 10652 1b4660 10648->10652 10650->10648 10651 1b15c0 6 API calls 10650->10651 10685 1b1735 10650->10685 10651->10650 10653 1b131a 12 API calls 10652->10653 10654 1b4678 10653->10654 10655 1b2cb6 10654->10655 10656 1b1416 VirtualFree 10654->10656 10655->9995 10656->10654 10658 1b4651 10657->10658 10659 1b4634 10657->10659 10658->10000 10659->10658 10660 1b1416 VirtualFree 10659->10660 10660->10659 10692 1b5ea5 VirtualFree 10661->10692 10663 1b1421 10693 1b5ea5 VirtualFree 10663->10693 10665 1b142d 10665->10000 10683 1b5f53 GetProcessHeap HeapAlloc 10666->10683 10668 1b170c CreateToolhelp32Snapshot 10668->10622 10668->10623 10670 1b15d7 10669->10670 10682 1b169c 10669->10682 10684 1b5f53 GetProcessHeap HeapAlloc 10670->10684 10672 1b3437 3 API calls 10673 1b16c3 10672->10673 10674 1b3437 3 API calls 10673->10674 10675 1b16d1 10674->10675 10676 1b1416 VirtualFree 10675->10676 10678 1b16dc 10676->10678 10677 1b1600 10679 1b1676 10677->10679 10680 1b3437 lstrlenW lstrcpyW VirtualAlloc 10677->10680 10678->10638 10681 1b1416 VirtualFree 10679->10681 10679->10682 10680->10677 10681->10679 10682->10672 10683->10668 10684->10677 10686 1b5ca3 3 API calls 10685->10686 10687 1b174a 10686->10687 10688 1b362d 3 API calls 10687->10688 10689 1b1762 10688->10689 10690 1b362d 3 API calls 10689->10690 10691 1b176e 10690->10691 10691->10650 10692->10663 10693->10665 10695 1bf97d 10694->10695 10776 1b1085 GetProcessHeap RtlAllocateHeap 10695->10776 10697 1bf9e4 10698 1b33bf 4 API calls 10697->10698 10699 1bfa02 10698->10699 10700 1b309d 10 API calls 10699->10700 10701 1bfa09 10700->10701 10777 1b5ea5 VirtualFree 10701->10777 10703 1bfa11 10778 1b1099 GetProcessHeap HeapFree 10703->10778 10705 1b2d04 10706 1bf80e CoInitializeSecurity CoInitialize 10705->10706 10707 1bf836 CoCreateInstance 10706->10707 10710 1bf877 10706->10710 10709 1bf854 10707->10709 10707->10710 10708 1b35e5 4 API calls 10711 1b2d0c GetModuleFileNameA 10708->10711 10709->10710 10709->10711 10712 1bf8ca VariantInit 10709->10712 10710->10708 10711->10006 10712->10709 10713->10013 10715 1b35e5 4 API calls 10714->10715 10716 1b2d7f 10715->10716 10716->10018 10718 1bfa64 GetProcAddress 10717->10718 10719 1b2d90 10717->10719 10718->10719 10720 1bfcb8 10719->10720 10721 1bfcde 10720->10721 10743 1bfd58 10720->10743 10722 1b35e5 4 API calls 10721->10722 10723 1bfceb RegOpenKeyExW 10722->10723 10779 1b5ea5 VirtualFree 10723->10779 10724 1b2e93 2 API calls 10726 1bfd6c 10724->10726 10728 1b3036 2 API calls 10726->10728 10727 1bfd0e 10729 1bfd3d 10727->10729 10732 1b35e5 4 API calls 10727->10732 10730 1bfd74 10728->10730 10781 1b607a 10729->10781 10733 1c0fae RegCloseKey 10730->10733 10735 1bfd24 10732->10735 10736 1b2d9f 10733->10736 10738 1c0fc3 12 API calls 10735->10738 10746 1b4241 10736->10746 10737 1b2e93 2 API calls 10739 1bfd50 10737->10739 10740 1bfd2d 10738->10740 10741 1b3036 2 API calls 10739->10741 10780 1b5ea5 VirtualFree 10740->10780 10741->10743 10743->10724 10744 1bfd35 10745 1c0fae RegCloseKey 10744->10745 10745->10729 10747 1b304c 2 API calls 10746->10747 10748 1b4259 10747->10748 10749 1b362d 3 API calls 10748->10749 10750 1b427d 10749->10750 10751 1b362d 3 API calls 10750->10751 10752 1b4289 10751->10752 10753 1b362d 3 API calls 10752->10753 10754 1b42a1 10753->10754 10755 1b362d 3 API calls 10754->10755 10756 1b42ad 10755->10756 10757 1b3036 2 API calls 10756->10757 10758 1b42b5 10757->10758 10785 1b5ea5 VirtualFree 10758->10785 10760 1b42bd 10786 1b5ea5 VirtualFree 10760->10786 10762 1b42c9 10787 1b5ea5 VirtualFree 10762->10787 10776->10697 10777->10703 10778->10705 10779->10727 10780->10744 10782 1b6097 10781->10782 10783 1b2f91 6 API calls 10782->10783 10784 1b60a5 10783->10784 10784->10737 10785->10760 10786->10762 10794 1b12c9 10793->10794 10795 1b12b6 10793->10795 10799 1b76c0 10794->10799 10820 1b5f53 GetProcessHeap HeapAlloc 10795->10820 10797 1b12be 10797->10794 10821 1b77ae 10797->10821 10828 1b1085 GetProcessHeap RtlAllocateHeap 10799->10828 10801 1b76d7 10802 1b3437 3 API calls 10801->10802 10803 1b76fb 10802->10803 10829 1b1085 GetProcessHeap RtlAllocateHeap 10803->10829 10805 1b7719 10806 1b362d 3 API calls 10805->10806 10807 1b7725 10806->10807 10808 1b362d 3 API calls 10807->10808 10809 1b772e 10808->10809 10810 1b3261 lstrlenW 10809->10810 10811 1b7736 10810->10811 10830 1b5ea5 VirtualFree 10811->10830 10813 1b7752 10831 1b5ea5 VirtualFree 10813->10831 10815 1b775a 10832 1c026f WaitForSingleObject 10815->10832 10817 1b7774 CreateThread 10833 1b1e9c 10817->10833 10838 1b73bb 10817->10838 10820->10797 10826 1b5f53 GetProcessHeap HeapAlloc 10821->10826 10823 1b77c9 10827 1c0298 CreateMutexA 10823->10827 10825 1b77dd 10825->10794 10826->10823 10827->10825 10828->10801 10829->10805 10830->10813 10831->10815 10832->10817 10834 1b1eb0 10833->10834 10836 1b1edc ReleaseMutex 10833->10836 10837 1b5f53 GetProcessHeap HeapAlloc 10834->10837 10836->10045 10837->10836 10839 1b35e5 4 API calls 10838->10839 10840 1b73e0 10839->10840 10872 1b78b0 10840->10872 10843 1b74e3 PathFindFileNameW 10845 1b35e5 4 API calls 10843->10845 10844 1b74e1 10847 1b7549 10844->10847 10850 1c0125 CloseHandle 10844->10850 10846 1b7510 10845->10846 10896 1b40ea 10846->10896 10904 1b7574 10847->10904 10850->10847 10853 1b7557 10926 1b77e3 10853->10926 10854 1b4f2b 15 API calls 10860 1b7525 10854->10860 10855 1b7476 PathFindFileNameW 10859 1b35e5 4 API calls 10855->10859 10856 1b7426 PathFindFileNameW 10861 1b35e5 4 API calls 10856->10861 10870 1b73f3 10859->10870 10901 1b4050 10860->10901 10861->10870 10862 1b3036 2 API calls 10864 1b7569 10862->10864 10865 1b40ea lstrlenW lstrcpyW VirtualFree VirtualAlloc 10865->10870 10867 1b3036 2 API calls 10867->10844 10868 1b4f2b 15 API calls 10868->10870 10869 1b4050 VirtualFree 10869->10870 10870->10844 10870->10855 10870->10856 10870->10865 10870->10868 10870->10869 10871 1b3036 GetProcessHeap RtlFreeHeap 10870->10871 10883 1b783b 10870->10883 10871->10870 10934 1b5f53 GetProcessHeap HeapAlloc 10872->10934 10874 1bfece CreateMutexA 10876 1b78f5 10874->10876 10875 1b78ce 10875->10874 10877 1b3437 3 API calls 10876->10877 10878 1b7909 10877->10878 10935 1c0192 CreateFileW 10878->10935 10882 1b73e9 10882->10843 10882->10870 10884 1b7846 10883->10884 10890 1b7893 10883->10890 10885 1b789a 10884->10885 10886 1b7862 10884->10886 10884->10890 10888 1bfe3d 12 API calls 10885->10888 10939 1bfe3d 10886->10939 10888->10890 10890->10870 10892 1b787b 10893 1b2f91 6 API calls 10892->10893 10894 1b788d 10893->10894 10952 1b1099 GetProcessHeap HeapFree 10894->10952 10897 1b362d 3 API calls 10896->10897 10898 1b4108 10897->10898 10956 1b5ea5 VirtualFree 10898->10956 10900 1b4134 10900->10854 10957 1b5ea5 VirtualFree 10901->10957 10903 1b4061 10903->10867 10958 1c026f WaitForSingleObject 10904->10958 10906 1b75da ReleaseMutex 10906->10853 10907 1b5ca3 3 API calls 10908 1b758f 10907->10908 10908->10907 10909 1b75ee 10908->10909 10925 1b75d8 10908->10925 10910 1b5ca3 3 API calls 10909->10910 10911 1b75f8 10910->10911 10959 1b5ea5 VirtualFree 10911->10959 10913 1b7610 10914 1b5ca3 3 API calls 10913->10914 10915 1b7621 TerminateThread 10914->10915 10916 1b5ca3 3 API calls 10915->10916 10917 1b764d 10916->10917 10917->10906 10918 1b40ea 4 API calls 10917->10918 10919 1b76a2 10918->10919 10920 1b4f2b 15 API calls 10919->10920 10921 1b76ab 10920->10921 10922 1b4050 VirtualFree 10921->10922 10923 1b76b3 10922->10923 10924 1b3036 2 API calls 10923->10924 10924->10925 10925->10906 10927 1b77ec 10926->10927 10928 1b77f4 10926->10928 10929 1c0125 CloseHandle 10927->10929 10930 1bfeed 4 API calls 10928->10930 10929->10928 10931 1b77fc 10930->10931 10932 1b7560 10931->10932 10933 1b3036 2 API calls 10931->10933 10932->10862 10933->10931 10934->10875 10936 1b7917 10935->10936 10937 1c01b6 GetFileSize 10935->10937 10938 1b5ea5 VirtualFree 10936->10938 10937->10936 10938->10882 10940 1bfe4b 10939->10940 10941 1bfe53 10939->10941 10953 1c026f WaitForSingleObject 10940->10953 10954 1b5eff GetProcessHeap RtlAllocateHeap 10941->10954 10944 1bfe5f SetFilePointer ReadFile 10945 1b2f91 6 API calls 10944->10945 10946 1bfe8f 10945->10946 10955 1b5eee GetProcessHeap RtlFreeHeap 10946->10955 10948 1bfe96 10949 1bfe9c ReleaseMutex 10948->10949 10950 1b786d 10948->10950 10949->10950 10951 1b1085 GetProcessHeap RtlAllocateHeap 10950->10951 10951->10892 10952->10890 10953->10941 10954->10944 10955->10948 10956->10900 10957->10903 10958->10908 10959->10913 10960->10050 10961->10052 10963 1bf76b 5 API calls 10962->10963 10964 1bedcb 10963->10964 10965 1b346a 9 API calls 10964->10965 10966 1bedd8 10965->10966 10967 1b362d 3 API calls 10966->10967 10968 1bede4 10967->10968 11007 1beafb 10968->11007 10970 1bede9 11044 1b5ea5 VirtualFree 10970->11044 10972 1bedfb 10972->10058 10973->10060 10974->10062 10976 1bea95 GetCurrentThreadId 10975->10976 10977 1bead4 10975->10977 10978 1beacd 10976->10978 10979 1beaa0 10976->10979 10980 1bec8c CloseHandle 10977->10980 10982 1bec8c CloseHandle 10978->10982 10981 1beaa6 SetEvent WaitForSingleObject 10979->10981 10990 1beaf4 10979->10990 10983 1beadc 10980->10983 10981->10978 10984 1beac3 TerminateThread 10981->10984 10982->10977 10985 1bec8c CloseHandle 10983->10985 10984->10978 10986 1beae4 10985->10986 10987 1bec8c CloseHandle 10986->10987 10988 1beaec 10987->10988 10989 1bec8c CloseHandle 10988->10989 10989->10990 10990->10058 10992 1b2a97 10991->10992 10993 1b3407 10991->10993 10998 1becd0 10992->10998 10994 1b3372 lstrlenA 10993->10994 10995 1b340e 10994->10995 11092 1b5eb4 VirtualAlloc 10995->11092 10997 1b3415 lstrcpyA 10997->10992 10999 1becde 10998->10999 11000 1bece2 10998->11000 11100 1b5ea5 VirtualFree 10999->11100 11093 1b315f 11000->11093 11004 1b308c lstrlenA 11006 1bed00 WriteFile 11004->11006 11005 1bed18 11005->10058 11006->10999 11008 1bea89 5 API calls 11007->11008 11009 1beb0e CreatePipe 11008->11009 11010 1beb4f GetCurrentProcess GetCurrentProcess DuplicateHandle 11009->11010 11011 1bec47 11009->11011 11010->11011 11013 1beb77 CreatePipe 11010->11013 11012 1bec8c CloseHandle 11011->11012 11015 1bec4f 11012->11015 11013->11011 11014 1beb93 GetCurrentProcess GetCurrentProcess DuplicateHandle 11013->11014 11014->11011 11016 1bebb1 GetCurrentProcess GetCurrentProcess DuplicateHandle 11014->11016 11017 1bec8c CloseHandle 11015->11017 11016->11011 11018 1bebcb 11016->11018 11019 1bec57 11017->11019 11045 1bec8c 11018->11045 11021 1bec8c CloseHandle 11019->11021 11023 1bec5f 11021->11023 11025 1bec8c CloseHandle 11023->11025 11024 1bec8c CloseHandle 11026 1bebdb 11024->11026 11027 1bec67 11025->11027 11028 1b362d 3 API calls 11026->11028 11029 1bec8c CloseHandle 11027->11029 11030 1bebf0 11028->11030 11031 1bec6f 11029->11031 11048 1be891 11030->11048 11033 1bea89 5 API calls 11031->11033 11035 1bec79 11033->11035 11054 1b5ea5 VirtualFree 11035->11054 11037 1bec8c CloseHandle 11039 1bec01 11037->11039 11038 1bec83 11038->10970 11040 1bec8c CloseHandle 11039->11040 11041 1bec09 11040->11041 11042 1bec8c CloseHandle 11041->11042 11043 1bec11 CreateEventA CreateThread 11042->11043 11043->11011 11043->11035 11056 1be92a 11043->11056 11044->10972 11046 1bebd3 11045->11046 11047 1bec94 CloseHandle 11045->11047 11046->11024 11047->11046 11049 1b1052 11048->11049 11050 1be8a6 CreateProcessW 11049->11050 11051 1be8ed 11050->11051 11055 1b5ea5 VirtualFree 11051->11055 11053 1be8fe 11053->11011 11053->11037 11054->11038 11055->11053 11057 1be95d 11056->11057 11059 1be96f 11057->11059 11060 1be947 WaitForMultipleObjects 11057->11060 11065 1be996 11057->11065 11062 1bea89 5 API calls 11059->11062 11060->11057 11061 1be976 11060->11061 11063 1be996 25 API calls 11061->11063 11064 1be98c 11062->11064 11063->11059 11066 1bea49 PeekNamedPipe 11065->11066 11067 1bea67 GetLastError 11066->11067 11068 1be9a5 11066->11068 11069 1bea72 11067->11069 11068->11069 11081 1b1085 GetProcessHeap RtlAllocateHeap 11068->11081 11069->11057 11071 1be9b7 ReadFile 11071->11067 11079 1be9d9 11071->11079 11072 1b2f91 6 API calls 11072->11079 11074 1b2ecf 8 API calls 11074->11079 11076 1b308c lstrlenA 11076->11079 11077 1b33f5 3 API calls 11077->11079 11078 1b5ea5 VirtualFree 11078->11079 11079->11072 11079->11074 11079->11076 11079->11077 11079->11078 11080 1b3036 2 API calls 11079->11080 11082 1b1099 GetProcessHeap HeapFree 11079->11082 11083 1b2f22 11079->11083 11080->11066 11081->11071 11082->11079 11090 1b1085 GetProcessHeap RtlAllocateHeap 11083->11090 11085 1b2f33 11086 1b33bf 4 API calls 11085->11086 11087 1b2f59 11086->11087 11088 1b2f63 11087->11088 11091 1b1099 GetProcessHeap HeapFree 11087->11091 11088->11079 11090->11085 11091->11088 11092->10997 11094 1b33bf 4 API calls 11093->11094 11095 1b3173 11094->11095 11101 1b318a 11095->11101 11097 1b317b 11108 1b5ea5 VirtualFree 11097->11108 11099 1b3183 11099->11004 11100->11005 11102 1b308c lstrlenA 11101->11102 11103 1b319c 11102->11103 11104 1b308c lstrlenA 11103->11104 11105 1b31a5 11104->11105 11106 1b5e46 3 API calls 11105->11106 11107 1b31b1 lstrcatA 11106->11107 11107->11097 11108->11099 11110 1c0d08 TerminateProcess CloseHandle 11109->11110 11111 1c0d20 11109->11111 11110->10071 11111->10071 11113 1c0ca4 Process32FirstW 11112->11113 11119 1c0cd5 11112->11119 11114 1c0cb4 11113->11114 11115 1c0cce CloseHandle 11114->11115 11116 1c0cbc Process32NextW 11114->11116 11117 1c0cdf CloseHandle 11114->11117 11115->11119 11116->11114 11118 1b35e5 4 API calls 11117->11118 11118->11119 11119->10077 11121 1b362d 3 API calls 11120->11121 11122 1b4364 11121->11122 11128 1b5ea5 VirtualFree 11122->11128 11124 1b2ae1 11124->10080 11129 1b5ea5 VirtualFree 11125->11129 11127 1b2af1 11127->9915 11128->11124 11129->11127 11150 1b5ea5 VirtualFree 11130->11150 11132 1bff22 11132->10088 11134 1b362d 3 API calls 11133->11134 11135 1b39cd 11134->11135 11151 1b5ea5 VirtualFree 11135->11151 11137 1b2b3f 11138 1b5ea5 VirtualFree 11137->11138 11138->10105 11152 1b5ea5 VirtualFree 11139->11152 11141 1b39af 11141->10108 11143 1b362d 3 API calls 11142->11143 11144 1b3fe9 11143->11144 11153 1b5ea5 VirtualFree 11144->11153 11146 1b2b6b 11146->10100 11154 1b5ea5 VirtualFree 11147->11154 11149 1b2b7b 11149->9915 11150->11132 11151->11137 11152->11141 11153->11146 11154->11149 11171 1c0298 CreateMutexA 11155->11171 11157 1c0217 11158 1b3437 3 API calls 11157->11158 11159 1c0223 11158->11159 11172 1b5ea5 VirtualFree 11159->11172 11161 1b28ef 11161->10143 11162->10146 11164 1c01f4 11163->11164 11164->10151 11166 1c014c 11165->11166 11167 1c0154 SetFilePointer WriteFile 11165->11167 11173 1c026f WaitForSingleObject 11166->11173 11169 1b2945 11167->11169 11170 1c0180 ReleaseMutex 11167->11170 11169->10159 11170->11169 11171->11157 11172->11161 11173->11167 11174->10167 11176 1c2c9c 11175->11176 11177 1c2cfc CoUninitialize 11176->11177 11177->10170 11178->10173 11179->10177 11181 1c2d42 11180->11181 11193 1c2e94 11180->11193 11182 1c2d71 11181->11182 11184 1c2a6b 4 API calls 11181->11184 11181->11193 11183 1c2d7a CoCreateInstance 11182->11183 11182->11193 11185 1c2d9c 11183->11185 11183->11193 11184->11182 11186 1c24eb CoTaskMemFree 11185->11186 11185->11193 11187 1c2e5e 11186->11187 11188 1c2b2a 3 API calls 11187->11188 11189 1c2e72 11188->11189 11190 1b5ca3 3 API calls 11189->11190 11191 1c2e7d 11190->11191 11194 1c25d8 11191->11194 11193->10174 11197 1c2f63 11194->11197 11200 1b5ea5 VirtualFree 11197->11200 11199 1c2f6d 11200->11199 11237 1b1534 11201->11237 11204 1c227b 11241 1c2c3f 11204->11241 11207 1c226f 11207->11204 11209 1c2ed4 20 API calls 11207->11209 11208 1b29c5 11218 1b12d3 11208->11218 11209->11204 11210 1c228f 11210->11208 11211 1b33bf 4 API calls 11210->11211 11212 1b309d 10 API calls 11210->11212 11213 1b3437 3 API calls 11210->11213 11214 1b5ca3 LoadLibraryA GetProcAddress ExitProcess 11210->11214 11215 1b362d 3 API calls 11210->11215 11217 1b5ea5 VirtualFree 11210->11217 11247 1b1433 11210->11247 11211->11210 11212->11210 11213->11210 11214->11210 11215->11210 11217->11210 11219 1b1534 2 API calls 11218->11219 11221 1b12ee 11219->11221 11220 1b1311 11224 1b47be 11220->11224 11221->11220 11223 1b1433 6 API calls 11221->11223 11263 1b1581 11221->11263 11223->11221 11225 1b12d3 12 API calls 11224->11225 11226 1b47d6 11225->11226 11227 1b29db 11226->11227 11228 1b1aa8 VirtualFree 11226->11228 11227->10187 11228->11227 11230 1b47ab 11229->11230 11231 1b29eb 11229->11231 11232 1b1aa8 VirtualFree 11230->11232 11231->10191 11233 1b1aa8 11231->11233 11232->11231 11234 1b1abb 11233->11234 11235 1b1acd 11233->11235 11234->11235 11268 1b5ea5 VirtualFree 11234->11268 11235->10191 11259 1b5f53 GetProcessHeap HeapAlloc 11237->11259 11239 1b155d 11239->11204 11240 1b5f53 GetProcessHeap HeapAlloc 11239->11240 11240->11207 11260 1b5f53 GetProcessHeap HeapAlloc 11241->11260 11243 1c2c88 11243->11210 11244 1b5ca3 3 API calls 11245 1c2c60 11244->11245 11245->11243 11245->11244 11246 1b2481 2 API calls 11245->11246 11246->11245 11248 1b14f4 11247->11248 11249 1b144a 11247->11249 11251 1b3437 3 API calls 11248->11251 11261 1b5f53 GetProcessHeap HeapAlloc 11249->11261 11252 1b1510 11251->11252 11262 1b5ea5 VirtualFree 11252->11262 11254 1b152d 11254->11210 11255 1b14e2 11255->11248 11257 1b1aa8 VirtualFree 11255->11257 11256 1b1473 11256->11255 11258 1b3437 3 API calls 11256->11258 11257->11248 11258->11256 11259->11239 11260->11245 11261->11256 11262->11254 11264 1b5ca3 3 API calls 11263->11264 11265 1b1596 11264->11265 11266 1b362d 3 API calls 11265->11266 11267 1b15a6 11266->11267 11267->11221 11268->11234 11269->10198 11270->10200 11272 1b1f7e TerminateThread CloseHandle 11271->11272 11273 1b1f90 11271->11273 11272->11273 11273->10204 11274->10207 11275->10209 11277 1b362d 3 API calls 11276->11277 11278 1b279c 11277->11278 11278->10217 11295 1b5eff GetProcessHeap RtlAllocateHeap 11279->11295 11281 1bd382 11282 1b3125 4 API calls 11281->11282 11283 1bd397 11282->11283 11284 1b3125 4 API calls 11283->11284 11285 1bd3aa 11284->11285 11296 1b1f4b CreateThread 11285->11296 11287 1bd3c5 11288 1bd3cc CloseHandle 11287->11288 11289 1bd3d5 11287->11289 11288->11289 11297 1b5ea5 VirtualFree 11289->11297 11291 1bd3dd 11298 1b5ea5 VirtualFree 11291->11298 11293 1bd3e5 11293->10220 11294->10222 11295->11281 11296->11287 11297->11291 11298->11293 11300 1b35e5 4 API calls 11299->11300 11301 1bde39 RegOpenKeyExW 11300->11301 11302 1bde5b 11301->11302 11323 1bde8b 11301->11323 11303 1b35e5 4 API calls 11302->11303 11304 1bde6c 11303->11304 11306 1c0fc3 12 API calls 11304->11306 11305 1b3036 2 API calls 11307 1bde95 11305->11307 11308 1bde75 11306->11308 11381 1b5ea5 VirtualFree 11307->11381 11380 1b5ea5 VirtualFree 11308->11380 11311 1bde9d 11313 1c0fae RegCloseKey 11311->11313 11312 1bde7f 11314 1bdeab 11312->11314 11315 1bde83 11312->11315 11316 1bdea5 11313->11316 11317 1b2ecf 8 API calls 11314->11317 11318 1c0fae RegCloseKey 11315->11318 11316->10226 11316->10227 11319 1bdebc 11317->11319 11318->11323 11382 1b3248 lstrcmpW 11319->11382 11321 1bdec3 11383 1b5ea5 VirtualFree 11321->11383 11323->11305 11325 1c16b4 11324->11325 11326 1c16a4 11324->11326 11328 1c0fc3 12 API calls 11325->11328 11327 1b362d 3 API calls 11326->11327 11329 1c16b0 11327->11329 11330 1c16c0 11328->11330 11385 1b5ea5 VirtualFree 11329->11385 11331 1c16e1 11330->11331 11333 1b2ecf 8 API calls 11330->11333 11334 1b362d 3 API calls 11331->11334 11336 1c16d0 11333->11336 11334->11329 11335 1c16f7 11337 1b3036 2 API calls 11335->11337 11338 1b3437 3 API calls 11336->11338 11339 1be472 11337->11339 11340 1c16d9 11338->11340 11339->10237 11384 1b5ea5 VirtualFree 11340->11384 11342->10246 11343->10254 11344->10276 11345->10280 11347 1b362d 3 API calls 11346->11347 11348 1b4bae 11347->11348 11349 1b362d 3 API calls 11348->11349 11350 1b4bb9 11349->11350 11350->10318 11386 1b5ea5 VirtualFree 11351->11386 11353 1b4b7f 11387 1b5ea5 VirtualFree 11353->11387 11355 1b4b8b 11356 1b5ea5 VirtualFree 11355->11356 11356->10328 11357->10330 11359 1bf500 11358->11359 11360 1bf4f0 GetProcAddress 11358->11360 11359->10238 11360->11359 11361->10270 11362->10283 11364 1bd464 11363->11364 11368 1bd48b 11363->11368 11388 1bf56d 11364->11388 11368->10288 11368->10289 11370 1c1668 11369->11370 11371 1be688 11369->11371 11372 1b3221 7 API calls 11370->11372 11377 1b5ea5 VirtualFree 11371->11377 11373 1c1676 11372->11373 11374 1c1039 RegSetValueExW 11373->11374 11375 1c1681 11374->11375 11376 1b3036 2 API calls 11375->11376 11376->11371 11377->10312 11378->10323 11379->10327 11380->11312 11381->11311 11382->11321 11383->11323 11384->11331 11385->11335 11386->11353 11387->11355 11389 1b1052 11388->11389 11390 1bf5a1 AllocateAndInitializeSid 11389->11390 11391 1bf5cc LookupAccountSidW 11390->11391 11392 1bf5f1 GetLastError 11390->11392 11391->11392 11393 1bf5f7 11391->11393 11392->11393 11394 1bf5fc FreeSid 11393->11394 11395 1bf605 11393->11395 11394->11395 11396 1b35e5 4 API calls 11395->11396 11397 1bd471 NetLocalGroupAddMembers 11396->11397 11398 1b5ea5 VirtualFree 11397->11398 11398->11368 11399->10333 11400->10342 11401->10344 11402->10356 11404 1b3530 11403->11404 11405 1b3525 PathFindExtensionW 11403->11405 11406 1b35e5 4 API calls 11404->11406 11405->11404 11407 1b282e 11406->11407 11407->10361 11408->10364 11409->10366 11410->10370 11411->10376 11412->10383 11419 1b5eff GetProcessHeap RtlAllocateHeap 11413->11419 11415 1c3df4 11420 1b1f4b CreateThread 11415->11420 11417 1b2742 11418 1b5ea5 VirtualFree 11417->11418 11418->10389 11419->11415 11420->11417 11422 1b1875 2 API calls 11421->11422 11423 1b3be2 11422->11423 11424 1b3437 3 API calls 11423->11424 11425 1b3bee 11424->11425 11438 1b1bed 11425->11438 11429 1b3c08 11430 1b2bc3 11429->11430 11431 1b1ad5 VirtualFree 11429->11431 11430->10401 11431->11430 11433 1b3b9c 11432->11433 11434 1b3ba2 11432->11434 11435 1b1ad5 VirtualFree 11433->11435 11445 1b5ea5 VirtualFree 11434->11445 11435->11434 11437 1b2bd3 11437->10405 11437->10406 11439 1b1875 2 API calls 11438->11439 11441 1b1bfa 11439->11441 11440 1b1c1f 11444 1b5ea5 VirtualFree 11440->11444 11441->11440 11442 1b18c2 6 API calls 11441->11442 11443 1b1776 6 API calls 11441->11443 11442->11441 11443->11441 11444->11429 11445->11437 11447 1c1eb6 11446->11447 11447->11447 11448 1c1ec3 VirtualProtect 11447->11448 11448->10411 11450 1b7b09 11449->11450 11451 1b7b0e 11449->11451 11482 1b8617 GetCurrentProcess IsWow64Process GetProcessHeap 11450->11482 11453 1b7b23 OpenProcess 11451->11453 11483 1b7948 11451->11483 11455 1b7b40 11453->11455 11467 1b2617 11453->11467 11492 1b8633 11455->11492 11460 1b8633 7 API calls 11461 1b7b86 11460->11461 11461->11467 11508 1b8568 11461->11508 11463 1b7bc5 11464 1b8568 7 API calls 11463->11464 11463->11467 11465 1b7bf3 11464->11465 11465->11467 11516 1b86e1 11465->11516 11467->10416 11469 1b79fe 11468->11469 11470 1b7a0c OpenProcess 11468->11470 11552 1b8617 GetCurrentProcess IsWow64Process GetProcessHeap 11469->11552 11472 1b7a2a VirtualAllocEx 11470->11472 11475 1b7a22 11470->11475 11474 1b7a4a VirtualProtectEx VirtualAllocEx 11472->11474 11472->11475 11473 1b7a03 11473->11470 11474->11475 11476 1b7a80 11474->11476 11475->10416 11477 1b7a92 WriteProcessMemory 11476->11477 11477->11475 11478 1b7aa7 11477->11478 11478->11475 11479 1b7ab7 WriteProcessMemory 11478->11479 11479->11475 11480 1b7acf 11479->11480 11480->11475 11481 1b7ad4 CreateRemoteThread 11480->11481 11481->11475 11482->11451 11484 1bf7e0 2 API calls 11483->11484 11485 1b795e VirtualAlloc GetWindowsDirectoryA lstrlenA 11484->11485 11486 1b7995 11485->11486 11487 1b79a1 CreateProcessA 11486->11487 11488 1b79db 11487->11488 11489 1b79cb Sleep 11487->11489 11491 1bf7b9 2 API calls 11488->11491 11490 1b79e3 11489->11490 11490->11453 11491->11490 11493 1b8653 11492->11493 11495 1b8668 11492->11495 11493->11495 11524 1b7fc0 11493->11524 11498 1b7b50 11495->11498 11532 1b7cb7 11495->11532 11498->11467 11500 1b878c 11498->11500 11501 1b87a7 11500->11501 11503 1b87bc 11500->11503 11502 1b7fc0 4 API calls 11501->11502 11501->11503 11504 1b87b0 11502->11504 11505 1b7cb7 3 API calls 11503->11505 11507 1b7b71 11503->11507 11506 1b7c1d 4 API calls 11504->11506 11505->11507 11506->11503 11507->11460 11509 1b8586 11508->11509 11511 1b859b 11508->11511 11510 1b7fc0 4 API calls 11509->11510 11509->11511 11512 1b858f 11510->11512 11514 1b7cb7 3 API calls 11511->11514 11515 1b85f9 11511->11515 11513 1b7c1d 4 API calls 11512->11513 11513->11511 11514->11515 11515->11463 11517 1b870c 11516->11517 11520 1b8721 11516->11520 11518 1b7fc0 4 API calls 11517->11518 11517->11520 11519 1b8715 11518->11519 11521 1b7c1d 4 API calls 11519->11521 11522 1b7cb7 3 API calls 11520->11522 11523 1b8773 11520->11523 11521->11520 11522->11523 11523->11467 11525 1b7fd0 11524->11525 11526 1b7fd9 11524->11526 11525->11526 11536 1b7fe6 11525->11536 11528 1b7c1d 11526->11528 11529 1b7c31 11528->11529 11530 1b7c3e 11528->11530 11529->11530 11549 1b7d1c 11529->11549 11530->11495 11533 1b7ccd GetModuleHandleW GetProcAddress GetProcAddress 11532->11533 11534 1b7cc3 11532->11534 11535 1b7d06 11533->11535 11534->11533 11534->11535 11535->11498 11537 1b817d 11536->11537 11539 1b7fff 11536->11539 11537->11526 11539->11537 11540 1b8246 11539->11540 11543 1b1085 GetProcessHeap RtlAllocateHeap 11539->11543 11544 1b1f2c 11539->11544 11541 1b1f2c 2 API calls 11540->11541 11541->11537 11543->11539 11545 1b1f43 11544->11545 11546 1b1f36 11544->11546 11545->11539 11546->11545 11548 1b1099 GetProcessHeap HeapFree 11546->11548 11548->11545 11550 1b7fc0 4 API calls 11549->11550 11551 1b7d2d 11550->11551 11551->11530 11552->11473 11553->10425 11559 1bf432 11554->11559 11556 1b26b0 11557 1b5ea5 VirtualFree 11556->11557 11557->10437 11558->10439 11566 1b1085 GetProcessHeap RtlAllocateHeap 11559->11566 11561 1bf443 11562 1bf473 11561->11562 11563 1bf44e lstrcpyA CreateThread 11561->11563 11567 1b1099 GetProcessHeap HeapFree 11562->11567 11565 1bf479 11563->11565 11568 1bee44 WSAStartup 11563->11568 11565->11556 11566->11561 11567->11565 11575 1bee9a socket gethostbyname 11568->11575 11571 1bee7a 11583 1bef4f 11571->11583 11572 1bee74 WSACleanup 11572->11571 11599 1b102c 11575->11599 11578 1b1052 11579 1beeff InetNtopW 11578->11579 11580 1bee6d 11579->11580 11581 1bef21 11579->11581 11580->11571 11580->11572 11582 1bef24 connect 11581->11582 11582->11580 11582->11582 11585 1bef66 11583->11585 11586 1bee95 11585->11586 11589 1bf131 send 11585->11589 11591 1bf006 InetNtopW 11585->11591 11593 1bf0bc InetNtopW 11585->11593 11595 1bf1da 5 API calls 11585->11595 11598 1bf089 getaddrinfo 11585->11598 11601 1b5f53 GetProcessHeap HeapAlloc 11585->11601 11602 1bf1da 11585->11602 11608 1bf3bd socket connect 11585->11608 11612 1b1085 GetProcessHeap RtlAllocateHeap 11585->11612 11619 1b1099 GetProcessHeap HeapFree 11585->11619 11620 1bf23d 11585->11620 11589->11585 11591->11585 11613 1bf33c socket 11593->11613 11596 1bf0fa CreateThread 11595->11596 11596->11585 11636 1bf16e 11596->11636 11598->11585 11600 1b103b htons 11599->11600 11600->11578 11601->11585 11631 1b1085 GetProcessHeap RtlAllocateHeap 11602->11631 11604 1bf1f3 11605 1bf21d send 11604->11605 11632 1b1099 GetProcessHeap HeapFree 11605->11632 11607 1bf237 11607->11585 11609 1bf42b 11608->11609 11610 1bf401 11608->11610 11609->11585 11611 1bf415 InetNtopW 11610->11611 11611->11609 11612->11585 11614 1b102c 11613->11614 11615 1bf370 connect 11614->11615 11616 1bf389 11615->11616 11617 1bf3b6 11615->11617 11618 1bf39d InetNtopW 11616->11618 11617->11585 11618->11617 11619->11585 11633 1b1085 GetProcessHeap RtlAllocateHeap 11620->11633 11622 1bf259 11634 1b1085 GetProcessHeap RtlAllocateHeap 11622->11634 11624 1bf27a recv 11625 1bf262 11624->11625 11630 1bf32b 11624->11630 11625->11624 11628 1bf2b8 11625->11628 11625->11630 11626 1bf2e2 recv 11626->11628 11626->11630 11627 1bf317 11635 1b1099 GetProcessHeap HeapFree 11627->11635 11628->11626 11628->11627 11628->11630 11630->11585 11631->11604 11632->11607 11633->11622 11634->11625 11635->11630 11643 1bf184 11636->11643 11644 1bf1c5 11636->11644 11638 1bf18f recv 11639 1bf1c7 closesocket 11638->11639 11638->11643 11647 1b1099 GetProcessHeap HeapFree 11639->11647 11641 1bf1da 5 API calls 11641->11643 11643->11639 11643->11641 11643->11644 11645 1b1085 GetProcessHeap RtlAllocateHeap 11643->11645 11646 1b1099 GetProcessHeap HeapFree 11643->11646 11645->11638 11646->11643 11647->11644 11651 1b5ea5 VirtualFree 11648->11651 11650 1b2989 11650->9915 11651->11650 11652->10448 11654 1c0f54 RegDeleteValueW 11653->11654 11655 1c0f65 11653->11655 11654->11655 11656 1b5ea5 VirtualFree 11655->11656 11656->10460 12976 1b813c 12979 1b8148 12976->12979 12978 1b817d 12979->12978 12980 1b8246 12979->12980 12982 1b1f2c 2 API calls 12979->12982 12983 1b1085 GetProcessHeap RtlAllocateHeap 12979->12983 12981 1b1f2c 2 API calls 12980->12981 12981->12978 12982->12979 12983->12979 11687 1b1c36 11690 1b5ea5 VirtualFree 11687->11690 11689 1b1c47 11690->11689 8323 1b122b 8326 1be703 InitializeCriticalSection 8323->8326 8378 1b5f53 GetProcessHeap HeapAlloc 8326->8378 8328 1be752 8379 1b32ff 8328->8379 8331 1b32ff 9 API calls 8332 1be79b 8331->8332 8389 1b35e5 lstrlenW 8332->8389 8334 1be7a8 8394 1b31d4 8334->8394 8340 1be7c5 8407 1b5ea5 VirtualFree 8340->8407 8342 1be7d0 8408 1bfc58 GetCurrentProcess 8342->8408 8345 1be7da 8348 1b32ff 9 API calls 8345->8348 8346 1be80f 8347 1b31d4 5 API calls 8346->8347 8349 1be819 8347->8349 8350 1be7e6 8348->8350 8351 1b3437 3 API calls 8349->8351 8352 1b31d4 5 API calls 8350->8352 8353 1be826 8351->8353 8354 1be7f0 8352->8354 8420 1b5ea5 VirtualFree 8353->8420 8356 1b3437 3 API calls 8354->8356 8358 1be7fd 8356->8358 8357 1be80d 8412 1b346a 8357->8412 8411 1b5ea5 VirtualFree 8358->8411 8362 1be805 8364 1b32ff 9 API calls 8362->8364 8363 1b346a 9 API calls 8365 1be843 8363->8365 8364->8357 8366 1b346a 9 API calls 8365->8366 8367 1be852 8366->8367 8419 1bf71f SHCreateDirectoryExW 8367->8419 8369 1be859 8370 1b3437 3 API calls 8369->8370 8371 1be866 8370->8371 8372 1b346a 9 API calls 8371->8372 8373 1be872 8372->8373 8374 1b346a 9 API calls 8373->8374 8375 1be87f 8374->8375 8376 1b346a 9 API calls 8375->8376 8378->8328 8380 1b330b 8379->8380 8381 1b3310 8379->8381 8429 1b5ea5 VirtualFree 8380->8429 8383 1b35e5 4 API calls 8381->8383 8384 1b331e 8383->8384 8421 1b3335 8384->8421 8386 1b3326 8428 1b5ea5 VirtualFree 8386->8428 8388 1b332e 8388->8331 8446 1b5e22 VirtualAlloc 8389->8446 8391 1b3600 lstrlenW 8448 1b5f31 8391->8448 8393 1b361a lstrcpyW 8393->8334 8450 1b1052 8394->8450 8397 1b35e5 4 API calls 8398 1b321b 8397->8398 8399 1b3437 8398->8399 8400 1b3449 8399->8400 8401 1b3462 8399->8401 8452 1b3384 8400->8452 8406 1b5ea5 VirtualFree 8401->8406 8403 1b3450 8404 1b5e22 VirtualAlloc 8403->8404 8405 1b3457 lstrcpyW 8404->8405 8405->8401 8406->8340 8407->8342 8455 1c0c36 GetModuleHandleA GetProcAddress 8408->8455 8411->8362 8413 1b35e5 4 API calls 8412->8413 8414 1b347b 8413->8414 8415 1b3335 5 API calls 8414->8415 8416 1b3483 8415->8416 8457 1b5ea5 VirtualFree 8416->8457 8418 1b348b 8418->8363 8419->8369 8420->8357 8430 1b3261 8421->8430 8423 1b3347 8424 1b3261 lstrlenW 8423->8424 8425 1b3350 8424->8425 8433 1b5e46 8425->8433 8428->8388 8429->8381 8431 1b326f 8430->8431 8432 1b3266 lstrlenW 8430->8432 8431->8423 8432->8423 8434 1b5e5c 8433->8434 8435 1b5e61 8433->8435 8441 1b5e02 8434->8441 8437 1b5e71 8435->8437 8444 1b5eb4 VirtualAlloc 8435->8444 8438 1b3360 lstrcatW 8437->8438 8445 1b5ea5 VirtualFree 8437->8445 8438->8386 8442 1b5e0c 8441->8442 8443 1b5e10 VirtualQuery 8441->8443 8442->8435 8443->8435 8444->8437 8445->8438 8447 1b5e40 8446->8447 8447->8391 8449 1b5f3d 8448->8449 8449->8393 8451 1b105a ExpandEnvironmentStringsW 8450->8451 8451->8397 8453 1b3389 8452->8453 8454 1b338c lstrlenW 8452->8454 8453->8403 8454->8403 8456 1be7d5 8455->8456 8456->8345 8456->8346 8457->8418 12987 1b1b2b 12990 1b37c0 12987->12990 12993 1b5ea5 VirtualFree 12990->12993 12992 1b1b33 12993->12992 12994 1c0b2a 12995 1c094e GetPEB 12994->12995 12996 1c0b36 12995->12996 12997 1c0969 lstrcmpA 12996->12997 12999 1c0b43 12997->12999 12998 1c0bd6 12999->12998 13000 1c07c4 2 API calls 12999->13000 13001 1c0b65 MessageBoxA 13000->13001 13002 1b35e5 4 API calls 13001->13002 13003 1c0b8b 13002->13003 13004 1c0bd9 CreateProcessW 13003->13004 13005 1c0b94 13004->13005 13017 1b5ea5 VirtualFree 13005->13017 13007 1c0b9c 13018 1b5ea5 VirtualFree 13007->13018 13009 1c0ba6 13010 1b35e5 4 API calls 13009->13010 13011 1c0bbb 13010->13011 13012 1c0bd9 CreateProcessW 13011->13012 13013 1c0bc4 13012->13013 13019 1b5ea5 VirtualFree 13013->13019 13015 1c0bcc 13020 1b5ea5 VirtualFree 13015->13020 13017->13007 13018->13009 13019->13015 13020->12998 13031 1bed5b 13032 1b33f5 3 API calls 13031->13032 13033 1bed71 13032->13033 13034 1b4a75 10 API calls 13033->13034 13035 1bed79 13034->13035 13036 1b4f2b 15 API calls 13035->13036 13037 1bed82 13036->13037 13038 1b4a17 VirtualFree 13037->13038 13039 1bed8a 13038->13039 13042 1b5ea5 VirtualFree 13039->13042 13041 1bed92 13042->13041 11881 1c3251 11882 1b1052 11881->11882 11883 1c3272 GetTempPathW lstrcatW 11882->11883 11884 1b35e5 4 API calls 11883->11884 11885 1c32a7 11884->11885 11886 1b3437 3 API calls 11885->11886 11887 1c32af 11886->11887 11896 1b5ea5 VirtualFree 11887->11896 11889 1c32b7 11890 1b3761 7 API calls 11889->11890 11891 1c32d5 11890->11891 11892 1b3679 8 API calls 11891->11892 11893 1c32dc 11892->11893 11894 1b3665 2 API calls 11893->11894 11895 1c32e4 11894->11895 11896->11889 13089 1b1d78 13094 1b5ea5 VirtualFree 13089->13094 13091 1b1d83 13095 1b5ea5 VirtualFree 13091->13095 13093 1b1d8e 13094->13091 13095->13093 13148 1b3d6c 13149 1c1dc0 11 API calls 13148->13149 13150 1b3d91 13149->13150 13151 1b3437 3 API calls 13150->13151 13152 1b3d9b 13151->13152 13161 1b5ea5 VirtualFree 13152->13161 13154 1b3da3 13155 1b2e4c 8 API calls 13154->13155 13156 1b3dca 13155->13156 13157 1b2e93 2 API calls 13156->13157 13158 1b3dd3 13157->13158 13159 1b3036 2 API calls 13158->13159 13160 1b3ddb 13159->13160 13161->13154 9801 1c2c91 9802 1c2c9c 9801->9802 9803 1c2cfc CoUninitialize 9802->9803 12107 1b3c8f 12108 1c1dc0 11 API calls 12107->12108 12109 1b3ca8 12108->12109 12110 1b3554 11 API calls 12109->12110 12111 1b3cb5 12110->12111 12112 1b3125 4 API calls 12111->12112 12113 1b3cbe 12112->12113 12118 1b5ea5 VirtualFree 12113->12118 12115 1b3cc6 12119 1b5ea5 VirtualFree 12115->12119 12117 1b3cce 12118->12115 12119->12117 12120 1b1c8f 12123 1b3de2 12120->12123 12124 1b3036 2 API calls 12123->12124 12125 1b3df3 12124->12125 12128 1b5ea5 VirtualFree 12125->12128 12127 1b1c97 12128->12127 12129 1b7e82 12136 1b1085 GetProcessHeap RtlAllocateHeap 12129->12136 12131 1b7e96 12135 1b7f94 12131->12135 12137 1b1085 GetProcessHeap RtlAllocateHeap 12131->12137 12133 1b7ed0 12134 1b1f2c 2 API calls 12133->12134 12134->12135 12136->12131 12137->12133 12177 1b9aa8 12184 1b5f53 GetProcessHeap HeapAlloc 12177->12184 12179 1b9ab7 12180 1b362d 3 API calls 12179->12180 12183 1b9ad1 12179->12183 12181 1b9aca 12180->12181 12182 1c0203 5 API calls 12181->12182 12182->12183 12184->12179 14005 1b37d7 14006 1c1dc0 11 API calls 14005->14006 14007 1b37ef 14006->14007 14008 1b3437 3 API calls 14007->14008 14009 1b37f9 14008->14009 14012 1b5ea5 VirtualFree 14009->14012 14011 1b3801 14012->14011 8562 1b9fce 8563 1b9fd9 8562->8563 8564 1b5ea5 VirtualFree 8562->8564 8565 1b11fe 8568 1c3b3c 8565->8568 8641 1b2550 8568->8641 8571 1b2550 VirtualAlloc 8572 1c3b59 8571->8572 8573 1b2550 VirtualAlloc 8572->8573 8574 1c3b63 8573->8574 8575 1b2550 VirtualAlloc 8574->8575 8576 1c3b6d 8575->8576 8577 1b2550 VirtualAlloc 8576->8577 8578 1c3b77 8577->8578 8579 1b2550 VirtualAlloc 8578->8579 8580 1c3b81 8579->8580 8644 1b1085 GetProcessHeap RtlAllocateHeap 8580->8644 8582 1c3ba8 8645 1b1085 GetProcessHeap RtlAllocateHeap 8582->8645 8584 1c3bb1 8646 1b1085 GetProcessHeap RtlAllocateHeap 8584->8646 8586 1c3bba 8647 1b1085 GetProcessHeap RtlAllocateHeap 8586->8647 8588 1c3bc3 8648 1b1085 GetProcessHeap RtlAllocateHeap 8588->8648 8590 1c3bcd 8649 1b1085 GetProcessHeap RtlAllocateHeap 8590->8649 8592 1c3bd7 8650 1c1ce2 8592->8650 8595 1c1ce2 2 API calls 8596 1c3be8 8595->8596 8597 1c1ce2 2 API calls 8596->8597 8598 1c3bef 8597->8598 8599 1c1ce2 2 API calls 8598->8599 8600 1c3bf7 8599->8600 8601 1c1ce2 2 API calls 8600->8601 8602 1c3bff 8601->8602 8603 1c1ce2 2 API calls 8602->8603 8604 1c3c07 8603->8604 8654 1b33bf lstrlenA 8604->8654 8608 1c3c1e 8662 1b5ea5 VirtualFree 8608->8662 8610 1c3c26 8611 1b33bf 4 API calls 8610->8611 8612 1c3c30 8611->8612 8613 1bfda5 5 API calls 8612->8613 8614 1c3c3b 8613->8614 8663 1b5ea5 VirtualFree 8614->8663 8616 1c3c43 8617 1b33bf 4 API calls 8616->8617 8618 1c3c4d 8617->8618 8619 1bfda5 5 API calls 8618->8619 8620 1c3c58 8619->8620 8664 1b5ea5 VirtualFree 8620->8664 8622 1c3c60 8623 1b33bf 4 API calls 8622->8623 8624 1c3c6c 8623->8624 8625 1bfda5 5 API calls 8624->8625 8626 1c3c77 8625->8626 8665 1b5ea5 VirtualFree 8626->8665 8628 1c3c7f 8629 1b33bf 4 API calls 8628->8629 8630 1c3c8b 8629->8630 8668 1bfdd1 8641->8668 8644->8582 8645->8584 8646->8586 8647->8588 8648->8590 8649->8592 8651 1c1ce8 8650->8651 8653 1c1d05 8651->8653 8674 1c1d0c Sleep GetTickCount 8651->8674 8653->8595 8655 1b33ee 8654->8655 8656 1b33d2 lstrlenA 8654->8656 8659 1bfda5 8655->8659 8657 1b5e22 VirtualAlloc 8656->8657 8658 1b33e2 lstrcpyA 8657->8658 8658->8655 8675 1b3125 8659->8675 8662->8610 8663->8616 8664->8622 8665->8628 8671 1b31c3 8668->8671 8672 1b5e22 VirtualAlloc 8671->8672 8673 1b2563 8672->8673 8673->8571 8674->8651 8683 1b5ea5 VirtualFree 8675->8683 8677 1b3133 8678 1b3157 CreateEventA 8677->8678 8684 1b3372 8677->8684 8678->8608 8680 1b3145 8681 1b5e22 VirtualAlloc 8680->8681 8682 1b314c lstrcatA 8681->8682 8682->8678 8683->8677 8685 1b3381 8684->8685 8686 1b3377 lstrlenA 8684->8686 8685->8680 8686->8680 8458 1bd2e9 DeleteCriticalSection 8459 1bd2fd CloseHandle 8458->8459 8460 1bd304 8458->8460 8459->8460 8461 1bd30d CloseHandle 8460->8461 8462 1bd314 8460->8462 8461->8462 8465 1b5558 WSACleanup 8462->8465 8472 1c0283 ReleaseMutex CloseHandle 8465->8472 8467 1b556c 8473 1b3036 8467->8473 8470 1b3036 2 API calls 8471 1b557c 8470->8471 8472->8467 8474 1b303f 8473->8474 8475 1b3044 8473->8475 8477 1b5eee GetProcessHeap RtlFreeHeap 8474->8477 8475->8470 8477->8475 8478 1b11ef 8481 1c2408 8478->8481 8488 1c0298 CreateMutexA 8481->8488 8483 1c241d 8489 1b5f53 GetProcessHeap HeapAlloc 8483->8489 8485 1c2425 8486 1b11f4 8485->8486 8490 1c2ed4 8485->8490 8488->8483 8489->8485 8502 1b5f53 GetProcessHeap HeapAlloc 8490->8502 8492 1c2ef4 8503 1b5f53 GetProcessHeap HeapAlloc 8492->8503 8494 1c2f1e 8495 1c2f2a 8494->8495 8513 1c266a 8494->8513 8504 1c290f CoInitialize CoCreateInstance 8495->8504 8499 1c2f3c 8500 1c2f4a 8499->8500 8516 1c273a CoInitialize CoCreateInstance 8499->8516 8500->8486 8502->8492 8503->8494 8505 1c2a66 8504->8505 8511 1c294f 8504->8511 8505->8499 8505->8500 8507 1c2996 VariantInit 8507->8511 8508 1c2a40 CoUninitialize 8508->8505 8511->8505 8511->8507 8511->8508 8511->8511 8527 1b5f53 GetProcessHeap HeapAlloc 8511->8527 8528 1c2bc7 8511->8528 8533 1b2481 8511->8533 8514 1c2bc7 2 API calls 8513->8514 8515 1c267b 8514->8515 8515->8495 8517 1c28aa CoUninitialize 8516->8517 8518 1c2786 8516->8518 8517->8499 8518->8517 8540 1c2a6b 8518->8540 8521 1c27b0 8521->8517 8522 1c27b9 CoCreateInstance 8521->8522 8522->8517 8523 1c27d7 8522->8523 8523->8517 8544 1c24eb 8523->8544 8527->8511 8537 1b5df1 GetProcessHeap HeapAlloc 8528->8537 8530 1c2bd2 8538 1b5df1 GetProcessHeap HeapAlloc 8530->8538 8532 1c2bde 8532->8511 8534 1b2490 8533->8534 8536 1b24ad 8533->8536 8539 1b5f53 GetProcessHeap HeapAlloc 8534->8539 8536->8511 8537->8530 8538->8532 8539->8536 8554 1c2447 CoInitialize CoCreateInstance 8540->8554 8542 1c2a7d CoCreateInstance 8543 1c2aa6 8542->8543 8543->8521 8545 1c2505 8544->8545 8546 1c24f6 CoTaskMemFree 8544->8546 8547 1c2b2a 8545->8547 8546->8545 8557 1b5ca3 LoadLibraryA GetProcAddress 8547->8557 8550 1b5ca3 3 API calls 8551 1c2b57 8550->8551 8552 1b5ca3 3 API calls 8551->8552 8553 1c2b90 8552->8553 8553->8517 8555 1c24df CoUninitialize 8554->8555 8556 1c247b 8554->8556 8555->8542 8556->8555 8558 1b5cc2 8557->8558 8559 1b5ce1 8557->8559 8560 1b5cd9 ExitProcess 8558->8560 8561 1b5cc6 8558->8561 8559->8550 8561->8560 8713 1b5ce2 GetCommandLineA 8714 1b5cf7 GetStartupInfoA 8713->8714 8722 1b5d70 8714->8722 8717 1b5d43 8718 1b5d52 GetModuleHandleA 8717->8718 8725 1c3435 8718->8725 8782 1b5c8e GetProcessHeap HeapAlloc 8722->8782 8724 1b5d7f 8724->8717 8726 1c345b 8725->8726 8727 1c3467 GetTickCount 8726->8727 8783 1b10ad 8727->8783 8729 1c3473 GetModuleFileNameA 8784 1c1e21 8729->8784 8731 1c36ad 9067 1c10d7 8731->9067 8733 1c349d 8733->8731 8791 1b1085 GetProcessHeap RtlAllocateHeap 8733->8791 8738 1c34c7 8739 1c34e3 CreateEventA GetLastError 8738->8739 8739->8731 8740 1c3506 8739->8740 8740->8731 8741 1c3512 RegCreateKeyExA RegSetValueExA RegSetValueExA RegCloseKey 8740->8741 8792 1b5a10 Sleep 8741->8792 8782->8724 8783->8729 9165 1b1085 GetProcessHeap RtlAllocateHeap 8784->9165 8786 1c1e36 CreateFileA 8787 1c1e5e GetFileSize ReadFile 8786->8787 8788 1c1e5b 8786->8788 8789 1c1e7c 8787->8789 8790 1c1e7e CloseHandle 8787->8790 8788->8787 8789->8790 8790->8733 8791->8738 9166 1c044f 8792->9166 8794 1b5a34 9171 1c0346 8794->9171 8797 1b33bf 4 API calls 8798 1b5a4f 8797->8798 9184 1c02b9 8798->9184 8802 1b5a67 9196 1b304c 8802->9196 8804 1b5a73 9199 1b2e93 8804->9199 8806 1b5a7f 8807 1b3036 2 API calls 8806->8807 8808 1b5a87 8807->8808 9203 1b595e 8808->9203 9068 1c10e6 9067->9068 9069 1c10e1 9067->9069 9523 1b5c16 9068->9523 9070 1c0fae RegCloseKey 9069->9070 9070->9068 9165->8786 9167 1bfece CreateMutexA 9166->9167 9168 1c0459 9167->9168 9242 1b5f53 GetProcessHeap HeapAlloc 9168->9242 9170 1c0477 9170->8794 9172 1b5a42 9171->9172 9173 1c0362 9171->9173 9172->8797 9173->9172 9174 1c03df 9173->9174 9175 1c0381 9173->9175 9174->9172 9178 1b2f91 6 API calls 9174->9178 9243 1b2f91 9175->9243 9177 1c0397 9177->9172 9246 1c0ac3 9177->9246 9250 1b2296 9177->9250 9180 1c03fd 9178->9180 9180->9172 9181 1c0ac3 6 API calls 9180->9181 9183 1b2296 6 API calls 9180->9183 9181->9180 9183->9180 9185 1b5a5f 9184->9185 9191 1c02cb 9184->9191 9195 1b5ea5 VirtualFree 9185->9195 9186 1b5ca3 3 API calls 9186->9191 9188 1b33bf 4 API calls 9188->9191 9191->9185 9191->9186 9191->9188 9192 1b3036 2 API calls 9191->9192 9193 1c0330 9191->9193 9272 1c0af9 9191->9272 9275 1b33a3 lstrcmpA 9191->9275 9276 1b5ea5 VirtualFree 9191->9276 9192->9191 9277 1b239e 9193->9277 9195->8802 9282 1b5eff GetProcessHeap RtlAllocateHeap 9196->9282 9198 1b305e 9198->8804 9200 1b2eab 9199->9200 9202 1b2eb0 9199->9202 9283 1b5eff GetProcessHeap RtlAllocateHeap 9200->9283 9202->8806 9284 1b2e4c 9203->9284 9206 1b304c 2 API calls 9207 1b5991 9206->9207 9291 1b5911 9207->9291 9242->9170 9262 1b5ec5 9243->9262 9245 1b2fa7 9245->9177 9247 1c0adc 9246->9247 9248 1b2f91 6 API calls 9247->9248 9249 1c0af1 9248->9249 9249->9177 9251 1b2364 9250->9251 9252 1b22b0 9250->9252 9254 1b2e93 2 API calls 9251->9254 9271 1b5f53 GetProcessHeap HeapAlloc 9252->9271 9255 1b238c 9254->9255 9256 1b3036 2 API calls 9255->9256 9258 1b2397 9256->9258 9257 1b22d9 9257->9257 9259 1b2e93 2 API calls 9257->9259 9261 1b2355 9257->9261 9258->9177 9259->9257 9260 1b1e71 2 API calls 9260->9251 9261->9251 9261->9260 9263 1b5ec9 GetProcessHeap RtlAllocateHeap 9262->9263 9264 1b5ed0 9262->9264 9263->9245 9266 1b5edc GetProcessHeap HeapReAlloc 9264->9266 9267 1b5ed4 9264->9267 9266->9245 9270 1b5eee GetProcessHeap RtlFreeHeap 9267->9270 9269 1b5ed9 9269->9245 9270->9269 9271->9257 9273 1b2e93 2 API calls 9272->9273 9274 1c0b21 9273->9274 9274->9191 9275->9191 9276->9191 9278 1b5ca3 3 API calls 9277->9278 9279 1b23b3 9278->9279 9280 1c0af9 2 API calls 9279->9280 9281 1b23c1 9280->9281 9281->9185 9282->9198 9283->9202 9312 1b5eff GetProcessHeap RtlAllocateHeap 9284->9312 9286 1b2e5b 9287 1b2f91 6 API calls 9286->9287 9288 1b2e84 9287->9288 9313 1b5eee GetProcessHeap RtlFreeHeap 9288->9313 9290 1b2e8b 9290->9206 9292 1b5945 9291->9292 9293 1b5923 9291->9293 9295 1b304c 2 API calls 9292->9295 9294 1b2e4c 8 API calls 9293->9294 9296 1b5935 9294->9296 9297 1b5955 9295->9297 9298 1b2e93 2 API calls 9296->9298 9301 1b60aa 9297->9301 9299 1b593d 9298->9299 9300 1b3036 2 API calls 9299->9300 9300->9292 9302 1b304c 2 API calls 9301->9302 9303 1b60c2 9302->9303 9304 1b304c 2 API calls 9303->9304 9305 1b6102 9304->9305 9306 1b3036 2 API calls 9305->9306 9307 1b610a 9306->9307 9308 1b3036 2 API calls 9307->9308 9309 1b6112 9308->9309 9310 1b3036 2 API calls 9309->9310 9312->9286 9313->9290 9524 1b3036 2 API calls 9523->9524 9525 1b5c22 9524->9525 9536 1b5ea5 VirtualFree 9525->9536 9527 1b5c2a 9537 1b5ea5 VirtualFree 9527->9537 9529 1b5c37 9538 1b5ea5 VirtualFree 9529->9538 9531 1b5c42 9539 1b5ea5 VirtualFree 9531->9539 9533 1b5c4d 9540 1b5ea5 VirtualFree 9533->9540 9535 1b5c58 9536->9527 9537->9529 9538->9531 9539->9533 9540->9535 12838 1c36e0 12839 1b1052 12838->12839 12840 1c3701 SHGetFolderPathW lstrcatW 12839->12840 12841 1b346a 9 API calls 12840->12841 12842 1c3737 12841->12842 12843 1b3761 7 API calls 12842->12843 12844 1c3757 12843->12844 12845 1b3679 8 API calls 12844->12845 12846 1c375e 12845->12846 12847 1b3665 2 API calls 12846->12847 12848 1c3766 12847->12848 12851 1b5ea5 VirtualFree 12848->12851 12850 1c376e 12851->12850

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 272 1c290f-1c2949 CoInitialize CoCreateInstance 273 1c294f-1c295b 272->273 274 1c2a66-1c2a6a 272->274 275 1c295f-1c2964 273->275 275->274 276 1c296a-1c2972 275->276 278 1c2a22-1c2a3a 276->278 280 1c2977-1c2990 278->280 281 1c2a40-1c2a45 278->281 280->281 288 1c2996-1c29b5 VariantInit 280->288 282 1c2a47-1c2a4d 281->282 283 1c2a50-1c2a55 281->283 282->283 284 1c2a57-1c2a5d 283->284 285 1c2a60 CoUninitialize 283->285 284->285 285->274 291 1c29ce-1c29d8 call 1b5f53 288->291 292 1c29b7-1c29cc 288->292 296 1c29da-1c29e3 call 1c2bc7 291->296 297 1c29e5 291->297 292->281 292->291 299 1c29e7-1c29f0 296->299 297->299 301 1c2a10-1c2a20 call 1b2481 299->301 302 1c29f2 299->302 301->278 303 1c29f4-1c2a0e 302->303 303->301 303->303
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 001C291E
                                                            • CoCreateInstance.OLE32(001C45E0,00000000,00000001,001C73F0,?,?,?,?,001C2F37,?,?,?,001C227B), ref: 001C293E
                                                            • VariantInit.OLEAUT32(?), ref: 001C299A
                                                            • CoUninitialize.OLE32(?,?,?,001C2F37,?,?,?,001C227B), ref: 001C2A60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInitInitializeInstanceUninitializeVariant
                                                            • String ID: Description$FriendlyName
                                                            • API String ID: 4142528535-3192352273
                                                            • Opcode ID: 7cbe2d35c5e9d93a7088ae360ad1567ad7067b6e45152e2ba65cbddd648c13bf
                                                            • Instruction ID: 16222b4909e5372fbd612a10cb8a346270de60a66f348c9118774daa3fef02ce
                                                            • Opcode Fuzzy Hash: 7cbe2d35c5e9d93a7088ae360ad1567ad7067b6e45152e2ba65cbddd648c13bf
                                                            • Instruction Fuzzy Hash: FB415174A00245AFCB24DFA6C894EBEBBB9FFD5B04B14445DE446EB250DB70DA41CB60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 502 1b1085-1b1098 GetProcessHeap RtlAllocateHeap
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                            • RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateProcess
                                                            • String ID:
                                                            • API String ID: 1357844191-0
                                                            • Opcode ID: cd0c0f28cd1e98b3453252b28a6400594443af6bac039b13f7ca1701760a7791
                                                            • Instruction ID: 84364700da9214ece2417b78d626ad5c02ec3a829ea8dbfd65ff5c782d620c9c
                                                            • Opcode Fuzzy Hash: cd0c0f28cd1e98b3453252b28a6400594443af6bac039b13f7ca1701760a7791
                                                            • Instruction Fuzzy Hash: F8B0123140C200FBDF001BE09D1CF093F28AB54703F054400F285C1460C631D0C0DB11

                                                            Control-flow Graph

                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 001C3467
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 001C3483
                                                              • Part of subcall function 001C1E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E4E
                                                              • Part of subcall function 001C1E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E61
                                                              • Part of subcall function 001C1E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E72
                                                              • Part of subcall function 001C1E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,001C349D), ref: 001C1E7F
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 001C34EA
                                                            • GetLastError.KERNEL32 ref: 001C34F5
                                                            • RegCreateKeyExA.KERNEL32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 001C352F
                                                            • RegSetValueExA.KERNEL32(?,MaxConnectionsPer1_0Server,00000000,00000004,?,00000004), ref: 001C354E
                                                            • RegSetValueExA.KERNEL32(?,MaxConnectionsPerServer,00000000,00000004,?,00000004), ref: 001C3563
                                                            • RegCloseKey.ADVAPI32(?), ref: 001C3569
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 001C35C5
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 001C35D8
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 001C35E7
                                                              • Part of subcall function 001C1A3C: GetModuleFileNameW.KERNEL32(00000000,002FCBF0,00000208,00000000,00000000,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A58
                                                              • Part of subcall function 001C1A3C: IsUserAnAdmin.SHELL32 ref: 001C1A5E
                                                              • Part of subcall function 001C1A3C: FindResourceW.KERNEL32(00000000,00000066,WM_DSP,?,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A87
                                                              • Part of subcall function 001C1A3C: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,001B57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 001C1A91
                                                              • Part of subcall function 001C1A3C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,001B57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 001C1A9B
                                                              • Part of subcall function 001C1A3C: LockResource.KERNEL32(00000000,?,?,?,?,001B57B9,?,00000000,00000000,?,?,?,?,?,?,00000000), ref: 001C1AA2
                                                              • Part of subcall function 001C1136: CopyFileW.KERNEL32(?,?,00000000,?,001C4684,?,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 001C11D7
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001C0BD9: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,75A901C0,00000000), ref: 001C0C14
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            • MaxConnectionsPerServer, xrefs: 001C355A
                                                            • MaxConnectionsPer1_0Server, xrefs: 001C3545
                                                            • Software\Microsoft\Windows\CurrentVersion\Internet Settings, xrefs: 001C3525
                                                            • \Microsoft Vision\, xrefs: 001C35CB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Create$Resource$CloseHeapModuleNameProcessValue$AdminAllocateCopyCountDirectoryErrorEventFindFolderFreeHandleLastLoadLockPathReadSizeSizeofTickUserVirtuallstrcatlstrcpy
                                                            • String ID: MaxConnectionsPer1_0Server$MaxConnectionsPerServer$Software\Microsoft\Windows\CurrentVersion\Internet Settings$\Microsoft Vision\
                                                            • API String ID: 3138263686-2552559493
                                                            • Opcode ID: 6193438ffc20757c8ab6494c10fcc42c0e5c1faf3ff31611a31b35a61bee8a19
                                                            • Instruction ID: 042d8f99678c5ceb27eb49c6cdbd2300e597583ca443cc16c85bd18255c44c49
                                                            • Opcode Fuzzy Hash: 6193438ffc20757c8ab6494c10fcc42c0e5c1faf3ff31611a31b35a61bee8a19
                                                            • Instruction Fuzzy Hash: 1D615EB1448344AFD720EB60DC96FEBB7ACEBA4704F40492EF69592151DB70DA48CB62

                                                            Control-flow Graph

                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(002FE020), ref: 001BE710
                                                              • Part of subcall function 001B5F53: GetProcessHeap.KERNEL32(00000000,000000F4,001C0477,?,75A901C0,00000000,001B5A34), ref: 001B5F56
                                                              • Part of subcall function 001B5F53: HeapAlloc.KERNEL32(00000000), ref: 001B5F5D
                                                              • Part of subcall function 001B31D4: ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 001B3207
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCriticalEnvironmentExpandFreeInitializeProcessSectionStringsVirtuallstrcpy
                                                            • String ID: /$%ProgramFiles%$%ProgramW6432%$%windir%\System32$H/$TermService$T/$X/$X/$\Microsoft DN1$\rdpwrap.ini$\rfxvmt.dll$\sqlmap.dll$\/$`/$`/
                                                            • API String ID: 2811233055-1830286314
                                                            • Opcode ID: 3f0d1d1e762ccb411daa8677a802208fa8eb7d2987d8484b16bcd74aa641ec8f
                                                            • Instruction ID: 2926653a4c439c77075ca5ae2002af1f9a82badb987307d535c26c48fd8a4cb8
                                                            • Opcode Fuzzy Hash: 3f0d1d1e762ccb411daa8677a802208fa8eb7d2987d8484b16bcd74aa641ec8f
                                                            • Instruction Fuzzy Hash: 4831E470B00654A7DF16BF689C56EFDB66A9BF4750702047EF102772A2CFA08E55CB50

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 001BF481: GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,001C3589,?,001C1618,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\,00000000,InitWindows), ref: 001BF4A2
                                                              • Part of subcall function 001C0F6E: RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,75A901C0,?,?,001C1165,?,?), ref: 001C0F8E
                                                              • Part of subcall function 001C0FAE: RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,001C4684,?,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 001C11D7
                                                              • Part of subcall function 001C106C: RegCreateKeyExW.ADVAPI32(75A901C0,00000000,00000000,00000000,00000000,001C3589,00000000,?,?,?,?,001C3589,?,001C158B,80000001,?), ref: 001C10A0
                                                              • Part of subcall function 001C106C: RegOpenKeyExW.KERNEL32(75A901C0,00000000,00000000,001C3589,?,?,?,001C3589,?,001C158B,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 001C10BB
                                                              • Part of subcall function 001C1039: RegSetValueExW.KERNEL32(?,75A901C0,00000000,?,?,?,?,?,001C1432,00000000,00000000,?,00000001,?,?,?), ref: 001C1058
                                                            • SHGetKnownFolderPath.SHELL32(001C4550,00000000,00000000,?,?,?,?,?,00000000,75A901C0,00000000), ref: 001C1264
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,:start,?,001C7204,wmic process call create '",00000000,?,?,?,:start,") do %%A,for /F "usebackq tokens=*" %%A in ("), ref: 001C1382
                                                              • Part of subcall function 001BF76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 001BF79C
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001BF71F: SHCreateDirectoryExW.SHELL32(00000000,?,00000000,001C11A6,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 001BF725
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001B3335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,001C3589,?,001C1515,001C3589,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3365
                                                            • DeleteFileW.KERNEL32(?,00000000,:Zone.Identifier,?,?,?,?,?,00000000,75A901C0,00000000), ref: 001C147C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Create$CopyFolderPathlstrcpy$CloseDeleteDirectoryFreeKnownModuleNameOpenSpecialValueVirtuallstrcat
                                                            • String ID: ") do %%A$:Zone.Identifier$:start$\programs.bat$for /F "usebackq tokens=*" %%A in ("$wmic process call create '"
                                                            • API String ID: 2154703971-2016382161
                                                            • Opcode ID: d95dc77745188df7269cb91fb6080d7c3ab3153201fa49a525434e03c79391bc
                                                            • Instruction ID: 49f9ccc86be41bdb0cb66f6ca4603744d43184a89172c9a378db66fcf1c979fc
                                                            • Opcode Fuzzy Hash: d95dc77745188df7269cb91fb6080d7c3ab3153201fa49a525434e03c79391bc
                                                            • Instruction Fuzzy Hash: 42A10D71A00109ABDF19EFA0CC92EEEB779AFA5700B50456DF81267192DF30EB59CB50

                                                            Control-flow Graph

                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(002FDB10,?,001B1221), ref: 001B99D3
                                                            • LoadLibraryW.KERNEL32(User32.dll,?,001B1221), ref: 001B99FE
                                                              • Part of subcall function 001C0969: lstrcmpA.KERNEL32(?,001C1BD0,?,open,001C1BD0), ref: 001C09A2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalInitializeLibraryLoadSectionlstrcmp
                                                            • String ID: GetRawInputData$MapVirtualKeyA$ToUnicode$User32.dll
                                                            • API String ID: 4274177235-2474467583
                                                            • Opcode ID: d9a3a1a32899577390098562b6c212bc7c5cc8e13d047f4fb55eb9abf4ba4fd8
                                                            • Instruction ID: 34947b3f22c5504f8e7c6c2822717208a66bd1a91133dc791340e873061b3cd3
                                                            • Opcode Fuzzy Hash: d9a3a1a32899577390098562b6c212bc7c5cc8e13d047f4fb55eb9abf4ba4fd8
                                                            • Instruction Fuzzy Hash: BE016271A642109F8345AF64FD2CB393A97E7A8BA8713413EF109D7351DB308891CB49

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 317 1b5ce2-1b5cf5 GetCommandLineA 318 1b5d1f-1b5d21 317->318 319 1b5cf7-1b5cfc 317->319 320 1b5d1c-1b5d1d 318->320 321 1b5d23 318->321 322 1b5d0f-1b5d1a 319->322 323 1b5cfe 319->323 320->318 324 1b5d2c-1b5d2e 321->324 326 1b5d2a 322->326 325 1b5d00-1b5d04 323->325 327 1b5d30-1b5d69 GetStartupInfoA call 1b5d70 call 1b5d9d GetModuleHandleA call 1c3435 call 1b5d85 ExitProcess 324->327 328 1b5d25-1b5d27 324->328 325->322 329 1b5d06-1b5d0d 325->329 326->324 328->327 330 1b5d29 328->330 329->322 329->325 330->326
                                                            APIs
                                                            • GetCommandLineA.KERNEL32 ref: 001B5CE9
                                                            • GetStartupInfoA.KERNEL32(?), ref: 001B5D38
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 001B5D54
                                                            • ExitProcess.KERNEL32 ref: 001B5D69
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                            • String ID:
                                                            • API String ID: 2164999147-0
                                                            • Opcode ID: 6c04b7a065000ccabc8cc6ef24bb0a9d79cd3fe2e51ce34d6dddd01bdc59353f
                                                            • Instruction ID: 0a49b68c901831db4fd8533fac73b36f3ac94536ccaa19e6cad2c5cf2176b1ad
                                                            • Opcode Fuzzy Hash: 6c04b7a065000ccabc8cc6ef24bb0a9d79cd3fe2e51ce34d6dddd01bdc59353f
                                                            • Instruction Fuzzy Hash: 490121240089445FD7251FF4D45DBE93F675F27344BA81148E4C2C7113D7134C87C665

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 339 1c1e21-1c1e59 call 1b1085 CreateFileA 342 1c1e5e-1c1e7a GetFileSize ReadFile 339->342 343 1c1e5b 339->343 344 1c1e7c 342->344 345 1c1e7e-1c1e8b CloseHandle 342->345 343->342 344->345
                                                            APIs
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E4E
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E61
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E72
                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,001C349D), ref: 001C1E7F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                                            • String ID:
                                                            • API String ID: 2517252058-0
                                                            • Opcode ID: 78490cdeb3eff6828d30c4eb08f6fee3590f151e1687fb3b01e1c37a7ec7f216
                                                            • Instruction ID: 58db98496724cc0cb49e08f0e81a5a2b7043cc7c20a31fc504b509c444875968
                                                            • Opcode Fuzzy Hash: 78490cdeb3eff6828d30c4eb08f6fee3590f151e1687fb3b01e1c37a7ec7f216
                                                            • Instruction Fuzzy Hash: 1EF062B2B55210BFF3205B65AC19FBB7BACEB65725F200129FD51E21C0E7B09D4086A4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 346 1bfbfc-1bfc1d GetCurrentProcess OpenProcessToken 347 1bfc3f-1bfc43 346->347 348 1bfc1f-1bfc3b GetTokenInformation 346->348 349 1bfc4e-1bfc57 347->349 350 1bfc45-1bfc48 CloseHandle 347->350 348->347 350->349
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,001C3589,?), ref: 001BFC0E
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,001C3589,?), ref: 001BFC15
                                                            • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,001C3589,?), ref: 001BFC33
                                                            • CloseHandle.KERNEL32(00000000), ref: 001BFC48
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                            • String ID:
                                                            • API String ID: 215268677-0
                                                            • Opcode ID: d76f07ee47b939562dcd343f8181f5c9c1db258547e0f92d26fa891c33a9225e
                                                            • Instruction ID: 8133299fcbd39a710982f1dc6437fd09e8cf1196fa6fab2550054724c5635b82
                                                            • Opcode Fuzzy Hash: d76f07ee47b939562dcd343f8181f5c9c1db258547e0f92d26fa891c33a9225e
                                                            • Instruction Fuzzy Hash: 24F0E772904218FBDB159BA09D0AEDEBFB8EF04741F114165FA01A6190D770DF95DA90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 421 1c0bd9-1c0c1c call 1b1052 CreateProcessW 424 1c0c1e-1c0c26 421->424 425 1c0c28 421->425 426 1c0c2a-1c0c2d 424->426 425->426
                                                            APIs
                                                            • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,75A901C0,00000000), ref: 001C0C14
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID: D
                                                            • API String ID: 963392458-2746444292
                                                            • Opcode ID: de683ab72fd79fc7af927afe912b736c183ace1e6109a8add61f01574eab16ee
                                                            • Instruction ID: 8361d2cda310bb839ab3a8944fd10f19fb85849454cd668e264620280db695d5
                                                            • Opcode Fuzzy Hash: de683ab72fd79fc7af927afe912b736c183ace1e6109a8add61f01574eab16ee
                                                            • Instruction Fuzzy Hash: E5F030B2600209AFDB00DFE4CC85EAF77BCEB54348B008929F64A9B240E774DD088764

                                                            Control-flow Graph

                                                            APIs
                                                            • Sleep.KERNEL32(000001F4,00000000,75A901C0,00000000), ref: 001B5A26
                                                              • Part of subcall function 001B33BF: lstrlenA.KERNEL32(?,75A901C0,?,001B5A4F,.bss,00000000), ref: 001B33C8
                                                              • Part of subcall function 001B33BF: lstrlenA.KERNEL32(?,?,001B5A4F,.bss,00000000), ref: 001B33D5
                                                              • Part of subcall function 001B33BF: lstrcpyA.KERNEL32(00000000,?,?,001B5A4F,.bss,00000000), ref: 001B33E8
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpylstrlen$FreeSleepVirtual
                                                            • String ID: .bss
                                                            • API String ID: 277671435-3890483948
                                                            • Opcode ID: b0f6b243dd20f83c82831ba3a20b119bd2d5afb59a371456e083e83b38ee8af2
                                                            • Instruction ID: e07424fc6f3b651266a99fe7cff2a5e289933f1fb5f49627b1428f57634f9c24
                                                            • Opcode Fuzzy Hash: b0f6b243dd20f83c82831ba3a20b119bd2d5afb59a371456e083e83b38ee8af2
                                                            • Instruction Fuzzy Hash: 28514F75904549AFCB15EFA0C9D19EEBBB5BF64304B1001AAE416AB256EF30EB05CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 489 1c106c-1c107c 490 1c107e-1c108a call 1bf731 489->490 491 1c10b1-1c10c3 RegOpenKeyExW 489->491 490->491 497 1c108c-1c10a8 RegCreateKeyExW 490->497 492 1c10c8 491->492 493 1c10c5-1c10c6 491->493 495 1c10ca-1c10ce 492->495 493->495 497->492 498 1c10aa-1c10ac call 1c0fae 497->498 498->491
                                                            APIs
                                                            • RegOpenKeyExW.KERNEL32(75A901C0,00000000,00000000,001C3589,?,?,?,001C3589,?,001C158B,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 001C10BB
                                                              • Part of subcall function 001BF731: RegOpenKeyExW.ADVAPI32(75A901C0,00000000,00000000,00020019,00000000,75A901C0,?,001C1088,?,?,001C3589,?,001C158B,80000001,?,000F003F), ref: 001BF747
                                                            • RegCreateKeyExW.ADVAPI32(75A901C0,00000000,00000000,00000000,00000000,001C3589,00000000,?,?,?,?,001C3589,?,001C158B,80000001,?), ref: 001C10A0
                                                              • Part of subcall function 001C0FAE: RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Open$CloseCreate
                                                            • String ID:
                                                            • API String ID: 1752019758-0
                                                            • Opcode ID: 9dc86dc55d4aeb18f01f823f6b0b097fb2b6d6699d8293ad15b55df0ff7c8a3c
                                                            • Instruction ID: 70bda330ec3b633a63765834432775c637e691ffe252dc77ca856c29d58680df
                                                            • Opcode Fuzzy Hash: 9dc86dc55d4aeb18f01f823f6b0b097fb2b6d6699d8293ad15b55df0ff7c8a3c
                                                            • Instruction Fuzzy Hash: D7013C7124424DBFAB119E91EC90EBF7BAEFF66394710402EFD0582211E731DDB19AA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 500 1c1d0c-1c1d34 Sleep GetTickCount
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CountSleepTick
                                                            • String ID:
                                                            • API String ID: 2804873075-0
                                                            • Opcode ID: de93daad4bf4f8d21f4a4d69800c584ec426efa9d95f44d071439205c3e20829
                                                            • Instruction ID: a1c40a67451c588962b4a2068d7acc23af37abe1e3800e6c630d8faa5a58e85a
                                                            • Opcode Fuzzy Hash: de93daad4bf4f8d21f4a4d69800c584ec426efa9d95f44d071439205c3e20829
                                                            • Instruction Fuzzy Hash: 15D0223034C1044FE30CAB09FC6EA213E6EE7E0305F08C02BF54EC90E0C9B0A5E08440

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 501 1c0283-1c0297 ReleaseMutex CloseHandle
                                                            APIs
                                                            • ReleaseMutex.KERNEL32(?,?,001BFEFD,001C3578,001B5BEC,001C3578,00000000,00000000,00000000,00000000,?,?,?,?,00000000,.bss), ref: 001C0288
                                                            • CloseHandle.KERNEL32(?), ref: 001C0290
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandleMutexRelease
                                                            • String ID:
                                                            • API String ID: 4207627910-0
                                                            • Opcode ID: 080825963bba6b49dcba94f05af04aa0ab0a0e149b65ac1e926bb5fb15b8cd12
                                                            • Instruction ID: 711b5179ae17cbb9e814620d0fefdb0f5a0a9c41b2586e32d23cb3f730623b59
                                                            • Opcode Fuzzy Hash: 080825963bba6b49dcba94f05af04aa0ab0a0e149b65ac1e926bb5fb15b8cd12
                                                            • Instruction Fuzzy Hash: 79B0923A009020DFEB252F54FC1DC94BFB6FF18251319046AF1C1814388BB35CA09B80
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,?,001B2FA7,001B5A42,?,?,001C03FD,001B5A42,?,?,75A901C0,00000000,?,001B5A42,00000000), ref: 001B5F02
                                                            • RtlAllocateHeap.NTDLL(00000000,?,001C03FD,001B5A42,?,?,75A901C0,00000000,?,001B5A42,00000000), ref: 001B5F09
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateProcess
                                                            • String ID:
                                                            • API String ID: 1357844191-0
                                                            • Opcode ID: a84567f6b363b3848eecec499e51b84c40b43ce9e953a73ef2ae881260c2cae6
                                                            • Instruction ID: c569d936b4e6df76acbe14c46ff0ad263d0fe421c6a2aba556cdb8c076a168a1
                                                            • Opcode Fuzzy Hash: a84567f6b363b3848eecec499e51b84c40b43ce9e953a73ef2ae881260c2cae6
                                                            • Instruction Fuzzy Hash: B1A00271554100ABEE4457E49D5DF153E1CA755702F054544B185C54509965A4C48725
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,?,001B3044,?,001B5C22,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EF1
                                                            • RtlFreeHeap.NTDLL(00000000,?,?,001C36B9), ref: 001B5EF8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$FreeProcess
                                                            • String ID:
                                                            • API String ID: 3859560861-0
                                                            • Opcode ID: 98294e5244258497a35fea2eaec2e68e52398aed0d5efb833ae82afa8737176d
                                                            • Instruction ID: 80984def5cae23750cc0e5f6b3e2d8746d45bedd964db99df8c046a65349ab98
                                                            • Opcode Fuzzy Hash: 98294e5244258497a35fea2eaec2e68e52398aed0d5efb833ae82afa8737176d
                                                            • Instruction Fuzzy Hash: 68A0027155C100ABFD4457E09D1DF553D2C9755702F054544B246C6550966494908631
                                                            APIs
                                                              • Part of subcall function 001B308C: lstrlenA.KERNEL32(00000000,001B30B4,75A901C0,00000000,00000000,?,001B32DC,001B350E,00000000,-00000001,75A901C0,?,001B350E,00000000,?,00000000), ref: 001B3093
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,-00000002,00000000,00000000,75A901C0,00000000,00000000,?,001B32DC,001B350E,00000000,-00000001,75A901C0), ref: 001B30CA
                                                              • Part of subcall function 001B5E22: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,001B33E2,?,001B5A4F,.bss,00000000), ref: 001B5E30
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,?,001B32DC,001B350E,00000000,-00000001,75A901C0,?,001B350E,00000000), ref: 001B30F5
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$ByteCharMultiVirtualWidelstrcpy$AllocFree
                                                            • String ID:
                                                            • API String ID: 4006399363-0
                                                            • Opcode ID: bee3d34915352654e46d325e50896ad618aa972894fec64e0a20b4c4a0143b19
                                                            • Instruction ID: e8434b0d36d031a206f3055842df464baf54e7faad369242411ad83c3f6d89cf
                                                            • Opcode Fuzzy Hash: bee3d34915352654e46d325e50896ad618aa972894fec64e0a20b4c4a0143b19
                                                            • Instruction Fuzzy Hash: 27015E75600124BBDB25FFA9CC96EDEBBAD9F59350B00012AF511DB292CB74DF0087A0
                                                            APIs
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,001C3589,?,001C1618,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\,00000000,InitWindows), ref: 001BF4A2
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001B1099: GetProcessHeap.KERNEL32(00000000,00000000,001C1E18,00000000,00000000,00000000,00000000,.bss,00000000), ref: 001B109F
                                                              • Part of subcall function 001B1099: HeapFree.KERNEL32(00000000), ref: 001B10A6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$FreeProcesslstrcpylstrlen$AllocateFileModuleNameVirtual
                                                            • String ID:
                                                            • API String ID: 258861418-0
                                                            • Opcode ID: 841bdd32e1018db94bdb19a0bb3bbd61ac3d6b081fe6b2e62c0cf057f86713e3
                                                            • Instruction ID: 7a5fcfe2e66f56575ad0f5c88e7c99d2c126c68bf80dc3b3cd118677b5c6ff0c
                                                            • Opcode Fuzzy Hash: 841bdd32e1018db94bdb19a0bb3bbd61ac3d6b081fe6b2e62c0cf057f86713e3
                                                            • Instruction Fuzzy Hash: 78E06D726042507BD714B765DC26FEF7BADCFA1362F010029F10596181EFA49A4086A0
                                                            APIs
                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 001BF79C
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$FolderPathSpeciallstrcpy
                                                            • String ID:
                                                            • API String ID: 1680175942-0
                                                            • Opcode ID: ccaaf21ca542145697186bd7ccd1b41fcb6543fd148cc0fc5b3738911ff21d63
                                                            • Instruction ID: 672ea0b5bf7eedf9649b74c247c28d38098fb7fdbb1c6a5728c35a7dd868bb18
                                                            • Opcode Fuzzy Hash: ccaaf21ca542145697186bd7ccd1b41fcb6543fd148cc0fc5b3738911ff21d63
                                                            • Instruction Fuzzy Hash: 2CE0487574031877DB70A655AC0EFC77A6CDBD4711F040171B658D71D1EE60DA45C6E0
                                                            APIs
                                                            • RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,75A901C0,?,?,001C1165,?,?), ref: 001C0F8E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 5fad129797fce0ef2175cfd9249893c4eb35f35ec2459f3118b8181b6632e134
                                                            • Instruction ID: b20db31fda9fa702bbd6646d0ac518d9740dd56ab3075875a68424684951093b
                                                            • Opcode Fuzzy Hash: 5fad129797fce0ef2175cfd9249893c4eb35f35ec2459f3118b8181b6632e134
                                                            • Instruction Fuzzy Hash: E9E0DF32519229FFDB348B528D09FCB3E6CDF49BE4F008018F60AA2040C2B18A80D6F0
                                                            APIs
                                                            • ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 001B3207
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$EnvironmentExpandStringslstrcpy
                                                            • String ID:
                                                            • API String ID: 1709970682-0
                                                            • Opcode ID: f320012cf9bb6197bbc6bd199f5e002390f2086f57ef6d5f4277e3e8b176bc32
                                                            • Instruction ID: 6eb280d5d8ed9d92207a5ab41cf65b4a264190445d889e561400c602d819f7fb
                                                            • Opcode Fuzzy Hash: f320012cf9bb6197bbc6bd199f5e002390f2086f57ef6d5f4277e3e8b176bc32
                                                            • Instruction Fuzzy Hash: EDE048B670011967DB30A6159C06FD677ADDBC4718F040075F708F21C4EA75DA46C6A4
                                                            APIs
                                                            • RegSetValueExW.KERNEL32(?,75A901C0,00000000,?,?,?,?,?,001C1432,00000000,00000000,?,00000001,?,?,?), ref: 001C1058
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: c34e4d18c89a8482b74061e8658b0189bf6c1240d37f9c3dca74142aa307c19b
                                                            • Instruction ID: 6362343ac61bd29936a711127b4135d6b1e28fc4e86210b1091ee922805dbc25
                                                            • Opcode Fuzzy Hash: c34e4d18c89a8482b74061e8658b0189bf6c1240d37f9c3dca74142aa307c19b
                                                            • Instruction Fuzzy Hash: 6FE01232241254BFDB008F94CC44FAB7BA8EB5AB90B258459FE058B221D731EC609BA4
                                                            APIs
                                                              • Part of subcall function 001B3261: lstrlenW.KERNEL32(75A901C0,001B3646,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3268
                                                            • lstrcatW.KERNEL32(00000000,75A901C0,?,?,001C3589,?,001C1515,001C3589,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3365
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcatlstrlen
                                                            • String ID:
                                                            • API String ID: 1475610065-0
                                                            • Opcode ID: ed8331381f38108276b71f6ad50573b66ca84744ac8b528a95eca1c7be6b1e0b
                                                            • Instruction ID: 56c75237719f19fdeec85f0195fa58ffd1ed239ec5846f24a7b8ada2727d2166
                                                            • Opcode Fuzzy Hash: ed8331381f38108276b71f6ad50573b66ca84744ac8b528a95eca1c7be6b1e0b
                                                            • Instruction Fuzzy Hash: FCE086722042149BCB016BA9ECC59AEBBAEEFA5360B040576FA05D7211EB31BD1096E0
                                                            APIs
                                                              • Part of subcall function 001C0298: CreateMutexA.KERNEL32(00000000,00000000,00000000,?,001BFEDE,?,?,001C0459,?,75A901C0,00000000,001B5A34), ref: 001C02A0
                                                            • WSAStartup.WS2_32(00000002,?), ref: 001B58FC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateMutexStartup
                                                            • String ID:
                                                            • API String ID: 3730780901-0
                                                            • Opcode ID: 429cea290db2873c0b4ea79ad2f4bd5d1a3221534499d10d5d158c9dcb728ab0
                                                            • Instruction ID: 118d62e78c912b98e04739903b7bb971a82c3e503fb2b2662fda1a5f8bad3afe
                                                            • Opcode Fuzzy Hash: 429cea290db2873c0b4ea79ad2f4bd5d1a3221534499d10d5d158c9dcb728ab0
                                                            • Instruction Fuzzy Hash: 17E0C971501B508BC270AF2A9945997FBE8FFE47207401B1FA4A782A61C7B0A5458B90
                                                            APIs
                                                              • Part of subcall function 001B3125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,001B35C4,00000000,00000000,?,001B4E98,?,?,?,?,?,00000000), ref: 001B3151
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,?,?), ref: 001BFDC0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateEventlstrcat
                                                            • String ID:
                                                            • API String ID: 2275612694-0
                                                            • Opcode ID: f1d273521fde6e14c703aaee3bb5eca47dbd286e9d4c6e86d49af8936548ab36
                                                            • Instruction ID: d3dafd19ab8adfb8edd471b2ab5bf1d30cd2a1f3549ab6e57cc93c5535f13a11
                                                            • Opcode Fuzzy Hash: f1d273521fde6e14c703aaee3bb5eca47dbd286e9d4c6e86d49af8936548ab36
                                                            • Instruction Fuzzy Hash: C4D05E722482057BD710AB95DC06F86FF69EB65760F004026F65986590DBB1A070C790
                                                            APIs
                                                            • CreateMutexA.KERNEL32(00000000,00000000,00000000,?,001BFEDE,?,?,001C0459,?,75A901C0,00000000,001B5A34), ref: 001C02A0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: 23787c31eaf96b06f802328f980b3c8595c6a8bb9bbedd669c97df61d7556a49
                                                            • Instruction ID: f0700d22fa0540937fca037a48e559fb304a8f5a02d263060c3ba77d3989ff7b
                                                            • Opcode Fuzzy Hash: 23787c31eaf96b06f802328f980b3c8595c6a8bb9bbedd669c97df61d7556a49
                                                            • Instruction Fuzzy Hash: 9CD012B15045205FA3249F396C48C67B5EDEF98720315CE29B4A5C71D4E6308C808770
                                                            APIs
                                                            • WSACleanup.WS2_32 ref: 001B555B
                                                              • Part of subcall function 001C0283: ReleaseMutex.KERNEL32(?,?,001BFEFD,001C3578,001B5BEC,001C3578,00000000,00000000,00000000,00000000,?,?,?,?,00000000,.bss), ref: 001C0288
                                                              • Part of subcall function 001C0283: CloseHandle.KERNEL32(?), ref: 001C0290
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CleanupCloseHandleMutexRelease
                                                            • String ID:
                                                            • API String ID: 708017517-0
                                                            • Opcode ID: 1cb9f5f3eb18c7c2007e7a9c451082e3c0bd270666b70724fd67fbc68c551f79
                                                            • Instruction ID: 48a06e8059e29658c6fb16cfdac1e54dc7ad6425e7d36b8bea05b13ee1c103f3
                                                            • Opcode Fuzzy Hash: 1cb9f5f3eb18c7c2007e7a9c451082e3c0bd270666b70724fd67fbc68c551f79
                                                            • Instruction Fuzzy Hash: 52D092310186558BC378FB30D8A59EAB3B1BF28340340092EE0A303891AF60AA45CB40
                                                            APIs
                                                            • RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: de61b8ed74125ce9ad21b7e32f041b0c7aee42cdb37cf029b771dfad268d911e
                                                            • Instruction ID: 6916a888a897cfdca4a424ec12dbd2532bf01a70cebf922c4e9bc375b35b6a55
                                                            • Opcode Fuzzy Hash: de61b8ed74125ce9ad21b7e32f041b0c7aee42cdb37cf029b771dfad268d911e
                                                            • Instruction Fuzzy Hash: 81C04C31014221CBD7361F14F404B90B6F5AB04312F25045DE4C055464D7B54CD0CA44
                                                            APIs
                                                            • SHCreateDirectoryExW.SHELL32(00000000,?,00000000,001C11A6,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 001BF725
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateDirectory
                                                            • String ID:
                                                            • API String ID: 4241100979-0
                                                            • Opcode ID: 1c7449cccdff30157b198825fe116de62a1356ad7776167bbdd71ae70327588a
                                                            • Instruction ID: 8fb7fe9861ca204bce016bd29a5eba515a8d7a199b0aac810634130f910fd80a
                                                            • Opcode Fuzzy Hash: 1c7449cccdff30157b198825fe116de62a1356ad7776167bbdd71ae70327588a
                                                            • Instruction Fuzzy Hash: 50B012303EC30157DA001B709C07F1039119742F07F200160B156C80E0C65140005504
                                                            APIs
                                                            • lstrcmpA.KERNEL32(?,001C1BD0,?,open,001C1BD0), ref: 001C09A2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmp
                                                            • String ID:
                                                            • API String ID: 1534048567-0
                                                            • Opcode ID: ee3ce7899af6503a448cc8f6be4fd7670433912cff741008c76c63644c4c162c
                                                            • Instruction ID: fc420ac34d9c5bfbcc3b54b9433291ad5624c1203134cdd3b1a7643d321e0a6d
                                                            • Opcode Fuzzy Hash: ee3ce7899af6503a448cc8f6be4fd7670433912cff741008c76c63644c4c162c
                                                            • Instruction Fuzzy Hash: AD015E71A00515EFD725DF99C881F6AB7B8FF59358705016DA445C3B02EB30ED55CAD0
                                                            APIs
                                                            • CoUninitialize.COMBASE(?,?,001C238A,007EE108,001B4D2D), ref: 001C2CFF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Uninitialize
                                                            • String ID:
                                                            • API String ID: 3861434553-0
                                                            • Opcode ID: 703c6efb7efcc3176c926f94e7c64ccc98cd657c5d0b9a052a79e1a90409ac60
                                                            • Instruction ID: 0b359a8439c66c265bd20906f516cc17283cd8c62cf6453e0e9165ae4e24fedf
                                                            • Opcode Fuzzy Hash: 703c6efb7efcc3176c926f94e7c64ccc98cd657c5d0b9a052a79e1a90409ac60
                                                            • Instruction Fuzzy Hash: 6401B3752127008BD73CEF25D994DAAB7F4FFA87053441A6DE49787A61CB35F804CA50
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,001B33E2,?,001B5A4F,.bss,00000000), ref: 001B5E30
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 1735ed26d5f14d02b6bf7389149d3ec947c71c615ed754ca9a7f5919a4af1f25
                                                            • Instruction ID: ed28a9717188d623de31691cb8bf9fe15536714d97d50ffe7dbe9195b3f28987
                                                            • Opcode Fuzzy Hash: 1735ed26d5f14d02b6bf7389149d3ec947c71c615ed754ca9a7f5919a4af1f25
                                                            • Instruction Fuzzy Hash: 9FC0122234826027F124121A7C1AFAB8D6DCBD1F71F01001EF7048A2D0D9D14C4241A4
                                                            APIs
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: ff16521be1f04897e23df9b168fd362b1021d85adb5f53e9f1cd08607c2e7095
                                                            • Instruction ID: 9fa34c70fa1ffad9032d98b04555e8c30c0c1c96e5940547b021d53deeae2802
                                                            • Opcode Fuzzy Hash: ff16521be1f04897e23df9b168fd362b1021d85adb5f53e9f1cd08607c2e7095
                                                            • Instruction Fuzzy Hash: 94B0923438070057EF2CCB309CA6FA96712BB80B06FA1458CB142DA4D08BA5E8418A04
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,001B3652,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B5EBE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: b425d1f8f6c165de9278a86d71efe1263e3538e5ec12e5f0e043ddaa8026fd92
                                                            • Instruction ID: 1c82cceb30ae86b1efae05c27d6f5cb66595291741328b2439595fa49ce71650
                                                            • Opcode Fuzzy Hash: b425d1f8f6c165de9278a86d71efe1263e3538e5ec12e5f0e043ddaa8026fd92
                                                            • Instruction Fuzzy Hash: BFA002B47D93407BFD695760AD2FF553D28A750F16F200144B30D6D4D055E165508529
                                                            APIs
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: 0f7fb7f87a16058f5252e591bf178d259793710f36b8bf7f69855d68080da45a
                                                            • Instruction ID: 80a9cfcfcbc559eb377bcc02c5c0841bbd7f671bf4fe3c55681cf181bc76b9b0
                                                            • Opcode Fuzzy Hash: 0f7fb7f87a16058f5252e591bf178d259793710f36b8bf7f69855d68080da45a
                                                            • Instruction Fuzzy Hash: B9A002746D470067ED7457606D5BF452A14A740B01F2146447241A84E049A5E4848A58
                                                            APIs
                                                            • GetAsyncKeyState.USER32(00000010), ref: 001B8A11
                                                            • CallNextHookEx.USER32(00000000,?,?,?), ref: 001B8E12
                                                              • Part of subcall function 001B8E66: GetForegroundWindow.USER32(?,?,?), ref: 001B8E8F
                                                              • Part of subcall function 001B8E66: GetWindowTextW.USER32(00000000,?,00000104), ref: 001B8EA2
                                                              • Part of subcall function 001B8E66: lstrlenW.KERNEL32(-00000210,{Unknown},?,?), ref: 001B8F0B
                                                              • Part of subcall function 001B8E66: CreateFileW.KERNEL32(?,00000004,00000001,00000000,00000004,00000080,00000000,?,?), ref: 001B8F79
                                                              • Part of subcall function 001B8E66: lstrlenW.KERNEL32(001C4AD0,00000008,00000000,?,?), ref: 001B8FA2
                                                              • Part of subcall function 001B8E66: WriteFile.KERNEL32(?,001C4AD0,00000000,?,?), ref: 001B8FAE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileWindowlstrlen$AsyncCallCreateForegroundHookNextStateTextWrite
                                                            • String ID: [ALT]$[BKSP]$[CAPS]$[CTRL]$[DEL]$[ENTER]$[ESC]$[INSERT]$[TAB]
                                                            • API String ID: 2452648998-4143582258
                                                            • Opcode ID: 10c132421e30e1d0c51a3bba5692844e5b2fa8d404ba6efb9a39db9155794cf6
                                                            • Instruction ID: b8cb51135f88e6952e9f6cc8bbcf42372bdb1f30417dc56a034ce492ce5c27b7
                                                            • Opcode Fuzzy Hash: 10c132421e30e1d0c51a3bba5692844e5b2fa8d404ba6efb9a39db9155794cf6
                                                            • Instruction Fuzzy Hash: 9E91E372A0D214C7D72C16A8977ABF8692DE7A5F00F16453EEA4377AE0DF20CD41D292
                                                            APIs
                                                            • DefWindowProcA.USER32(?,?,?,?), ref: 001B9084
                                                            • GetRawInputData.USER32(?,10000003,00000000,?,00000010), ref: 001B90A1
                                                            • GetRawInputData.USER32(?,10000003,00000000,?,00000010), ref: 001B90D7
                                                            • GetForegroundWindow.USER32 ref: 001B90F4
                                                            • GetWindowTextW.USER32(00000000,?,00000104), ref: 001B9105
                                                            • lstrlenW.KERNEL32(-00000210,-00000010,?,Unknow), ref: 001B91EE
                                                            • PostQuitMessage.USER32(00000000), ref: 001B9381
                                                            • RegisterRawInputDevices.USER32 ref: 001B93B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InputWindow$Data$DevicesForegroundMessagePostProcQuitRegisterTextlstrlen
                                                            • String ID: Unknow
                                                            • API String ID: 3853268301-1240069140
                                                            • Opcode ID: a01ed94d3c3a6b0bfabdc074dfec181462f0aa7afb8709a8ed140437d8b566e9
                                                            • Instruction ID: 7b411a936094e389bc94a4a0b12e0c443e60cc13818859e4327b9da89b47bca8
                                                            • Opcode Fuzzy Hash: a01ed94d3c3a6b0bfabdc074dfec181462f0aa7afb8709a8ed140437d8b566e9
                                                            • Instruction Fuzzy Hash: C5A17971104200EFC710EF69EC9AEAABBF8FF99300F444518F695936A2DB35E945CB61
                                                            Strings
                                                            • \BraveSoftware\Brave-Browser\User Data\Local State, xrefs: 001BC310
                                                            • \Slimjet\User Data\Default\Login Data, xrefs: 001BC381
                                                            • \Opera Software\Opera Stable\Local State, xrefs: 001BC2BF
                                                            • \Blisk\User Data\Local State, xrefs: 001BC2DA
                                                            • \Comodo\Dragon\User Data\Local State, xrefs: 001BC346
                                                            • \Opera Software\Opera Stable\Login Data, xrefs: 001BC2C4
                                                            • \Torch\User Data\Local State, xrefs: 001BC361
                                                            • \UCBrowser\User Data_i18n\Default\UC Login Data.17, xrefs: 001BC28D
                                                            • \Tencent\QQBrowser\User Data\Local State, xrefs: 001BC2A3
                                                            • \Microsoft\Edge\User Data\Local State, xrefs: 001BC26C
                                                            • \Tencent\QQBrowser\User Data\Default\Login Data, xrefs: 001BC2A8
                                                            • \CentBrowser\User Data\Local State, xrefs: 001BC397
                                                            • \Vivaldi\User Data\Local State, xrefs: 001BC329
                                                            • \BraveSoftware\Brave-Browser\User Data\Default\Login Data, xrefs: 001BC315
                                                            • \Epic Privacy Browser\User Data\Default\Login Data, xrefs: 001BC256
                                                            • \Microsoft\Edge\User Data\Default\Login Data, xrefs: 001BC271
                                                            • \UCBrowser\User Data_i18n\Local State, xrefs: 001BC288
                                                            • \Vivaldi\User Data\Default\Login Data, xrefs: 001BC330
                                                            • \Chromium\User Data\Local State, xrefs: 001BC2F5
                                                            • \Slimjet\User Data\Local State, xrefs: 001BC37C
                                                            • \Epic Privacy Browser\User Data\Local State, xrefs: 001BC251
                                                            • \Comodo\Dragon\User Data\Default\Login Data, xrefs: 001BC34B
                                                            • \Blisk\User Data\Default\Login Data, xrefs: 001BC2DF
                                                            • \Google\Chrome\User Data\Local State, xrefs: 001BC236
                                                            • \Torch\User Data\Default\Login Data, xrefs: 001BC366
                                                            • \Chromium\User Data\Default\Login Data, xrefs: 001BC2FA
                                                            • \CentBrowser\User Data\Default\Login Data, xrefs: 001BC39C
                                                            • \Google\Chrome\User Data\Default\Login Data, xrefs: 001BC23B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FilePath$lstrcatlstrcpy$BinaryCopyExistsOpenType$CloseCombineEnumFolderInfoPrivateProfileQuerySpecialString
                                                            • String ID: \Blisk\User Data\Default\Login Data$\Blisk\User Data\Local State$\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\BraveSoftware\Brave-Browser\User Data\Local State$\CentBrowser\User Data\Default\Login Data$\CentBrowser\User Data\Local State$\Chromium\User Data\Default\Login Data$\Chromium\User Data\Local State$\Comodo\Dragon\User Data\Default\Login Data$\Comodo\Dragon\User Data\Local State$\Epic Privacy Browser\User Data\Default\Login Data$\Epic Privacy Browser\User Data\Local State$\Google\Chrome\User Data\Default\Login Data$\Google\Chrome\User Data\Local State$\Microsoft\Edge\User Data\Default\Login Data$\Microsoft\Edge\User Data\Local State$\Opera Software\Opera Stable\Local State$\Opera Software\Opera Stable\Login Data$\Slimjet\User Data\Default\Login Data$\Slimjet\User Data\Local State$\Tencent\QQBrowser\User Data\Default\Login Data$\Tencent\QQBrowser\User Data\Local State$\Torch\User Data\Default\Login Data$\Torch\User Data\Local State$\UCBrowser\User Data_i18n\Default\UC Login Data.17$\UCBrowser\User Data_i18n\Local State$\Vivaldi\User Data\Default\Login Data$\Vivaldi\User Data\Local State
                                                            • API String ID: 2377953819-4166025770
                                                            • Opcode ID: b38391519cf065d767dcb17c63f8c8f1edfcf99c25073d2bffe61677fb1aea0a
                                                            • Instruction ID: 89c92cb3b3b07c2da886449f7458e726004f67b6bcb65d708dd7d527223ae177
                                                            • Opcode Fuzzy Hash: b38391519cf065d767dcb17c63f8c8f1edfcf99c25073d2bffe61677fb1aea0a
                                                            • Instruction Fuzzy Hash: 54713330355210AFC718EB65DD67EAA3BAAEFBA710F40001CF1165B6E1CFA1E944CB61
                                                            APIs
                                                            • RegQueryValueExW.ADVAPI32(?,Account Name,00000000,00000000,?,00001000,?,?,?,?,?,75A8E9B0,74E2F860,00000000,?,001BA25E), ref: 001BA31C
                                                            • RegQueryValueExW.ADVAPI32(?,Email,00000000,00000000,?,00001000,?,?,?,?,?,?,?,?,75A8E9B0,74E2F860), ref: 001BA363
                                                            • RegQueryValueExW.ADVAPI32(?,POP3 Server,00000000,00000000,?,00001000), ref: 001BA3A7
                                                            • RegQueryValueExW.ADVAPI32(?,POP3 User,00000000,00000000,?,00001000), ref: 001BA3EB
                                                            • RegQueryValueExW.ADVAPI32(?,SMTP Server,00000000,00000000,?,00001000), ref: 001BA42F
                                                            • RegQueryValueExW.ADVAPI32(?,POP3 Password,00000000,00000000,?,00001000), ref: 001BA473
                                                            • RegQueryValueExW.ADVAPI32(?,SMTP Password,00000000,00000000,?,00001000), ref: 001BA4E0
                                                            • RegQueryValueExW.ADVAPI32(?,HTTP Password,00000000,00000000,?,00001000), ref: 001BA54D
                                                            • RegQueryValueExW.ADVAPI32(?,IMAP Password,00000000,00000000,?,00001000), ref: 001BA5BA
                                                              • Part of subcall function 001BA632: GlobalAlloc.KERNEL32(00000040,-00000001,75A8E8E0,?,?,?,001BA5E6,00001000,?,00000000,00001000), ref: 001BA650
                                                              • Part of subcall function 001BA632: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,001BA5E6), ref: 001BA686
                                                              • Part of subcall function 001BA632: lstrcpyW.KERNEL32(?,Could not decrypt,?,?,001BA5E6,00001000,?,00000000,00001000), ref: 001BA6BD
                                                              • Part of subcall function 001B3261: lstrlenW.KERNEL32(75A901C0,001B3646,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3268
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValue$AllocCryptDataGlobalUnprotectlstrcpylstrlen
                                                            • String ID: Account Name$Email$HTTP Password$IMAP Password$POP3 Password$POP3 Server$POP3 User$SMTP Password$SMTP Server
                                                            • API String ID: 6593746-2537589853
                                                            • Opcode ID: 234f9719e427d14ecf9c2b2cdaa8cfae41416ec55d37efba632729e124285a41
                                                            • Instruction ID: ddf94332bf1f5441dae8ed2e2a87b6dd8ef507e69d05e810a0faea9d7d30fd1e
                                                            • Opcode Fuzzy Hash: 234f9719e427d14ecf9c2b2cdaa8cfae41416ec55d37efba632729e124285a41
                                                            • Instruction Fuzzy Hash: 18A120B291025DBADB25FAA4CD96FEE737CAF24740F5401A5F605F2080E774AB448BA4
                                                            APIs
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            • LoadResource.KERNEL32(00000000,?,00000000), ref: 001C30EE
                                                            • SizeofResource.KERNEL32(00000000,?), ref: 001C30FA
                                                            • LockResource.KERNEL32(00000000), ref: 001C3104
                                                            • GetTempPathA.KERNEL32(00000400,?), ref: 001C313E
                                                            • lstrcatA.KERNEL32(?,find.exe), ref: 001C3152
                                                            • GetTempPathA.KERNEL32(00000400,?), ref: 001C3160
                                                            • lstrcatA.KERNEL32(?,find.db), ref: 001C316E
                                                            • CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000002,00000084,00000000), ref: 001C3189
                                                            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 001C319B
                                                            • CloseHandle.KERNEL32(00000000), ref: 001C31A2
                                                            • wsprintfA.USER32 ref: 001C31D2
                                                            • ShellExecuteExA.SHELL32(0000003C), ref: 001C3220
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Resource$FilePathTemplstrcat$CloseCreateExecuteFreeHandleLoadLockShellSizeofVirtualWritelstrcpywsprintf
                                                            • String ID: -w %ws -d C -f %s$<$@$find.db$find.exe
                                                            • API String ID: 2504251837-265381321
                                                            • Opcode ID: faa6e63ae8b78df8c3c0f3e65cd18cb178bbd03cad3a2e203f38487e469bed11
                                                            • Instruction ID: 09e848d1752dda6af6d09c23847441b2811a9bd111bb657a1c4da1f23347874e
                                                            • Opcode Fuzzy Hash: faa6e63ae8b78df8c3c0f3e65cd18cb178bbd03cad3a2e203f38487e469bed11
                                                            • Instruction Fuzzy Hash: D84127B2900219ABDB10DFA5DD85FDEBBBCEF99304F004156F609A2150DB74AA858FA4
                                                            APIs
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001BC118: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 001BC154
                                                              • Part of subcall function 001BC118: lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 001BC162
                                                              • Part of subcall function 001BC118: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,001BA729,?,00000104,00000000), ref: 001BC17B
                                                              • Part of subcall function 001BC118: RegQueryValueExW.ADVAPI32(001BA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 001BC198
                                                              • Part of subcall function 001BC118: RegCloseKey.ADVAPI32(001BA729,?,00000104,00000000), ref: 001BC1A1
                                                            • lstrcatW.KERNEL32(?,\firefox.exe,?), ref: 001BAC8C
                                                            • GetBinaryTypeW.KERNEL32(?,?), ref: 001BAC9D
                                                            • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,?), ref: 001BB11D
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001B3272: wsprintfW.USER32 ref: 001B328D
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001B3554: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,001B4E98,?), ref: 001B3581
                                                              • Part of subcall function 001B3554: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,001B4E98,?,?,?,?,?,00000000), ref: 001B35AC
                                                            • CopyFileW.KERNEL32(?,?,00000000,.tmp,00000000,001C4684,\logins.json,?), ref: 001BAE14
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$ByteCharMultiWidelstrcatlstrlen$BinaryCloseCopyFileFreeOpenPrivateProfileQueryStringTypeValueVirtualwsprintf
                                                            • String ID: .tmp$Path$Profile$\Mozilla\Firefox\$\firefox.exe$\logins.json$encryptedPassword$encryptedUsername$firefox.exe$hostname$profiles.ini
                                                            • API String ID: 288196626-815594582
                                                            • Opcode ID: 2669500f03718b922d63863299a367437ab65cee235c582919500c48023816c1
                                                            • Instruction ID: d2608242becdff3b36b9310f8e150ee2b36096810ecf89dd352c55655157b702
                                                            • Opcode Fuzzy Hash: 2669500f03718b922d63863299a367437ab65cee235c582919500c48023816c1
                                                            • Instruction Fuzzy Hash: B3E1D671900519ABDF15EFA0DC92EEEB77AAF64300F50406AF516A7192EF30AF49CB50
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 001B8840
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,-00000010), ref: 001B8894
                                                            • lstrcatW.KERNEL32(-00000010,\Microsoft Vision\), ref: 001B88AE
                                                            • GetLocalTime.KERNEL32(?), ref: 001B88B5
                                                            • wsprintfW.USER32 ref: 001B88E9
                                                            • lstrcatW.KERNEL32(-00000010,?), ref: 001B8900
                                                            • CreateFileW.KERNEL32(?,10000000,00000001,00000000,00000002,00000080,00000000,00000010), ref: 001B892C
                                                            • CloseHandle.KERNEL32(00000000), ref: 001B893C
                                                              • Part of subcall function 001C1E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E4E
                                                              • Part of subcall function 001C1E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E61
                                                              • Part of subcall function 001C1E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E72
                                                              • Part of subcall function 001C1E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,001C349D), ref: 001C1E7F
                                                              • Part of subcall function 001C09D2: VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,74E2F770,00000000,?,?,?,?,001B895D), ref: 001C09FE
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 001B89AF
                                                              • Part of subcall function 001C0969: lstrcmpA.KERNEL32(?,001C1BD0,?,open,001C1BD0), ref: 001C09A2
                                                            • TranslateMessage.USER32(?), ref: 001B8996
                                                            • DispatchMessageA.USER32(?), ref: 001B89A1
                                                            Strings
                                                            • SetWindowsHookExA, xrefs: 001B8962
                                                            • c:\windows\system32\user32.dll, xrefs: 001B894A
                                                            • %02d-%02d-%02d_%02d.%02d.%02d, xrefs: 001B88E3
                                                            • \Microsoft Vision\, xrefs: 001B88A8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$HandleMessage$CloseCreatelstrcat$AllocDispatchFolderLocalModulePathReadSizeTimeTranslateVirtuallstrcmpwsprintf
                                                            • String ID: %02d-%02d-%02d_%02d.%02d.%02d$SetWindowsHookExA$\Microsoft Vision\$c:\windows\system32\user32.dll
                                                            • API String ID: 1431388325-3884914687
                                                            • Opcode ID: 04f98780f4bd38fa971ca2904fa8f59ab758c17e284fa740b3718f414c0df0d0
                                                            • Instruction ID: b1e6eff8994c3867f0a64642b83cc483abfa06b25776a8deabe6dd6ee936e4c6
                                                            • Opcode Fuzzy Hash: 04f98780f4bd38fa971ca2904fa8f59ab758c17e284fa740b3718f414c0df0d0
                                                            • Instruction Fuzzy Hash: 8941AFB1504240ABD710EBAAEC4AF6B7BECFBC9B04F000919F685D3591DB39E954C722
                                                            APIs
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001BC118: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 001BC154
                                                              • Part of subcall function 001BC118: lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 001BC162
                                                              • Part of subcall function 001BC118: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,001BA729,?,00000104,00000000), ref: 001BC17B
                                                              • Part of subcall function 001BC118: RegQueryValueExW.ADVAPI32(001BA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 001BC198
                                                              • Part of subcall function 001BC118: RegCloseKey.ADVAPI32(001BA729,?,00000104,00000000), ref: 001BC1A1
                                                            • GetBinaryTypeW.KERNEL32(?,?), ref: 001BA747
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001BB67E: GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 001BB6AC
                                                              • Part of subcall function 001BB67E: SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 001BB6B5
                                                              • Part of subcall function 001BB67E: PathFileExistsW.SHLWAPI(001BA760,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?,nss3.dll), ref: 001BB7A3
                                                            • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,?), ref: 001BABCA
                                                              • Part of subcall function 001BB67E: PathFileExistsW.SHLWAPI(001BA760,.dll,?,001BA760,?,00000104,00000000), ref: 001BB7FF
                                                              • Part of subcall function 001BB67E: LoadLibraryW.KERNEL32(?,001BA760,?,00000104,00000000), ref: 001BB83E
                                                              • Part of subcall function 001BB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB849
                                                              • Part of subcall function 001BB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB854
                                                              • Part of subcall function 001BB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB85F
                                                              • Part of subcall function 001BB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB86A
                                                              • Part of subcall function 001BB67E: SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 001BB957
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad$CurrentDirectorylstrcpy$ExistsFilePathlstrlen$BinaryCloseOpenPrivateProfileQueryStringTypeValuelstrcat
                                                            • String ID: .tmp$Path$Profile$\Thunderbird\$\logins.json$encryptedPassword$encryptedUsername$hostname$profiles.ini$thunderbird.exe
                                                            • API String ID: 1065485167-1863067114
                                                            • Opcode ID: cad3f54977d3188bac4efff221dcdbfd64a7ae48d4ad3f2c3701b748e4b1d601
                                                            • Instruction ID: 597120a8b02aace8b07bfb80a74719ba4fffc7c68d8a634cd922366f3eb7b229
                                                            • Opcode Fuzzy Hash: cad3f54977d3188bac4efff221dcdbfd64a7ae48d4ad3f2c3701b748e4b1d601
                                                            • Instruction Fuzzy Hash: 4EE1C771900119ABDF15EBA0DC96EEEB77AAF64300F50406AF516A7192EF30AF49CB50
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 001BD517
                                                            • OpenServiceW.ADVAPI32(00000000,?,00000010), ref: 001BD52C
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD539
                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 001BD546
                                                            • GetLastError.KERNEL32 ref: 001BD550
                                                            • Sleep.KERNEL32(000007D0), ref: 001BD562
                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 001BD56B
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD57F
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD582
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$OpenStart$ErrorLastManagerSleep
                                                            • String ID: ServicesActive
                                                            • API String ID: 104619213-3071072050
                                                            • Opcode ID: 246d07887aa61f44babe09f797f0ae761534f48ab50240dbee7ea2f8f0af8048
                                                            • Instruction ID: 926234172c6dfdf50d37870b9828485b5484c65ff16c27842aa89bdecca46ac6
                                                            • Opcode Fuzzy Hash: 246d07887aa61f44babe09f797f0ae761534f48ab50240dbee7ea2f8f0af8048
                                                            • Instruction Fuzzy Hash: BB018B727842657BD2301B62BC5DFEB3E7CDBD6B55B110025FB06D2450EB64C990CAB4
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000005), ref: 001BDA82
                                                            • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,00000000,00000000,?,?,?,00000000), ref: 001BDAB9
                                                              • Part of subcall function 001B5EFF: GetProcessHeap.KERNEL32(00000008,?,001B2FA7,001B5A42,?,?,001C03FD,001B5A42,?,?,75A901C0,00000000,?,001B5A42,00000000), ref: 001B5F02
                                                              • Part of subcall function 001B5EFF: RtlAllocateHeap.NTDLL(00000000,?,001C03FD,001B5A42,?,?,75A901C0,00000000,?,001B5A42,00000000), ref: 001B5F09
                                                            • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,00000000,?,?,?,?,00000000), ref: 001BDAE2
                                                            • GetLastError.KERNEL32 ref: 001BDAEC
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BDAFA
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000005,00000000,00000000,00000000), ref: 001BDBBB
                                                            • lstrcmpW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000), ref: 001BDBFE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnumHeapManagerOpenServicesStatus$AllocateCloseErrorHandleLastProcessServicelstrcmp
                                                            • String ID: ServicesActive
                                                            • API String ID: 899334174-3071072050
                                                            • Opcode ID: cdebb3328bb86d41ed2892a26a8445680f2952bb39d0c1d8aa7bba6e255976d1
                                                            • Instruction ID: 7f16d533228ed7b193de353e922f4be9b38c39bf4e844914e3599f525171ad17
                                                            • Opcode Fuzzy Hash: cdebb3328bb86d41ed2892a26a8445680f2952bb39d0c1d8aa7bba6e255976d1
                                                            • Instruction Fuzzy Hash: EC514C71900219AFDF19EFA0DD95BEEBBB9EF28311F110169E502B6181EB74AE40CF50
                                                            APIs
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?,?,?,?,?), ref: 001B7A16
                                                              • Part of subcall function 001B8617: GetCurrentProcess.KERNEL32(001C9698,001B7A03,?,?,?,?), ref: 001B861C
                                                              • Part of subcall function 001B8617: IsWow64Process.KERNEL32(00000000), ref: 001B8623
                                                              • Part of subcall function 001B8617: GetProcessHeap.KERNEL32 ref: 001B8629
                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,00100000,00003000,00000040,00000000), ref: 001B7A3A
                                                            • VirtualProtectEx.KERNEL32(00000000,00000000,00100000,00000040,00000000), ref: 001B7A5B
                                                            • VirtualAllocEx.KERNEL32(00000000,33370000,00000100,00003000,00000040), ref: 001B7A73
                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,XXXXXX,00000000,00000000), ref: 001B7A9D
                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 001B7AC5
                                                            • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001B7ADD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Virtual$AllocMemoryWrite$CreateCurrentHeapOpenProtectRemoteThreadWow64
                                                            • String ID: XXXXXX
                                                            • API String ID: 813767414-582547948
                                                            • Opcode ID: 82875f8cc77a0f0f6927d3a7a39ec6665f91844cf92214574c4cbbd745ba3820
                                                            • Instruction ID: afa6d3c40fcc8eca31030e214432e27f11d96d638532fab910f9fe46b716b74c
                                                            • Opcode Fuzzy Hash: 82875f8cc77a0f0f6927d3a7a39ec6665f91844cf92214574c4cbbd745ba3820
                                                            • Instruction Fuzzy Hash: C3219E72649215BBEB219BB49C19FFF7A6CAB85B14F240119F610E20D0DBB4CA40866A
                                                            APIs
                                                            • GetFullPathNameA.KERNEL32(001C96A8,00000104,?,00000000), ref: 001B9E17
                                                            • PathCombineA.SHLWAPI(?,?,001C5F88), ref: 001B9E36
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 001B9E46
                                                            • PathCombineA.SHLWAPI(?,001C96A8,0000002E), ref: 001B9E7D
                                                            • PathCombineA.SHLWAPI(?,?,Accounts\Account.rec0), ref: 001B9E8C
                                                              • Part of subcall function 001B9ADF: CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 001B9AFC
                                                              • Part of subcall function 001B9ADF: GetLastError.KERNEL32 ref: 001B9B09
                                                              • Part of subcall function 001B9ADF: CloseHandle.KERNEL32(00000000), ref: 001B9B10
                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 001B9EA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Path$CombineFile$Find$CloseCreateErrorFirstFullHandleLastNameNext
                                                            • String ID: .$Accounts\Account.rec0
                                                            • API String ID: 3873318193-2526347284
                                                            • Opcode ID: 7d066d0fe4301ea9e31684ce7da6b1326de64f3c93e42b3eda097c327b4d522e
                                                            • Instruction ID: f446812e618a9f9290502b1fe9530ca6e726b05010e7d87858fe79b887fae58c
                                                            • Opcode Fuzzy Hash: 7d066d0fe4301ea9e31684ce7da6b1326de64f3c93e42b3eda097c327b4d522e
                                                            • Instruction Fuzzy Hash: 991100B294022C6BEB24D6A4DC89FEE776CEB55714F0045AAE609D3180E774DE898F50
                                                            APIs
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,00000000,00000000,75A901C0,00000000), ref: 001C1FEC
                                                            • GetCurrentProcessId.KERNEL32 ref: 001C1FF7
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,000000FF), ref: 001C2015
                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,00000800,00003000,00000040), ref: 001C203F
                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,001C9158,00000800,00000000), ref: 001C2057
                                                            • VirtualProtectEx.KERNEL32(001C1FD3,00000000,00000800,00000040,?), ref: 001C2068
                                                            • VirtualAllocEx.KERNEL32(001C1FD3,00000000,00000103,00003000,00000004), ref: 001C207F
                                                            • WriteProcessMemory.KERNEL32(001C1FD3,00000000,?,00000103,00000000), ref: 001C2095
                                                            • CreateRemoteThread.KERNEL32(001C1FD3,00000000,00000000,0000010E,00000000,00000000,00000000), ref: 001C20A8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Virtual$AllocHeapMemoryWrite$AllocateCreateCurrentFileModuleNameOpenProtectRemoteThread
                                                            • String ID:
                                                            • API String ID: 900395357-0
                                                            • Opcode ID: 60e63a56e845b66fb8b4c8556a0cf978f3eb5be325ba2beff9bb53d879070537
                                                            • Instruction ID: 9eb48a4838520aabde21dad565da0ce9c9430d2c2ff245a241db0b1e7036c4ab
                                                            • Opcode Fuzzy Hash: 60e63a56e845b66fb8b4c8556a0cf978f3eb5be325ba2beff9bb53d879070537
                                                            • Instruction Fuzzy Hash: 79212471684218BFF7205B51DC5BFEA7E6CEB45B60F200165F745A61D0D6F06E808BA4
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 001BD4AB
                                                            • OpenServiceW.ADVAPI32(00000000,?,00000002), ref: 001BD4C0
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD4CD
                                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001BD4E6
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD4FA
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD4FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                            • String ID: ServicesActive
                                                            • API String ID: 493672254-3071072050
                                                            • Opcode ID: 9a6161a4ebba08a7019cf1f02a13bdc873dcfb5dc6422984d834c2032f2b00f0
                                                            • Instruction ID: 6cc1a9876b1a1f4923d99cdc253efaf8b4da3bd679365b6e561a0582c652ea03
                                                            • Opcode Fuzzy Hash: 9a6161a4ebba08a7019cf1f02a13bdc873dcfb5dc6422984d834c2032f2b00f0
                                                            • Instruction Fuzzy Hash: 40F096322482257BD6211B66AC49EDB3E6CEBCA7707110221FB16D6590DB70DC5087A0
                                                            APIs
                                                            • InitializeSecurityDescriptor.ADVAPI32(?,00000001,00000000,?,?,?,?,?,?,?,?,?,001C1B06), ref: 001C18C7
                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,001C1B06), ref: 001C18DB
                                                            • RegCreateKeyExA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command,00000000,00000000,00000000,00020006,0000000C,001C1B06,?), ref: 001C1913
                                                            • RegCloseKey.ADVAPI32(001C1B06), ref: 001C1920
                                                            • SetLastError.KERNEL32(00000000), ref: 001C192B
                                                            Strings
                                                            • Software\Classes\Folder\shell\open\command, xrefs: 001C1909
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DescriptorSecurity$CloseCreateDaclErrorInitializeLast
                                                            • String ID: Software\Classes\Folder\shell\open\command
                                                            • API String ID: 1473660444-2536721355
                                                            • Opcode ID: a1a1b856f80255bedafa978f9caa6a34ffa8055351951a6ef39d61b73abacdfe
                                                            • Instruction ID: 36780057ef3fb8590e724df49464b9fd31deada95676ab51011a2bde93bae0af
                                                            • Opcode Fuzzy Hash: a1a1b856f80255bedafa978f9caa6a34ffa8055351951a6ef39d61b73abacdfe
                                                            • Instruction Fuzzy Hash: 6F011A71944218BBDB209BA1AC59FDF7FBCEF1A755F001125F605F2150E770C684CAA0
                                                            APIs
                                                            • BCryptOpenAlgorithmProvider.BCRYPT(00000020,AES,00000000,00000000,?,00000000,?,?,?,001BCA5F,?), ref: 001BCCD1
                                                            • BCryptSetProperty.BCRYPT(00000020,ChainingMode,ChainingModeGCM,00000020,00000000,?,001BCA5F,?), ref: 001BCCEA
                                                            • BCryptGenerateSymmetricKey.BCRYPT(00000020,001BCA5F,00000000,00000000,?,00000020,00000000,?,001BCA5F,?), ref: 001BCCFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Crypt$AlgorithmGenerateOpenPropertyProviderSymmetric
                                                            • String ID: AES$ChainingMode$ChainingModeGCM
                                                            • API String ID: 1692524283-1213888626
                                                            • Opcode ID: fb9d3821d3e169422268eae03f36e87279e6f59828f488f48f7b90dee3185c42
                                                            • Instruction ID: 611b9c3b8094a31c632ba2999fa5b16f624d5c7d56d7f95ca5f0eca561521d7b
                                                            • Opcode Fuzzy Hash: fb9d3821d3e169422268eae03f36e87279e6f59828f488f48f7b90dee3185c42
                                                            • Instruction Fuzzy Hash: CBF062312453257BDB240F5ADC49F9BBFACEF5ABA1B10002AF505D2150D7A1D84087E0
                                                            APIs
                                                            • LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 001BCFE0
                                                            • BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 001BD00E
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • LocalFree.KERNEL32(?), ref: 001BD096
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapLocal$AllocAllocateCryptDecryptFreeProcess
                                                            • String ID: 0$v1
                                                            • API String ID: 4131498132-3331332043
                                                            • Opcode ID: 13c8c86c7ca6840b72fdf0b17b756b67fa96770636a34c64ada097bf6917b6ba
                                                            • Instruction ID: b7e0d8512e70bf9f645b87a1eb97e7689ae6fcdeaf466248a04a663faa3db361
                                                            • Opcode Fuzzy Hash: 13c8c86c7ca6840b72fdf0b17b756b67fa96770636a34c64ada097bf6917b6ba
                                                            • Instruction Fuzzy Hash: 8F416DB2D00108BBDB15ABE5DC85EEEBBBCEF54344F044026F915E2240F7759E468BA1
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,75A901C0), ref: 001C20C7
                                                            • Process32First.KERNEL32(00000000,?), ref: 001C20F4
                                                            • Process32Next.KERNEL32(00000000,?), ref: 001C211B
                                                            • CloseHandle.KERNEL32(00000000), ref: 001C2126
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                            • String ID: explorer.exe
                                                            • API String ID: 420147892-3187896405
                                                            • Opcode ID: d9431ba751a313f3ccee45f4ee8da57085c17acf24e692d719096543bacf17e2
                                                            • Instruction ID: baaa2c104b4add50440089be010bfae4187659dc78bd0d1dd01d003a67e3305b
                                                            • Opcode Fuzzy Hash: d9431ba751a313f3ccee45f4ee8da57085c17acf24e692d719096543bacf17e2
                                                            • Instruction Fuzzy Hash: FB01A9B5505114ABD720A764AC15FDA77FCDF65710F0500A5FA45E1480EB34EAD08A54
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(ntdll.dll), ref: 001BFA5A
                                                            • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 001BFA6A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RtlGetVersion$ntdll.dll
                                                            • API String ID: 2574300362-1489217083
                                                            • Opcode ID: 3ed6e6127061c005affc6b22ef33a2df125784f5ef4eca07d7658c778d80f10d
                                                            • Instruction ID: 68fcd092210fee7286b60917257a632844e6a6e0ffbddcc188c1a3a2071c6222
                                                            • Opcode Fuzzy Hash: 3ed6e6127061c005affc6b22ef33a2df125784f5ef4eca07d7658c778d80f10d
                                                            • Instruction Fuzzy Hash: 8F416830A0012CAADF248B55DD6A3FCB6B4AB1174EF1448F9E645E01C1E378CEC6CA54
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,-00000001,75A8E8E0,?,?,?,001BA5E6,00001000,?,00000000,00001000), ref: 001BA650
                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,001BA5E6), ref: 001BA686
                                                            • lstrcpyW.KERNEL32(?,Could not decrypt,?,?,001BA5E6,00001000,?,00000000,00001000), ref: 001BA6BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocCryptDataGlobalUnprotectlstrcpy
                                                            • String ID: Could not decrypt
                                                            • API String ID: 3112367126-1484008118
                                                            • Opcode ID: 0d6ca7ddf9e8d7315df9fa4840c49920cbc7501d5097bd563d5a7cb9b235990c
                                                            • Instruction ID: 38734d9413566b33b11960c4ad0659855bca5aa318c1d7f7705dafcf5454ab1a
                                                            • Opcode Fuzzy Hash: 0d6ca7ddf9e8d7315df9fa4840c49920cbc7501d5097bd563d5a7cb9b235990c
                                                            • Instruction Fuzzy Hash: 251129B29002199BC711CBA9C880DEEFBBCEF58700B55406AE955E3201E731EE41CBB1
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,001BD471,?,?,00000001), ref: 001BF5C2
                                                            • LookupAccountSidW.ADVAPI32(00000000,001BD471,?,00000104,?,00000010,?), ref: 001BF5E7
                                                            • GetLastError.KERNEL32(?,?,00000001), ref: 001BF5F1
                                                            • FreeSid.ADVAPI32(001BD471,?,?,00000001), ref: 001BF5FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AccountAllocateErrorFreeInitializeLastLookup
                                                            • String ID:
                                                            • API String ID: 1866703397-0
                                                            • Opcode ID: d6174c21828b4802c2d93bb841e6e215ecf5c1ba275f2137f422608c7dbb8b1e
                                                            • Instruction ID: a941baafebbc5e22551d0db8d24c879c015131247d671f57d176d65fdbfcee20
                                                            • Opcode Fuzzy Hash: d6174c21828b4802c2d93bb841e6e215ecf5c1ba275f2137f422608c7dbb8b1e
                                                            • Instruction Fuzzy Hash: 2C11CBB190421DABDB10DFD5DC89EEEBBBCEB04344F10046AF605E2150E7709A859BA1
                                                            APIs
                                                            • CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 001BCC73
                                                            • LocalAlloc.KERNEL32(00000040,?,?,001BCBC6,?,00000000,?,00000000,?), ref: 001BCC81
                                                            • CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 001BCC97
                                                            • LocalFree.KERNEL32(?,?,001BCBC6,?,00000000,?,00000000,?), ref: 001BCCA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: BinaryCryptLocalString$AllocFree
                                                            • String ID:
                                                            • API String ID: 4291131564-0
                                                            • Opcode ID: 4e233e1a81ff1ad5e2b11f47c38f4aec10facb6a358cf4a83039faafbe8fcfc3
                                                            • Instruction ID: 8cda67d28ad385be002a8a046f0bc6b975fa1101d0a77e6b9fbdaacb4c77c8d5
                                                            • Opcode Fuzzy Hash: 4e233e1a81ff1ad5e2b11f47c38f4aec10facb6a358cf4a83039faafbe8fcfc3
                                                            • Instruction Fuzzy Hash: 2701C9B1601226BFEB214B5BDD4DE97BFACEF197A1B100021FA48D6250E771DC50CAE0
                                                            APIs
                                                              • Part of subcall function 001BF76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 001BF79C
                                                              • Part of subcall function 001B3335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,001C3589,?,001C1515,001C3589,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3365
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001B351D: PathFindExtensionW.SHLWAPI(?,?,001B282E,?,?,00000000,001C4684), ref: 001B3527
                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 001B2860
                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 001B288A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Path$DownloadExecuteExtensionFileFindFolderFreeShellSpecialVirtuallstrcatlstrcpy
                                                            • String ID: open
                                                            • API String ID: 4166385161-2758837156
                                                            • Opcode ID: 5cf5e434dd7c3fa244e0f113b0cceb3f0365377563e9a32109b79ff0eb56b526
                                                            • Instruction ID: 7e22428367b4c5721257b37cd42b9a1a32fec5117c9ee675760d8f11bf7a4fac
                                                            • Opcode Fuzzy Hash: 5cf5e434dd7c3fa244e0f113b0cceb3f0365377563e9a32109b79ff0eb56b526
                                                            • Instruction Fuzzy Hash: 98219072A00208BBDF14AFA0CC95EEEBB79AFE1750F018059F42667291DF709B49CB50
                                                            APIs
                                                              • Part of subcall function 001B5F53: GetProcessHeap.KERNEL32(00000000,000000F4,001C0477,?,75A901C0,00000000,001B5A34), ref: 001B5F56
                                                              • Part of subcall function 001B5F53: HeapAlloc.KERNEL32(00000000), ref: 001B5F5D
                                                            • GetLogicalDriveStringsW.KERNEL32(00000104,00000000), ref: 001C0060
                                                            • GetLogicalDriveStringsW.KERNEL32(00000000,00000000), ref: 001C0087
                                                            • GetDriveTypeW.KERNEL32(?,00000000,00000000), ref: 001C00B7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Drive$HeapLogicalStrings$AllocProcessType
                                                            • String ID:
                                                            • API String ID: 2408535517-0
                                                            • Opcode ID: 2dd33cf7feb880480965520895d0a94970445cb5d35ec868103a5e4740bae6ac
                                                            • Instruction ID: c5e78d8aa27e22e6ff469fda74ff2db3af616c2e5656c612da6c0a443de18a42
                                                            • Opcode Fuzzy Hash: 2dd33cf7feb880480965520895d0a94970445cb5d35ec868103a5e4740bae6ac
                                                            • Instruction Fuzzy Hash: 19314F71E002199BCF15EBA4C596AEFB7F8AF58344F11406AE501B7291EB709F44CBA1
                                                            APIs
                                                            • lstrlenA.KERNEL32(?,?,?,00000000,?,001BAA4B,?,?,?,?,?,encryptedUsername,?,?,00000000,C0000000), ref: 001BB17B
                                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,?,?,00000000,00000000), ref: 001BB1A9
                                                              • Part of subcall function 001B5EB4: VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,001B3652,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B5EBE
                                                            • lstrcpyA.KERNEL32(00000000,?), ref: 001BB1F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocBinaryCryptStringVirtuallstrcpylstrlen
                                                            • String ID:
                                                            • API String ID: 573875632-0
                                                            • Opcode ID: 445dd67a5f4711c68e06d0bcef8d0324ba2afecfea560446a384612f49c51bf0
                                                            • Instruction ID: 80a6a05ec3b120e1a6beccc46c29f048b1081818b8663ac1dbfeb7fbf90cd9ef
                                                            • Opcode Fuzzy Hash: 445dd67a5f4711c68e06d0bcef8d0324ba2afecfea560446a384612f49c51bf0
                                                            • Instruction Fuzzy Hash: 5A11D3B6D00209AFDB01DFA4D884CEEBBBDEB08344F1040AAF909A3201D7359A45CBA0
                                                            APIs
                                                            • OpenProcessToken.ADVAPI32(00000000,00000028,?,?,00000000,00000000,?,?,?,?,?,?,?,?,001BE18E), ref: 001BF644
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,?), ref: 001BF655
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,?,?,?,00000000,00000000), ref: 001BF68A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Token$AdjustLookupOpenPrivilegePrivilegesProcessValue
                                                            • String ID:
                                                            • API String ID: 658607936-0
                                                            • Opcode ID: 2383f73253eaedbbe3a39cf1283dc7c84401965a3dc6bdca84332390919fd345
                                                            • Instruction ID: c60c210c64f00fbb615c894c5a54d3483563d7126fc5fa1d9a6097d7fd91c1b9
                                                            • Opcode Fuzzy Hash: 2383f73253eaedbbe3a39cf1283dc7c84401965a3dc6bdca84332390919fd345
                                                            • Instruction Fuzzy Hash: 5B11D675A10219AFEB11CFE5DC84AEFFBBCFB48740F10452AEA01F2150E7709A459BA0
                                                            APIs
                                                            • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?), ref: 001BCB24
                                                            • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,?,001BCAD5,?,00000000,?,?,?,?,001BCA44), ref: 001BCB3B
                                                            • LocalFree.KERNEL32(001BCAD5,?,?,?,?,?,001BCAD5,?,00000000,?,?,?,?,001BCA44), ref: 001BCB5B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Local$AllocCryptDataFreeUnprotect
                                                            • String ID:
                                                            • API String ID: 2068576380-0
                                                            • Opcode ID: 96160914b013eeb83024a184bd468f145c034b6903587a0b86df4d40deeabf5c
                                                            • Instruction ID: 3cae7db904bbc1260047e97b9f88a54be772c71ba81d855171b28746b3fc445f
                                                            • Opcode Fuzzy Hash: 96160914b013eeb83024a184bd468f145c034b6903587a0b86df4d40deeabf5c
                                                            • Instruction Fuzzy Hash: 2A010CB5900209AFDB159FA4DC1ACEEBBB9EB48311B10016AFD41A2350E771DA548AA0
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,?,?), ref: 001BFF54
                                                            • FindNextFileW.KERNEL32(00000000,00000010,00000000), ref: 001BFFF6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileFind$FirstNext
                                                            • String ID:
                                                            • API String ID: 1690352074-0
                                                            • Opcode ID: 2c53f5e58db944ddda1add49e6b730c0a8789981b97e7221ab727cbac09d9fd7
                                                            • Instruction ID: 8e8cc3a268f4f512c260646a4631fd4fb2d929cce09b2565e5dd14f6c16b178f
                                                            • Opcode Fuzzy Hash: 2c53f5e58db944ddda1add49e6b730c0a8789981b97e7221ab727cbac09d9fd7
                                                            • Instruction Fuzzy Hash: C3313A71D01209ABDB14EFB5C999BEEBBB9AF58310F104569E415A3281EB34AE84CF50
                                                            APIs
                                                            • NetUserAdd.NETAPI32(00000000,00000001,?,00000000,?,00000000,002FE080,?,?,?,001BE634,002FE07C,002FE080), ref: 001BD45A
                                                              • Part of subcall function 001BF56D: AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,001BD471,?,?,00000001), ref: 001BF5C2
                                                              • Part of subcall function 001BF56D: LookupAccountSidW.ADVAPI32(00000000,001BD471,?,00000104,?,00000010,?), ref: 001BF5E7
                                                              • Part of subcall function 001BF56D: GetLastError.KERNEL32(?,?,00000001), ref: 001BF5F1
                                                              • Part of subcall function 001BF56D: FreeSid.ADVAPI32(001BD471,?,?,00000001), ref: 001BF5FF
                                                            • NetLocalGroupAddMembers.NETAPI32(00000000,00000000,00000003,00010201,00000001,?,?,?,001BE634,002FE07C,002FE080), ref: 001BD47B
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Free$AccountAllocateErrorGroupInitializeLastLocalLookupMembersUserVirtual
                                                            • String ID:
                                                            • API String ID: 188019324-0
                                                            • Opcode ID: abba8b6691e34aaf75dc929de0a67998e01f450ef078c533e3878cbffec64b24
                                                            • Instruction ID: d51e529cc4292ba27743ed7ba650ce03821e2aa7364d82f4557db3358e34b381
                                                            • Opcode Fuzzy Hash: abba8b6691e34aaf75dc929de0a67998e01f450ef078c533e3878cbffec64b24
                                                            • Instruction Fuzzy Hash: AC113372900208AFDB11DFAAD8849EEFBFCFF59714B10442AF911EB210D7B4AA448B50
                                                            APIs
                                                            • recv.WS2_32(?,?,00001000,00000000), ref: 001BD0FD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: recv
                                                            • String ID:
                                                            • API String ID: 1507349165-0
                                                            • Opcode ID: 30b044bb3a87d86c89c73dc16b2b970076def72af6dad09254b5f131aaae4dbb
                                                            • Instruction ID: bbad56d5a1c4bf1d3201d583a75d34a1bb723d00be60508ed192a0d255e92f60
                                                            • Opcode Fuzzy Hash: 30b044bb3a87d86c89c73dc16b2b970076def72af6dad09254b5f131aaae4dbb
                                                            • Instruction Fuzzy Hash: 69F09671900258ABDB25FA64EC81FEA736CAB283D5F540455F554E70C5E7B0EDC08B60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92eed5e057af5c338e84efe1873390fd3db005f0a50fb21675b463ae26445d8a
                                                            • Instruction ID: 199f18ddae5865029415e1a6093a2c7be0060046a120174549e6e5f68bbbbe7f
                                                            • Opcode Fuzzy Hash: 92eed5e057af5c338e84efe1873390fd3db005f0a50fb21675b463ae26445d8a
                                                            • Instruction Fuzzy Hash: 7321AB72D00108ABDF15DFA8CC82BEEBBB9AF54314F14417AF505EB241E73199C587A4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ee9a03c5baf9720a6e7d8e5d675cdaadf48f2bf7d7bc5066cbb6e6d82dfa4c0b
                                                            • Instruction ID: 97c259b69bffc24c0e06325ec512de73dffac6224d4b46fd0c79348c6b777603
                                                            • Opcode Fuzzy Hash: ee9a03c5baf9720a6e7d8e5d675cdaadf48f2bf7d7bc5066cbb6e6d82dfa4c0b
                                                            • Instruction Fuzzy Hash: 151148323905214A872C883E4D57067FBCBD3DA110788853EE59BCB252E531E7068680
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60c1047820937477a62ebe8b3556f1e42973dfa080cef3034b4bd0468cc2296e
                                                            • Instruction ID: 1f25556e271a8252a503c0a0a36ce8909eaee7ae6bea94fe4761edde61e24f60
                                                            • Opcode Fuzzy Hash: 60c1047820937477a62ebe8b3556f1e42973dfa080cef3034b4bd0468cc2296e
                                                            • Instruction Fuzzy Hash: B4E08C32200530CBC622DF5AD440F12B3B6EBE8770B2B046CE48AA3501C320FC61CA90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1a420be4fd1d60918cb23d9961ed4b3e9e51cbd9e1df09b6748f783962a9c5c8
                                                            • Instruction ID: a7166f06473ab02afc2080fda5cb57e0a8fd0ff9123a3cf00940b80e05d6fe1d
                                                            • Opcode Fuzzy Hash: 1a420be4fd1d60918cb23d9961ed4b3e9e51cbd9e1df09b6748f783962a9c5c8
                                                            • Instruction Fuzzy Hash: C8D0EA38361940CFDB51CF18C684F01B3E4EB59B60B098495E909CB736D734ED00EA00
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                            • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                                            • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 001BB6AC
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 001BB6B5
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001B3272: wsprintfW.USER32 ref: 001B328D
                                                            • PathFileExistsW.SHLWAPI(001BA760,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?,nss3.dll), ref: 001BB7A3
                                                            • PathFileExistsW.SHLWAPI(001BA760,.dll,?,001BA760,?,00000104,00000000), ref: 001BB7FF
                                                            • LoadLibraryW.KERNEL32(?,001BA760,?,00000104,00000000), ref: 001BB83E
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB849
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB854
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB85F
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 001BB86A
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 001BB957
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad$CurrentDirectory$ExistsFilePath$FreeVirtuallstrcpywsprintf
                                                            • String ID: .dll$NSSBase64_DecodeBuffer$NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_CheckUserPassword$PK11_FreeSlot$PK11_GetInternalKeySlot$PR_GetError$mozglue.dll$msvcp$msvcp120.dll$msvcr$msvcr120.dll$nss3.dll$softokn3.dll
                                                            • API String ID: 410702425-850564384
                                                            • Opcode ID: 4bff2842527ca05507e623463993fed26dcf948d5b9a26c659ff5ccc79edfcc4
                                                            • Instruction ID: 43d17c704d1f2c3bff7dfc650a3b14f9b8f2ffdfc6e79077f19bdea575cbe62a
                                                            • Opcode Fuzzy Hash: 4bff2842527ca05507e623463993fed26dcf948d5b9a26c659ff5ccc79edfcc4
                                                            • Instruction Fuzzy Hash: 5E912C71A00609EBDB05EFB0C992EDEB77ABF64300F50416AE51567291DF30AF58CB90
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(?,?,?), ref: 001BE407
                                                            • DeleteCriticalSection.KERNEL32(?,?,?), ref: 001BE41E
                                                            • EnterCriticalSection.KERNEL32(002FE020,?,?), ref: 001BE42A
                                                              • Part of subcall function 001BDE1F: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,?,002FE020,?,?,001BE451,?,?), ref: 001BDE51
                                                            • RegCreateKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList,00000000,00000000,00000000,000F013F,00000000,?,?,00000000,00000000,?,?), ref: 001BE5FF
                                                            • RegSetValueExW.ADVAPI32(?,00000000,00000004,?,00000004,?,?), ref: 001BE61A
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 001BE623
                                                            • LeaveCriticalSection.KERNEL32(002FE020,00000000,002FE07C,002FE080,?,?), ref: 001BE65E
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001B3261: lstrlenW.KERNEL32(75A901C0,001B3646,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3268
                                                            • LeaveCriticalSection.KERNEL32(002FE020,00000000,rpdp,002FE080,00000000,rudp,002FE07C,002FE07C,002FE080,?,?), ref: 001BE6C4
                                                            • LeaveCriticalSection.KERNEL32(002FE020,00000000,?,?), ref: 001BE6F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$Leavelstrlen$lstrcpy$CloseCreateDeleteEnterFreeInitializeOpenValueVirtual
                                                            • String ID: /$ /$ /$ /$8/$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList$rpdp$rudp$|/$|/$|/
                                                            • API String ID: 2046459734-2535273432
                                                            • Opcode ID: 9ee75f38eddcb0f30bcecd8ffe4bf6979825d3774544f023d05388595dd63a4d
                                                            • Instruction ID: 7f87b0cba852399a15374a34747035dd60efea448a21b26aa88f402ddac9b657
                                                            • Opcode Fuzzy Hash: 9ee75f38eddcb0f30bcecd8ffe4bf6979825d3774544f023d05388595dd63a4d
                                                            • Instruction Fuzzy Hash: 0F719470610118BBDF15FB60CC96EFE7B69AF68350F014029F906A6192DF70EA11CB61
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 001B95BC
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,-00000010), ref: 001B962B
                                                            • lstrcatW.KERNEL32(-00000010,\Microsoft Vision\), ref: 001B9645
                                                            • CreateDirectoryW.KERNEL32(-00000010,00000000), ref: 001B9651
                                                            • lstrcpyW.KERNEL32(?,-00000010), ref: 001B968B
                                                            • lstrcatW.KERNEL32(?,001C4A58), ref: 001B969E
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001BFF27: FindFirstFileW.KERNEL32(?,?,?,?), ref: 001BFF54
                                                            • GetLocalTime.KERNEL32(?,00000000,ExplorerIdentifier), ref: 001B9721
                                                            • wsprintfW.USER32 ref: 001B9758
                                                            • CreateFileW.KERNEL32(?,10000000,00000001,00000000,00000002,00000080,00000000,00000010,?), ref: 001B979A
                                                            • CloseHandle.KERNEL32(00000000), ref: 001B97AA
                                                            • RegisterClassW.USER32 ref: 001B97C9
                                                            • CreateWindowExW.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,?), ref: 001B97E1
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 001B9802
                                                            • TranslateMessage.USER32(?), ref: 001B9814
                                                            • DispatchMessageA.USER32(?), ref: 001B981F
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 001B982F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Message$Create$FileHandlelstrcatlstrcpylstrlen$ClassCloseDirectoryDispatchFindFirstFolderLocalModulePathRegisterTimeTranslateWindowwsprintf
                                                            • String ID: %02d-%02d-%02d_%02d.%02d.%02d$ExplorerIdentifier$\Microsoft Vision\
                                                            • API String ID: 2678186124-2372768292
                                                            • Opcode ID: 69297673acbbfb1e4d61f2d99302d80b05fc64a294aa8affbbfeb63d47e0438b
                                                            • Instruction ID: 39429542c6674c40db49e8e08f01665814fb83f1c3be155bee2eb0cd91eb0869
                                                            • Opcode Fuzzy Hash: 69297673acbbfb1e4d61f2d99302d80b05fc64a294aa8affbbfeb63d47e0438b
                                                            • Instruction Fuzzy Hash: 21717AB2508304ABC710DBA5DC5AEABBBECFB99700F000919F695D3191DB35E985CB62
                                                            APIs
                                                            • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?), ref: 001BA12F
                                                            • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?), ref: 001BA14C
                                                            • lstrcpyW.KERNEL32(?,Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676), ref: 001BA19F
                                                            • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001BA1B5
                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,00000800,00000000,00000000,00000000,00000000), ref: 001BA1E8
                                                            • RegCloseKey.ADVAPI32(?), ref: 001BA1F9
                                                            • lstrcpyW.KERNEL32(?,?), ref: 001BA20D
                                                            • lstrcatW.KERNEL32(?,001C4684), ref: 001BA21B
                                                            • lstrcatW.KERNEL32(?,?), ref: 001BA22F
                                                            • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?), ref: 001BA24C
                                                            • RegCloseKey.ADVAPI32(?,?), ref: 001BA261
                                                            • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?), ref: 001BA27E
                                                            Strings
                                                            • Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 001BA125
                                                            • Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676, xrefs: 001BA15F, 001BA16F
                                                            • Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 001BA17C, 001BA181, 001BA191
                                                            • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 001BA142, 001BA152
                                                            • Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 001BA135
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Open$Closelstrcatlstrcpy$EnumInfoQuery
                                                            • String ID: Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                                                            • API String ID: 1891545080-2020977430
                                                            • Opcode ID: 9bf30ba293afda08c46002deaa2f25a9341aba9fda41d69ca34a8d5d26b712f3
                                                            • Instruction ID: 8a2f97ad308373fc267d8ddca827eb87a217bd392ba89f4cd8184886859ae481
                                                            • Opcode Fuzzy Hash: 9bf30ba293afda08c46002deaa2f25a9341aba9fda41d69ca34a8d5d26b712f3
                                                            • Instruction Fuzzy Hash: AC411AB290021DBEEB21DAA5CC85EFB7B7DEF14784F5004A5F605E2001E771AE849BA1
                                                            APIs
                                                              • Part of subcall function 001BFBFC: GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,001C3589,?), ref: 001BFC0E
                                                              • Part of subcall function 001BFBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,001C3589,?), ref: 001BFC15
                                                              • Part of subcall function 001BFBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,001C3589,?), ref: 001BFC33
                                                              • Part of subcall function 001BFBFC: CloseHandle.KERNEL32(00000000), ref: 001BFC48
                                                            • CloseHandle.KERNEL32(?,00000000), ref: 001C1AD8
                                                            • GetCurrentProcess.KERNEL32(?), ref: 001C1AE7
                                                            • IsWow64Process.KERNEL32(00000000), ref: 001C1AEE
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000400), ref: 001C1B25
                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 001C1B57
                                                            • lstrcatW.KERNEL32(?,\sdclt.exe), ref: 001C1B69
                                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 001C1B81
                                                            • ShellExecuteExW.SHELL32(?), ref: 001C1BB3
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 001C1BBD
                                                            • Sleep.KERNEL32(000007D0), ref: 001C1BD5
                                                            • RegDeleteKeyA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command), ref: 001C1BE5
                                                            • ExitProcess.KERNEL32 ref: 001C1BEC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$CloseCurrentExecuteHandleShellToken$DeleteDirectoryExitFileInformationModuleNameOpenSleepSystemTerminateWow64lstrcat
                                                            • String ID: <$@$DelegateExecute$Software\Classes\Folder\shell\open\command$\sdclt.exe$open
                                                            • API String ID: 3164795406-2081737068
                                                            • Opcode ID: 2b46d0f137d5273acc1350d4e45f56a1345ae4b5e5402ea5c6307437d7ab4407
                                                            • Instruction ID: d97b9df63f372721a8c0b67e0b5b5bc00f1564ccadc48378a4936947e340c6ab
                                                            • Opcode Fuzzy Hash: 2b46d0f137d5273acc1350d4e45f56a1345ae4b5e5402ea5c6307437d7ab4407
                                                            • Instruction Fuzzy Hash: 98318EB1C05118FBDB10ABA0EC59EDEBFBCEF65311F0000A9F608A2550D7749A81CF60
                                                            APIs
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            • LoadResource.KERNEL32(00000000,?,00000000), ref: 001C30EE
                                                            • SizeofResource.KERNEL32(00000000,?), ref: 001C30FA
                                                            • LockResource.KERNEL32(00000000), ref: 001C3104
                                                            • GetTempPathA.KERNEL32(00000400,?), ref: 001C313E
                                                            • lstrcatA.KERNEL32(?,find.exe), ref: 001C3152
                                                            • GetTempPathA.KERNEL32(00000400,?), ref: 001C3160
                                                            • lstrcatA.KERNEL32(?,find.db), ref: 001C316E
                                                            • CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000002,00000084,00000000), ref: 001C3189
                                                            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 001C319B
                                                            • CloseHandle.KERNEL32(00000000), ref: 001C31A2
                                                            • wsprintfA.USER32 ref: 001C31D2
                                                            • ShellExecuteExA.SHELL32(0000003C), ref: 001C3220
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Resource$FilePathTemplstrcat$CloseCreateExecuteFreeHandleLoadLockShellSizeofVirtualWritelstrcpywsprintf
                                                            • String ID: -w %ws -d C -f %s$<$@$find.db$find.exe
                                                            • API String ID: 2504251837-265381321
                                                            • Opcode ID: 73715a9224549466f2e8da89d1cb2feef25099324b480dd77b8d73de494dca3d
                                                            • Instruction ID: 6ecb44bd0cdc56326f07ae5104d4a968503ae24e414c533aa530b56fb9abf020
                                                            • Opcode Fuzzy Hash: 73715a9224549466f2e8da89d1cb2feef25099324b480dd77b8d73de494dca3d
                                                            • Instruction Fuzzy Hash: 364149B2800219ABDB10DFA1DD85FDEBBBCFF99304F04415AF609A2151D774AA85CFA4
                                                            APIs
                                                            • GetForegroundWindow.USER32(?,?,?), ref: 001B8E8F
                                                            • GetWindowTextW.USER32(00000000,?,00000104), ref: 001B8EA2
                                                            • lstrlenW.KERNEL32(-00000210,{Unknown},?,?), ref: 001B8F0B
                                                            • lstrcpyW.KERNEL32(-00000210,?,?,?), ref: 001B8F58
                                                            • CreateFileW.KERNEL32(?,00000004,00000001,00000000,00000004,00000080,00000000,?,?), ref: 001B8F79
                                                            • lstrlenW.KERNEL32(001C4AD0,00000008,00000000,?,?), ref: 001B8FA2
                                                            • WriteFile.KERNEL32(?,001C4AD0,00000000,?,?), ref: 001B8FAE
                                                            • WriteFile.KERNEL32(?,?,00000000,-00000008,00000000,?,?), ref: 001B8FD2
                                                            • lstrlenW.KERNEL32(001C4AD0,-00000008,00000000,?,?), ref: 001B8FE5
                                                            • WriteFile.KERNEL32(?,001C4AD0,00000000,?,?), ref: 001B8FF1
                                                            • lstrlenW.KERNEL32(?,00000008,00000000,?,?), ref: 001B9003
                                                            • WriteFile.KERNEL32(?,?,00000000,?,?), ref: 001B9011
                                                            • CloseHandle.KERNEL32(?,?,?), ref: 001B901B
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,001C3589,?,001C1515,001C3589,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3365
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$File$Write$Windowlstrcpy$CloseCreateForegroundFreeHandleTextVirtuallstrcat
                                                            • String ID: {Unknown}
                                                            • API String ID: 2314120260-4054869793
                                                            • Opcode ID: 75b07f7abdfbe73af39718a460f3080bc40089afe980e02d7fa104b4c37172fa
                                                            • Instruction ID: b83b366edc5b11ca783ac9995a1f50e2cfaf44444ace91eec33a345d63a7d277
                                                            • Opcode Fuzzy Hash: 75b07f7abdfbe73af39718a460f3080bc40089afe980e02d7fa104b4c37172fa
                                                            • Instruction Fuzzy Hash: 8F517B71A00218EFDB00EF65DC9AFEA7BB9EB14300F4540A8F505A72A1DB35EE50CB54
                                                            APIs
                                                              • Part of subcall function 001BEA89: GetCurrentThreadId.KERNEL32 ref: 001BEA95
                                                              • Part of subcall function 001BEA89: SetEvent.KERNEL32(00000000), ref: 001BEAA9
                                                              • Part of subcall function 001BEA89: WaitForSingleObject.KERNEL32(001C956C,00001388), ref: 001BEAB6
                                                              • Part of subcall function 001BEA89: TerminateThread.KERNEL32(001C956C,000000FE), ref: 001BEAC7
                                                            • CreatePipe.KERNEL32(00000000,00000000,?,00000000,?,?,00000000), ref: 001BEB41
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000001,00000002,?,00000000), ref: 001BEB5E
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 001BEB64
                                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 001BEB6D
                                                            • CreatePipe.KERNEL32(00000000,00000000,0000000C,00000000,?,00000000), ref: 001BEB85
                                                            • GetCurrentProcess.KERNEL32(001C9560,00000000,00000000,00000002,?,00000000), ref: 001BEB9E
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 001BEBA4
                                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 001BEBA7
                                                            • GetCurrentProcess.KERNEL32(001C9564,00000000,00000000,00000002,?,00000000), ref: 001BEBBC
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 001BEBC2
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 001BEC18
                                                            • CreateThread.KERNEL32(00000000,00000000,001BE92A,001C9558,00000000,001C9570), ref: 001BEC38
                                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 001BEBC5
                                                              • Part of subcall function 001BEC8C: CloseHandle.KERNEL32(001C9568,001C9558,001BEADC,?,00000000,001B2A8C,00000000,exit,00000000,start), ref: 001BEC96
                                                              • Part of subcall function 001B362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,001C150A,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3657
                                                              • Part of subcall function 001BE891: CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000010,00000000,00000000,?,00000000,?,?,00000001), ref: 001BE8E3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentProcess$Create$Handle$DuplicateThread$EventPipe$CloseObjectSingleTerminateWaitlstrcpy
                                                            • String ID:
                                                            • API String ID: 337272696-0
                                                            • Opcode ID: 26ddb3d463a29ad1a8cb4758274a54872388fc600f254006052aefe5fd881fcc
                                                            • Instruction ID: e8c45b0add540d1984eea00fa8cee15a081f6eb31a184436c17f57a4fa4800ad
                                                            • Opcode Fuzzy Hash: 26ddb3d463a29ad1a8cb4758274a54872388fc600f254006052aefe5fd881fcc
                                                            • Instruction Fuzzy Hash: A6412C71A40209BBDB15EBA1DD5AFEEBFB8AF64751F100015F201B60D1DBB4AA44CAA1
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 001BD5A0
                                                            • OpenServiceW.ADVAPI32(00000000,?,00000001), ref: 001BD5B9
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD5C6
                                                            • QueryServiceConfigW.ADVAPI32(00000000,00000000,00000000,?), ref: 001BD5D5
                                                            • GetLastError.KERNEL32 ref: 001BD5DF
                                                            • QueryServiceConfigW.ADVAPI32(00000000,00000000,?,?), ref: 001BD600
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD611
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD614
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD624
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001BD627
                                                              • Part of subcall function 001B1099: GetProcessHeap.KERNEL32(00000000,00000000,001C1E18,00000000,00000000,00000000,00000000,.bss,00000000), ref: 001B109F
                                                              • Part of subcall function 001B1099: HeapFree.KERNEL32(00000000), ref: 001B10A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$ConfigHeapOpenQuery$ErrorFreeLastManagerProcess
                                                            • String ID: ServicesActive
                                                            • API String ID: 1929760286-3071072050
                                                            • Opcode ID: 33ebd1cfbcc387e9a38fb6cd9fb2949ceba127a1ae6554ba77e6dc3d91a2c678
                                                            • Instruction ID: 655e9950407af95636d0abfe42f97d4345ed4391a03a116268275dd94ee53df5
                                                            • Opcode Fuzzy Hash: 33ebd1cfbcc387e9a38fb6cd9fb2949ceba127a1ae6554ba77e6dc3d91a2c678
                                                            • Instruction Fuzzy Hash: 97118872604218BBCB24AB66ED98DDB7FBDEF953507110025FA06D3110EB30DE40CBA0
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32 ref: 001BDEEF
                                                              • Part of subcall function 001BFC58: GetCurrentProcess.KERNEL32(?,?,001B2D84,?,001C4648,?,?,00000000,?,?,?), ref: 001BFC5C
                                                            • PathFileExistsW.SHLWAPI(?), ref: 001BE099
                                                            • PathFileExistsW.SHLWAPI(?), ref: 001BDF0D
                                                              • Part of subcall function 001BFDF0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000001,00000000,00000000,?,?,?,001B9A69,?,?,?), ref: 001BFE07
                                                              • Part of subcall function 001BFDF0: GetLastError.KERNEL32(?,?,?,001B9A69,?,?,?), ref: 001BFE15
                                                            • LeaveCriticalSection.KERNEL32(?,00000000), ref: 001BE28C
                                                              • Part of subcall function 001BD9B6: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000102,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters), ref: 001BD9EA
                                                            • GetCurrentProcess.KERNEL32(SeDebugPrivilege), ref: 001BE17F
                                                            • LeaveCriticalSection.KERNEL32(?,00000000), ref: 001BE2CC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalFileSection$CurrentExistsLeavePathProcess$CreateEnterErrorLastOpen
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 1717069549-2896544425
                                                            • Opcode ID: 3be31adf14b0015325446858deca6028206e924e63291120c3df6d0e2a906f57
                                                            • Instruction ID: 19a38750400aedeb58b95d6c2f7b1e3d77a07bc4b735be2eb9bf5494084a66ed
                                                            • Opcode Fuzzy Hash: 3be31adf14b0015325446858deca6028206e924e63291120c3df6d0e2a906f57
                                                            • Instruction Fuzzy Hash: CBB11A71508245ABC718FF60DC92DEEB7A9BFA4344F40092DF59293192EF70EA19CB52
                                                            APIs
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,SYSTEM\CurrentControlSet\Services\TermService), ref: 001BDCF3
                                                              • Part of subcall function 001C0FC3: RegQueryValueExW.ADVAPI32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,001C3589,?,?,?,001C15B2,?,?,80000001), ref: 001C0FE6
                                                              • Part of subcall function 001C0FC3: RegQueryValueExW.ADVAPI32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,001C15B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 001C100A
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001C0FAE: RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            • StrStrW.SHLWAPI(?,svchost.exe,?,00000000,ImagePath,?), ref: 001BDD57
                                                            • StrStrW.SHLWAPI(?,svchost.exe -k), ref: 001BDD65
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?), ref: 001BDD82
                                                            Strings
                                                            • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 001BDCCE
                                                            • ImagePath, xrefs: 001BDD05
                                                            • svchost.exe -k, xrefs: 001BDD5D
                                                            • SYSTEM\CurrentControlSet\Services\TermService, xrefs: 001BDCBE
                                                            • ServiceDll, xrefs: 001BDD90
                                                            • svchost.exe, xrefs: 001BDD4F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenQueryValuelstrlen$CloseFreeVirtuallstrcpy
                                                            • String ID: ImagePath$SYSTEM\CurrentControlSet\Services\TermService$SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$svchost.exe$svchost.exe -k
                                                            • API String ID: 2246401353-3333427388
                                                            • Opcode ID: 46690e83673c25f2328b6eb70c5de6b4d37c6a1d85d90d68d59fa68de575dbac
                                                            • Instruction ID: 4533ee1ef1c80451484f6db8039e582cb55d2aa2a6fc607da60b377bf11ae97d
                                                            • Opcode Fuzzy Hash: 46690e83673c25f2328b6eb70c5de6b4d37c6a1d85d90d68d59fa68de575dbac
                                                            • Instruction Fuzzy Hash: C041F631D00228ABDF15EBE0DC92EEEB779AF28740F504169E511B2195EF70AF54CBA0
                                                            APIs
                                                            • CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 001B9AFC
                                                            • GetLastError.KERNEL32 ref: 001B9B09
                                                            • CloseHandle.KERNEL32(00000000), ref: 001B9B10
                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 001B9B1D
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 001B9B4C
                                                            • CloseHandle.KERNEL32(00000000), ref: 001B9B53
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CloseHandle$CreateErrorLastReadSize
                                                            • String ID: Password$Password
                                                            • API String ID: 1366138817-7788977
                                                            • Opcode ID: 81142ab71cb82b1d8d87145fc17fd0c90efa5f2aeddb15f30408e41f05d58788
                                                            • Instruction ID: f0562fead0fac617ad420619c4678e025708edf146add4a6cf28ee3bc61e40aa
                                                            • Opcode Fuzzy Hash: 81142ab71cb82b1d8d87145fc17fd0c90efa5f2aeddb15f30408e41f05d58788
                                                            • Instruction Fuzzy Hash: 58812370C042846FEF25EBA8D891BFEBFB5AF61314F50406AE1516B282CB754E83C751
                                                            APIs
                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 001BF825
                                                            • CoInitialize.OLE32(00000000), ref: 001BF82C
                                                            • CoCreateInstance.OLE32(001C4490,00000000,00000017,001C6E60,?,?,?,?,?,?,?,?,?,001B2D0C), ref: 001BF84A
                                                            • VariantInit.OLEAUT32(?), ref: 001BF8CE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Initialize$CreateInitInstanceSecurityVariant
                                                            • String ID: Name$SELECT Name FROM Win32_VideoController$WQL$root\CIMV2
                                                            • API String ID: 2382742315-3227336550
                                                            • Opcode ID: 85337e24564a4d32bbd81e234e4e69ca0f0f05c618888d1f4fd2e37755e8fa2e
                                                            • Instruction ID: f9d739ba69a398a84b949e505a43c02682c82c3e99b63c57d6860ea79cd6303b
                                                            • Opcode Fuzzy Hash: 85337e24564a4d32bbd81e234e4e69ca0f0f05c618888d1f4fd2e37755e8fa2e
                                                            • Instruction Fuzzy Hash: FA41F975A00259ABCB14DB95CC48EAFBBBDEFC9B14B10446CF515EB290D771E942CB20
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,00000000,75A901C0,00000000), ref: 001C1F25
                                                            • IsWow64Process.KERNEL32(00000000), ref: 001C1F2C
                                                            • VirtualAlloc.KERNEL32(00000000,000000FF,00001000,00000040), ref: 001C1F50
                                                            • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 001C1F5E
                                                            • lstrlenA.KERNEL32(00000000,\System32\cmd.exe,00000014), ref: 001C1F6C
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 001C1FA9
                                                            • Sleep.KERNEL32(000003E8), ref: 001C1FB8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$AllocCreateCurrentDirectorySleepVirtualWindowsWow64lstrlen
                                                            • String ID: \System32\cmd.exe
                                                            • API String ID: 3151064845-2003734499
                                                            • Opcode ID: b656fd3eaad2e976a926eb47b217cfa04e7f810479c8d5826aa30ecb349e91fd
                                                            • Instruction ID: 6f2a9374cbaeab22bac15263f53dc012239ab47124598369ea9f3fa89d17b94b
                                                            • Opcode Fuzzy Hash: b656fd3eaad2e976a926eb47b217cfa04e7f810479c8d5826aa30ecb349e91fd
                                                            • Instruction Fuzzy Hash: 6E1184B1A84308BFE7106BB5AC8AFEF7A7CEB14745F000029F705E6091D770DE448666
                                                            APIs
                                                            • lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 001BC154
                                                            • lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 001BC162
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,001BA729,?,00000104,00000000), ref: 001BC17B
                                                            • RegQueryValueExW.ADVAPI32(001BA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 001BC198
                                                            • RegCloseKey.ADVAPI32(001BA729,?,00000104,00000000), ref: 001BC1A1
                                                            Strings
                                                            • thunderbird.exe, xrefs: 001BC15A
                                                            • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 001BC14E
                                                            • Path, xrefs: 001BC190
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseOpenQueryValuelstrcatlstrcpy
                                                            • String ID: Path$Software\Microsoft\Windows\CurrentVersion\App Paths\$thunderbird.exe
                                                            • API String ID: 3135247354-1374996286
                                                            • Opcode ID: 0fede333e552f3b39611dbc02ef25a60d0b2fb4821cf8a31dab5ea40f486d2cd
                                                            • Instruction ID: 10ca6961fe9acb0dba7ec550d6ad5d01c56f86c6e15faaee436c3b40cf388210
                                                            • Opcode Fuzzy Hash: 0fede333e552f3b39611dbc02ef25a60d0b2fb4821cf8a31dab5ea40f486d2cd
                                                            • Instruction Fuzzy Hash: 5B111EB694011CBFEB10ABA4ED89FDABBBCEB14344F100065F605E2150E770DE548B61
                                                            APIs
                                                            • lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 001BC154
                                                            • lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 001BC162
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,001BA729,?,00000104,00000000), ref: 001BC17B
                                                            • RegQueryValueExW.ADVAPI32(001BA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 001BC198
                                                            • RegCloseKey.ADVAPI32(001BA729,?,00000104,00000000), ref: 001BC1A1
                                                            Strings
                                                            • thunderbird.exe, xrefs: 001BC15A
                                                            • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 001BC14E
                                                            • Path, xrefs: 001BC190
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseOpenQueryValuelstrcatlstrcpy
                                                            • String ID: Path$Software\Microsoft\Windows\CurrentVersion\App Paths\$thunderbird.exe
                                                            • API String ID: 3135247354-1374996286
                                                            • Opcode ID: a64bc69318f071d3434c113708af10a28d04d45eb2c47e4fa532c9a67d3c474c
                                                            • Instruction ID: 73d5a3a30748cd8af28c4c4ee70ad67f76e748a8dd3a9464ad11049841679e4b
                                                            • Opcode Fuzzy Hash: a64bc69318f071d3434c113708af10a28d04d45eb2c47e4fa532c9a67d3c474c
                                                            • Instruction Fuzzy Hash: F01121B694411CBFEB10EBA4ED89FDEBBBCEB14344F1000A9F605E2150E7709E448B61
                                                            APIs
                                                              • Part of subcall function 001BF76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 001BF79C
                                                              • Part of subcall function 001B3335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,001C3589,?,001C1515,001C3589,001C35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,001C3589,00000000,75A901C0,00000000), ref: 001B3365
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            • PathFileExistsW.SHLWAPI(00000000,?,00000000,00000000,00000000,.tmp,00000000,001C4684,.tmp,00000000,001C4684,?,00000000), ref: 001BC5A5
                                                            • PathFileExistsW.SHLWAPI(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,001BC245), ref: 001BC5AF
                                                            • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 001BC5C3
                                                            • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 001BC5CF
                                                              • Part of subcall function 001BCED9: LocalFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,001BC66B,?,?,00000000,?), ref: 001BCF43
                                                              • Part of subcall function 001BCED9: LocalFree.KERNEL32(?,00000000,00000000,00000000,00000000,?,001BC66B,?,?,00000000,?), ref: 001BCF4C
                                                              • Part of subcall function 001BCF58: LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 001BCFE0
                                                              • Part of subcall function 001BCF58: BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 001BD00E
                                                              • Part of subcall function 001BCF58: LocalFree.KERNEL32(?), ref: 001BD096
                                                              • Part of subcall function 001B33BF: lstrlenA.KERNEL32(?,75A901C0,?,001B5A4F,.bss,00000000), ref: 001B33C8
                                                              • Part of subcall function 001B33BF: lstrlenA.KERNEL32(?,?,001B5A4F,.bss,00000000), ref: 001B33D5
                                                              • Part of subcall function 001B33BF: lstrcpyA.KERNEL32(00000000,?,?,001B5A4F,.bss,00000000), ref: 001B33E8
                                                              • Part of subcall function 001B3125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,001B35C4,00000000,00000000,?,001B4E98,?,?,?,?,?,00000000), ref: 001B3151
                                                              • Part of subcall function 001B308C: lstrlenA.KERNEL32(00000000,001B30B4,75A901C0,00000000,00000000,?,001B32DC,001B350E,00000000,-00000001,75A901C0,?,001B350E,00000000,?,00000000), ref: 001B3093
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileFreeLocal$Pathlstrlen$CopyExistslstrcat$AllocCryptDecryptFolderSpecialVirtuallstrcpy
                                                            • String ID: .tmp$select signon_realm, origin_url, username_value, password_value from logins$select signon_realm, origin_url, username_value, password_value from wow_logins
                                                            • API String ID: 881303001-3832748974
                                                            • Opcode ID: d61327b4733d211bf00cf8598181329d8a2eec99b2dd7610d28da470d26da252
                                                            • Instruction ID: 9e185dd2b98a698af1aee52ff1541dcd06c9d1347c0cb34c6cd9e471595392b3
                                                            • Opcode Fuzzy Hash: d61327b4733d211bf00cf8598181329d8a2eec99b2dd7610d28da470d26da252
                                                            • Instruction Fuzzy Hash: 0AD10E72A00109ABDF15FFA4DD96EEEB779AF64300F14442AF512A6191EF30AF15CB60
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 001C274C
                                                            • CoCreateInstance.OLE32(001C45A0,00000000,00000001,001C7410,001C227B), ref: 001C2779
                                                            • CoUninitialize.OLE32 ref: 001C2902
                                                              • Part of subcall function 001C2A6B: CoCreateInstance.OLE32(001C45E0,00000000,00000001,001C73F0,?,756FE550,00000000,00000000,?,?,001C27B0), ref: 001C2A99
                                                            • CoCreateInstance.OLE32(001C45F0,00000000,00000001,001C7400,?), ref: 001C27CA
                                                              • Part of subcall function 001C24EB: CoTaskMemFree.OLE32(?,?,00000000,001C2896), ref: 001C24F9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInstance$FreeInitializeTaskUninitialize
                                                            • String ID: Grabber$Source$vids
                                                            • API String ID: 533512943-4200688928
                                                            • Opcode ID: 64e9324a4aa9fdf6de7f2b458344be30c580c78f2562eaf9cbc4bc24abdcf04d
                                                            • Instruction ID: 33934229dd4a3fea7d46330477da65e153f4d9672e04ef4a7f29c43420038c9a
                                                            • Opcode Fuzzy Hash: 64e9324a4aa9fdf6de7f2b458344be30c580c78f2562eaf9cbc4bc24abdcf04d
                                                            • Instruction Fuzzy Hash: 2B512871A00219AFDB14DFA4C899FAEBBB9BF94705F04845CE905AB260CBB1DD45CB60
                                                            APIs
                                                              • Part of subcall function 001C0F31: RegDeleteKeyW.ADVAPI32(80000001,?), ref: 001C0F38
                                                            • TerminateThread.KERNEL32(00000000,?,?), ref: 001C1740
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 001C17AD
                                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 001C1837
                                                            • CloseHandle.KERNEL32(?), ref: 001C1846
                                                            • CloseHandle.KERNEL32(?), ref: 001C184B
                                                            • ExitProcess.KERNEL32 ref: 001C184E
                                                            Strings
                                                            • cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q , xrefs: 001C17BB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandleProcess$CreateDeleteExitFileModuleNameTerminateThread
                                                            • String ID: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
                                                            • API String ID: 3630425516-84290196
                                                            • Opcode ID: 07718605c3ff1679f3cd31d68f7eda7019322b2a3c0d79aa6698d6c6eac30a30
                                                            • Instruction ID: 856f247bc7b44d885ac8f6fdc4d0fc2df702022ae73499a55e120c28be7e0fd4
                                                            • Opcode Fuzzy Hash: 07718605c3ff1679f3cd31d68f7eda7019322b2a3c0d79aa6698d6c6eac30a30
                                                            • Instruction Fuzzy Hash: 54313EB2900619FFDB11EBE0DD96EEEB77DEB24300F400465B605A2151DB74EE94CBA1
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(vaultcli.dll,00000000,001BB229), ref: 001BB561
                                                              • Part of subcall function 001C0969: lstrcmpA.KERNEL32(?,001C1BD0,?,open,001C1BD0), ref: 001C09A2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoadlstrcmp
                                                            • String ID: VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                            • API String ID: 2493137890-3967309459
                                                            • Opcode ID: e8d5994a39cf65011c9b3f4f96fb0af0d73bcd3dc77752f38b9a5ccd2ed611e1
                                                            • Instruction ID: 4842c8d188b41cb5b3502c71d9f27f4e0d38964ec7271e23117b50192c5af8ef
                                                            • Opcode Fuzzy Hash: e8d5994a39cf65011c9b3f4f96fb0af0d73bcd3dc77752f38b9a5ccd2ed611e1
                                                            • Instruction Fuzzy Hash: B511F830A05B00CFEB649B72A851FA7B7E6EBA4301F54492ED49E97742DB70E842CB10
                                                            APIs
                                                            • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,000F003F,?,00000208,002FCBF0,?,?,?,?,001C1A78), ref: 001C19E9
                                                            • RegCreateKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,001C1A78), ref: 001C1A06
                                                            • lstrlenW.KERNEL32(002FCBF0,?,?,?,?,001C1A78,?,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A12
                                                            • RegSetValueExW.ADVAPI32(?,Install,00000000,00000001,002FCBF0,00000000,?,?,?,?,001C1A78,?,?,?,?,001B57B9), ref: 001C1A28
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,001C1A78,?,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseCreateOpenValuelstrlen
                                                            • String ID: Install$SOFTWARE\_rptls
                                                            • API String ID: 2036214137-3226779556
                                                            • Opcode ID: 6200b065bac48bfa4ff71bdf4d37514ed56741bd9204ab13d6ce9ecd51e41529
                                                            • Instruction ID: 8278ec8fc14579042e2aabc9e10942db031cd8955cc98de9db6a1f7b42dad1d7
                                                            • Opcode Fuzzy Hash: 6200b065bac48bfa4ff71bdf4d37514ed56741bd9204ab13d6ce9ecd51e41529
                                                            • Instruction Fuzzy Hash: F0F0A972504058BFE7205B92EC4DEEB7E7CEB82791B000069FA05E2161CBA0DE90CAB0
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(00000000,002FCBF0,00000208,00000000,00000000,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A58
                                                            • IsUserAnAdmin.SHELL32 ref: 001C1A5E
                                                              • Part of subcall function 001BFBFC: GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,001C3589,?), ref: 001BFC0E
                                                              • Part of subcall function 001BFBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,001C3589,?), ref: 001BFC15
                                                              • Part of subcall function 001BFBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,001C3589,?), ref: 001BFC33
                                                              • Part of subcall function 001BFBFC: CloseHandle.KERNEL32(00000000), ref: 001BFC48
                                                              • Part of subcall function 001C19C9: RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,000F003F,?,00000208,002FCBF0,?,?,?,?,001C1A78), ref: 001C19E9
                                                              • Part of subcall function 001C19C9: RegCreateKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,001C1A78), ref: 001C1A06
                                                              • Part of subcall function 001C19C9: lstrlenW.KERNEL32(002FCBF0,?,?,?,?,001C1A78,?,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A12
                                                              • Part of subcall function 001C19C9: RegSetValueExW.ADVAPI32(?,Install,00000000,00000001,002FCBF0,00000000,?,?,?,?,001C1A78,?,?,?,?,001B57B9), ref: 001C1A28
                                                              • Part of subcall function 001C19C9: RegCloseKey.ADVAPI32(?,?,?,?,?,001C1A78,?,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A31
                                                            • FindResourceW.KERNEL32(00000000,00000066,WM_DSP,?,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1A87
                                                            • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,001B57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 001C1A91
                                                            • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,001B57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 001C1A9B
                                                            • LockResource.KERNEL32(00000000,?,?,?,?,001B57B9,?,00000000,00000000,?,?,?,?,?,?,00000000), ref: 001C1AA2
                                                              • Part of subcall function 001C1936: VirtualProtect.KERNEL32(00000000,000007D0,00000040,00000000,00000000,00000000,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000), ref: 001C1974
                                                              • Part of subcall function 001C1936: VirtualAlloc.KERNEL32(00000000,000001FE,00001000,00000040,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1988
                                                              • Part of subcall function 001C1936: GetWindowsDirectoryW.KERNEL32(00000000,00000104,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1996
                                                              • Part of subcall function 001C1936: lstrlenW.KERNEL32(00000000,\System32\cmd.exe,00000028,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000,00000000), ref: 001C19A4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Resource$CloseOpenProcessTokenVirtuallstrlen$AdminAllocCreateCurrentDirectoryFileFindHandleInformationLoadLockModuleNameProtectSizeofUserValueWindows
                                                            • String ID: WM_DSP
                                                            • API String ID: 1403607128-506093727
                                                            • Opcode ID: 2a56508bdf392659ae9cc317cfb1f8429b1388743f0e7678b019de0635f74160
                                                            • Instruction ID: 02c915b2b418c21db609c40e4fcba74339defd7b0803ea7e804e66600af59e61
                                                            • Opcode Fuzzy Hash: 2a56508bdf392659ae9cc317cfb1f8429b1388743f0e7678b019de0635f74160
                                                            • Instruction Fuzzy Hash: E6F062316852907BD72037B2AC6EF9F2D6CAFB2750F090828F442D6692DB24C8818260
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(USER32.DLL,?,001C02E1,?,75A901C0,00000000), ref: 001B5CAB
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 001B5CB7
                                                            • ExitProcess.KERNEL32 ref: 001B5CDB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressExitLibraryLoadProcProcess
                                                            • String ID: An assertion condition failed$Assert$MessageBoxA$USER32.DLL
                                                            • API String ID: 881411216-1361702557
                                                            • Opcode ID: e54403c1fa0627e36c7c689e2ca334abca54a43b4fa16c62e23386267559aeef
                                                            • Instruction ID: 6ec45698462d903dae75d375341462bf0aad9611c2c466d30f26b902207966b8
                                                            • Opcode Fuzzy Hash: e54403c1fa0627e36c7c689e2ca334abca54a43b4fa16c62e23386267559aeef
                                                            • Instruction Fuzzy Hash: 6CD017747C93416BEA1067F13C3AFA92E296B35F05F180018B681A64C1D792D8908520
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(USER32.DLL), ref: 001B5F6F
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 001B5F7B
                                                            • ExitProcess.KERNEL32 ref: 001B5F9A
                                                            Strings
                                                            • A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application, xrefs: 001B5F8F
                                                            • USER32.DLL, xrefs: 001B5F6A
                                                            • MessageBoxA, xrefs: 001B5F75
                                                            • PureCall, xrefs: 001B5F8A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressExitLibraryLoadProcProcess
                                                            • String ID: A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application$MessageBoxA$PureCall$USER32.DLL
                                                            • API String ID: 881411216-4134947204
                                                            • Opcode ID: dfb4d78681c3921e1fd81743244fbfbe9128e55f1e44ae689a8c9f28512b728f
                                                            • Instruction ID: bdb96d236bcc6af3320b02585dca88b3166a4c0939f3082498acce88f176ae93
                                                            • Opcode Fuzzy Hash: dfb4d78681c3921e1fd81743244fbfbe9128e55f1e44ae689a8c9f28512b728f
                                                            • Instruction Fuzzy Hash: EDD092303CC3416FE65027F16C2BF6829246B24F02F040018B645A44D1CBD0E4908629
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 001C0D6A
                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 001C0D83
                                                            • CloseHandle.KERNEL32(00000000), ref: 001C0D8E
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            • OpenProcess.KERNEL32(00001410,00000000,?,?), ref: 001C0DF8
                                                            • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000208), ref: 001C0E2E
                                                            • CloseHandle.KERNEL32(00000000,00000000,001C4C14), ref: 001C0E81
                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 001C0EE5
                                                            • CloseHandle.KERNEL32(00000000), ref: 001C0EF7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandle$Process32lstrcpylstrlen$CreateFileFirstFreeModuleNameNextOpenProcessSnapshotToolhelp32Virtual
                                                            • String ID:
                                                            • API String ID: 3514491001-0
                                                            • Opcode ID: 02ddfb8910d32b3099eb583867a116379e44125a389d1e457e80c43e575083c2
                                                            • Instruction ID: dc51dd63524620534067a83218ffb75684fbf4785ca8d7923a4d73fde583d611
                                                            • Opcode Fuzzy Hash: 02ddfb8910d32b3099eb583867a116379e44125a389d1e457e80c43e575083c2
                                                            • Instruction Fuzzy Hash: 34518072D00119ABDB11EBA4CC9AFEEBBB8AF64710F010169F415A7190EB30DF85CB50
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 001C2D1A
                                                            • CoCreateInstance.OLE32(001C45A0,00000000,00000001,001C7410,007EE120,?,?), ref: 001C2D32
                                                            • CoCreateInstance.OLE32(001C45F0,00000000,00000001,001C7400,007EE12C,?,?,001C4580,007EE124,?,?), ref: 001C2D8C
                                                              • Part of subcall function 001C2A6B: CoCreateInstance.OLE32(001C45E0,00000000,00000001,001C73F0,?,756FE550,00000000,00000000,?,?,001C27B0), ref: 001C2A99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInstance$Initialize
                                                            • String ID: Grabber$Source$vids
                                                            • API String ID: 1108742289-4200688928
                                                            • Opcode ID: 15870a13b4bb796935514558ef60ce2e6c5096d8691c017e876c9f130ef89222
                                                            • Instruction ID: 664d03f59c57522462e25847a14534c4bc9fe1302e7e864b0134d1b22f784ce9
                                                            • Opcode Fuzzy Hash: 15870a13b4bb796935514558ef60ce2e6c5096d8691c017e876c9f130ef89222
                                                            • Instruction Fuzzy Hash: 86518D75600211AFDB28DFA4C895FAA3B75BF99700B11459CFD05AF295CB71EC41CBA0
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,000000FF,00001000,00000040,00000000,?,?), ref: 001B796B
                                                            • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 001B7979
                                                            • lstrlenA.KERNEL32(00000000,\System32\cmd.exe,00000014), ref: 001B7987
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 001B79C1
                                                            • Sleep.KERNEL32(000003E8), ref: 001B79D0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocCreateDirectoryProcessSleepVirtualWindowslstrlen
                                                            • String ID: \System32\cmd.exe
                                                            • API String ID: 2560724043-2003734499
                                                            • Opcode ID: 883839ff6b0d54d84ca73334d959d9923fcd1cf1cdf540606124ee5d1d0422d2
                                                            • Instruction ID: a3deb05f7bd1e671587d8c979b87c975e9af4167f1f279fb0fe4c2fc939f390d
                                                            • Opcode Fuzzy Hash: 883839ff6b0d54d84ca73334d959d9923fcd1cf1cdf540606124ee5d1d0422d2
                                                            • Instruction Fuzzy Hash: A4115EB2644218BFE710ABA8DC96FEF767CEB54748F000425F701E6191DB709E4486A5
                                                            APIs
                                                            • lstrlenA.KERNEL32(001C1B3D,001C6056,?,?,001C1B3D,001C6056,?), ref: 001C185D
                                                            • RegOpenKeyExA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command,00000000,00020006,?,?,?,001C1B3D,001C6056,?), ref: 001C187A
                                                            • SetLastError.KERNEL32(00000000,?,?,001C1B3D,001C6056,?), ref: 001C1885
                                                            • RegSetValueExA.ADVAPI32(?,001C6056,00000000,00000001,001C1B3D,00000000,?,?,001C1B3D,001C6056,?), ref: 001C189D
                                                            • RegCloseKey.ADVAPI32(?,?,?,001C1B3D,001C6056,?), ref: 001C18A8
                                                            Strings
                                                            • Software\Classes\Folder\shell\open\command, xrefs: 001C1870
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseErrorLastOpenValuelstrlen
                                                            • String ID: Software\Classes\Folder\shell\open\command
                                                            • API String ID: 1613093083-2536721355
                                                            • Opcode ID: 575ce5889110028655c6af9d528cb91b7e5db33182c9631c874175722175777c
                                                            • Instruction ID: 9040e80813e4f5f91a6c2b34f49d4e35d64baacbe8911630047502f78df318c6
                                                            • Opcode Fuzzy Hash: 575ce5889110028655c6af9d528cb91b7e5db33182c9631c874175722175777c
                                                            • Instruction Fuzzy Hash: C3F06D35588214FBEF210FA0BC0AFDA7F79BB15750F110154BE01A64A1D7B1C950AA90
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,001B86D6,00000000), ref: 001B7CD3
                                                            • GetProcAddress.KERNEL32(00000000,RtlNtStatusToDosError), ref: 001B7CE1
                                                            • GetProcAddress.KERNEL32(00000000,RtlSetLastWin32Error), ref: 001B7CF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: RtlNtStatusToDosError$RtlSetLastWin32Error$ntdll.dll
                                                            • API String ID: 667068680-2897241497
                                                            • Opcode ID: 933cfd52c5a80496b5beeda12b78a22acab1907de3c1267be154a6083a13ea48
                                                            • Instruction ID: 725aa2f2623f4a130e95c5d83d2066c478b9063044d568cc90d3f3f9c5943065
                                                            • Opcode Fuzzy Hash: 933cfd52c5a80496b5beeda12b78a22acab1907de3c1267be154a6083a13ea48
                                                            • Instruction Fuzzy Hash: F0F0D0342483019BDF155FA5BC69E7A3BA9ABA8795301042DF80AE37B0DB70D845C624
                                                            APIs
                                                              • Part of subcall function 001B3125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,001B35C4,00000000,00000000,?,001B4E98,?,?,?,?,?,00000000), ref: 001B3151
                                                              • Part of subcall function 001C026F: WaitForSingleObject.KERNEL32(?,000000FF,001B5824,75A901C0,?,?,00000000,001B4EA0,?,?,?,?,?,00000000,75A901C0), ref: 001C0273
                                                            • getaddrinfo.WS2_32(75A901C0,00000000,001B4EA0,00000000), ref: 001B5848
                                                            • socket.WS2_32(00000002,00000001,00000000), ref: 001B585F
                                                            • htons.WS2_32(00000000), ref: 001B5885
                                                            • freeaddrinfo.WS2_32(00000000), ref: 001B5895
                                                            • connect.WS2_32(?,?,00000010), ref: 001B58A1
                                                            • ReleaseMutex.KERNEL32(?), ref: 001B58CB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MutexObjectReleaseSingleWaitconnectfreeaddrinfogetaddrinfohtonslstrcatsocket
                                                            • String ID:
                                                            • API String ID: 2516106447-0
                                                            • Opcode ID: 37ea94deb31224b8bae52cff6306ef565194e6c5fa0138501ab296e10f37fa9d
                                                            • Instruction ID: 7b3953586083beb4ab72641b00ae73b02a28dc72f0e4f33cbc292606a68cf884
                                                            • Opcode Fuzzy Hash: 37ea94deb31224b8bae52cff6306ef565194e6c5fa0138501ab296e10f37fa9d
                                                            • Instruction Fuzzy Hash: 0D215A71A00204ABDF109F65D889FDABBB9FF54320F148066F919DB1A1D771DA84CB60
                                                            APIs
                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000000,?,00000000,?), ref: 001BCBDC
                                                            • GetFileSizeEx.KERNEL32(00000000,?,?,00000000,?), ref: 001BCBF2
                                                            • LocalAlloc.KERNEL32(00000040,?,?,?,00000000,?), ref: 001BCC0D
                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,?), ref: 001BCC25
                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?), ref: 001BCC48
                                                              • Part of subcall function 001BCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 001BCC73
                                                              • Part of subcall function 001BCC54: LocalAlloc.KERNEL32(00000040,?,?,001BCBC6,?,00000000,?,00000000,?), ref: 001BCC81
                                                              • Part of subcall function 001BCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 001BCC97
                                                              • Part of subcall function 001BCC54: LocalFree.KERNEL32(?,?,001BCBC6,?,00000000,?,00000000,?), ref: 001BCCA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileLocal$AllocBinaryCryptString$CloseCreateFreeHandleReadSize
                                                            • String ID:
                                                            • API String ID: 4225742195-0
                                                            • Opcode ID: a615791aaa3c475e198aeda90b018c9ded9ba1a4798671a2ac96b1e726a634aa
                                                            • Instruction ID: 9bf54883ffa28470c645183f4784cab73fae24ca74185bf625cc0ba1f9f9fcaf
                                                            • Opcode Fuzzy Hash: a615791aaa3c475e198aeda90b018c9ded9ba1a4798671a2ac96b1e726a634aa
                                                            • Instruction Fuzzy Hash: 6311AFB1600114ABCB259BA9EC99EEEBFBCEF55750B144118F909E6150D730DE41CBA0
                                                            APIs
                                                            • setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 001B5666
                                                              • Part of subcall function 001B33BF: lstrlenA.KERNEL32(?,75A901C0,?,001B5A4F,.bss,00000000), ref: 001B33C8
                                                              • Part of subcall function 001B33BF: lstrlenA.KERNEL32(?,?,001B5A4F,.bss,00000000), ref: 001B33D5
                                                              • Part of subcall function 001B33BF: lstrcpyA.KERNEL32(00000000,?,?,001B5A4F,.bss,00000000), ref: 001B33E8
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            • recv.WS2_32(000000FF,?,0000000C,00000000), ref: 001B56B6
                                                            • recv.WS2_32(000000FF,?,000000FF,00000000), ref: 001B5726
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlenrecv$FreeVirtuallstrcpysetsockopt
                                                            • String ID: `$warzone160
                                                            • API String ID: 3973575906-811885577
                                                            • Opcode ID: 132851181918c62d72acae7957a527ef8f76629b169ecdd9a8bad031ac01318a
                                                            • Instruction ID: 0c0a343de3e21a247b3e942db5e0be44b09b1af60261ace5149856b31fc716ee
                                                            • Opcode Fuzzy Hash: 132851181918c62d72acae7957a527ef8f76629b169ecdd9a8bad031ac01318a
                                                            • Instruction Fuzzy Hash: 64516071900118ABCB15FB64DC96DEEBB79EF64350F500229F415A7191EF309B58CBA1
                                                            APIs
                                                              • Part of subcall function 001BF80E: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 001BF825
                                                              • Part of subcall function 001BF80E: CoInitialize.OLE32(00000000), ref: 001BF82C
                                                              • Part of subcall function 001BF80E: CoCreateInstance.OLE32(001C4490,00000000,00000017,001C6E60,?,?,?,?,?,?,?,?,?,001B2D0C), ref: 001BF84A
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 001B2D1B
                                                              • Part of subcall function 001C1E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E4E
                                                              • Part of subcall function 001C1E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E61
                                                              • Part of subcall function 001C1E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,001C349D), ref: 001C1E72
                                                              • Part of subcall function 001C1E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,001C349D), ref: 001C1E7F
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001BFA1F: GlobalMemoryStatusEx.KERNEL32(?), ref: 001BFA30
                                                              • Part of subcall function 001BFC7E: GetComputerNameW.KERNEL32(001B2D7F,00000010), ref: 001BFCA1
                                                              • Part of subcall function 001BFC58: GetCurrentProcess.KERNEL32(?,?,001B2D84,?,001C4648,?,?,00000000,?,?,?), ref: 001BFC5C
                                                              • Part of subcall function 001BFBFC: GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,001C3589,?), ref: 001BFC0E
                                                              • Part of subcall function 001BFBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,001C3589,?), ref: 001BFC15
                                                              • Part of subcall function 001BFBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,001C3589,?), ref: 001BFC33
                                                              • Part of subcall function 001BFBFC: CloseHandle.KERNEL32(00000000), ref: 001BFC48
                                                              • Part of subcall function 001BFA42: LoadLibraryA.KERNEL32(ntdll.dll), ref: 001BFA5A
                                                              • Part of subcall function 001BFA42: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 001BFA6A
                                                              • Part of subcall function 001BFCB8: RegOpenKeyExW.ADVAPI32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 001BFCFC
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 001B2DDF
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\,?,?), ref: 001B2DF1
                                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?), ref: 001B2DFF
                                                              • Part of subcall function 001B990A: InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B9916
                                                              • Part of subcall function 001B990A: DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B992D
                                                              • Part of subcall function 001B990A: EnterCriticalSection.KERNEL32(002FDB10,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B9939
                                                              • Part of subcall function 001B990A: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B9949
                                                              • Part of subcall function 001B990A: LeaveCriticalSection.KERNEL32(002FDB10,?,00000000), ref: 001B999C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalFileSection$CreateHandleInitializeProcess$CloseCurrentModuleNameOpenTokenlstrlen$AddressComputerDeleteDirectoryEnterFolderGlobalInformationInstanceLeaveLibraryLoadMemoryPathProcReadSecuritySizeStatuslstrcatlstrcpy
                                                            • String ID: \Microsoft Vision\
                                                            • API String ID: 1987359387-1618823865
                                                            • Opcode ID: 3a0fe76a63bf86a9788744a07528ca2d3c8241d00729147841dafa9fd78bf274
                                                            • Instruction ID: 1250311fafd3e1d2b477282073d75151dbc71e5473e2aab54c27c68b38fb9a52
                                                            • Opcode Fuzzy Hash: 3a0fe76a63bf86a9788744a07528ca2d3c8241d00729147841dafa9fd78bf274
                                                            • Instruction Fuzzy Hash: 10317EB1A002187BCB14FBA4DC5AEEEBB7DAF65300F004468F505A3182DB709B858BA1
                                                            APIs
                                                              • Part of subcall function 001C0969: lstrcmpA.KERNEL32(?,001C1BD0,?,open,001C1BD0), ref: 001C09A2
                                                            • MessageBoxA.USER32(00000000,Bla2,Bla2,00000000), ref: 001C0B70
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001C0BD9: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,75A901C0,00000000), ref: 001C0C14
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            • Bla2, xrefs: 001C0B67, 001C0B6D, 001C0B6E
                                                            • Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper, xrefs: 001C0B7E
                                                            • C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe, xrefs: 001C0BAE
                                                            • VirtualQuery, xrefs: 001C0B37
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$CreateFreeMessageProcessVirtuallstrcmplstrcpy
                                                            • String ID: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper$Bla2$C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe$VirtualQuery
                                                            • API String ID: 1196126833-2308542105
                                                            • Opcode ID: b691b3a7563da29e2efb8e9cfd20d3028a5071a7290e56b5b40445f611256fb0
                                                            • Instruction ID: 6fe6d69b1bf399199ba8ff2cef8b876c904eccc126bab82ed53a3d6aef7361c6
                                                            • Opcode Fuzzy Hash: b691b3a7563da29e2efb8e9cfd20d3028a5071a7290e56b5b40445f611256fb0
                                                            • Instruction Fuzzy Hash: 7D110A75A00218EADB09EBA4DD56EEFBB6D9E68714B10005EF406B2185DB30DF04CA62
                                                            APIs
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • VirtualProtect.KERNEL32(00000000,000007D0,00000040,00000000,00000000,00000000,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000), ref: 001C1974
                                                            • VirtualAlloc.KERNEL32(00000000,000001FE,00001000,00000040,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1988
                                                            • GetWindowsDirectoryW.KERNEL32(00000000,00000104,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000,00000000), ref: 001C1996
                                                            • lstrlenW.KERNEL32(00000000,\System32\cmd.exe,00000028,?,00000000,?,001C1AB4,?,?,?,001B57B9,?,00000000,00000000), ref: 001C19A4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapVirtual$AllocAllocateDirectoryProcessProtectWindowslstrlen
                                                            • String ID: \System32\cmd.exe
                                                            • API String ID: 2244922440-2003734499
                                                            • Opcode ID: 12330899815f3f3b06d1b036b3f2d5e8b3e13a430d2a62ba69d2c7813ea06a73
                                                            • Instruction ID: 4e8f1ebb561ef655f27f9623f0691fd82f81e6b89c078ce17bae9c4e24bd08b9
                                                            • Opcode Fuzzy Hash: 12330899815f3f3b06d1b036b3f2d5e8b3e13a430d2a62ba69d2c7813ea06a73
                                                            • Instruction Fuzzy Hash: EE0147713843507BE22057749C06FAB3BACCB96B41F000024F745FA1C0CAE5EC8087D8
                                                            APIs
                                                            • LocalFree.KERNEL32(?,00000000,00000000,001BCAF5), ref: 001BCE9A
                                                            • LocalFree.KERNEL32(?,00000000,00000000,001BCAF5), ref: 001BCEA5
                                                            • LocalFree.KERNEL32(?,00000000,00000000,001BCAF5), ref: 001BCEB0
                                                            • LocalFree.KERNEL32(?,00000000,00000000,001BCAF5), ref: 001BCEBB
                                                            • LocalFree.KERNEL32(?,00000000,00000000,001BCAF5), ref: 001BCEC6
                                                            • LocalFree.KERNEL32(?,00000000,00000000,001BCAF5), ref: 001BCED1
                                                            • LocalFree.KERNEL32(00000000,00000000,00000000,001BCAF5), ref: 001BCED4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLocal
                                                            • String ID:
                                                            • API String ID: 2826327444-0
                                                            • Opcode ID: f994c237020b9231fdf1afd46e125bb3c126d376793ca72610aa8a4ffb45fba7
                                                            • Instruction ID: 8675af457f183b84c00c41515d798739088c23878ef02145517aafa350ab80b5
                                                            • Opcode Fuzzy Hash: f994c237020b9231fdf1afd46e125bb3c126d376793ca72610aa8a4ffb45fba7
                                                            • Instruction Fuzzy Hash: 5DF09231010B14DBD7366B2ADC48BA7BAE1BF80306F060839D582619B087B5E8D6EB90
                                                            APIs
                                                            • RegOpenKeyExA.ADVAPI32(80000001,software\Aerofox\FoxmailPreview,00000000,00020019,?), ref: 001B9DB5
                                                            • RegQueryValueExA.ADVAPI32(?,Executable,00000000,00000000,001C97B0,?), ref: 001B9DDC
                                                            • PathRemoveFileSpecA.SHLWAPI(001C97B0), ref: 001B9DE7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileOpenPathQueryRemoveSpecValue
                                                            • String ID: Executable$software\Aerofox\FoxmailPreview
                                                            • API String ID: 3687894118-2371247776
                                                            • Opcode ID: ea23586c42bc9466626abf32d2d4528bde51a32ee182670d774fccded8a8660f
                                                            • Instruction ID: b3e8c08402447e377c8277cc9978ab2ab2e661328799041bc89a625a294baef6
                                                            • Opcode Fuzzy Hash: ea23586c42bc9466626abf32d2d4528bde51a32ee182670d774fccded8a8660f
                                                            • Instruction Fuzzy Hash: 2EF03075684304BFEB209B96DD8BFDA7FBCEB55B44F110058FA01F6180E3B0E9829524
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: recv
                                                            • String ID:
                                                            • API String ID: 1507349165-0
                                                            • Opcode ID: 3a94f423a485f7c71fce4ce3d1aefdc3873cd775f017892f2d4632ba4e9fca44
                                                            • Instruction ID: 598855a38f86fc23828918ff6c29b090eaa97c0821b157d2d36533f97b509de4
                                                            • Opcode Fuzzy Hash: 3a94f423a485f7c71fce4ce3d1aefdc3873cd775f017892f2d4632ba4e9fca44
                                                            • Instruction Fuzzy Hash: 3A61D471904218EFDB10DFA4CC45BEEBBF9BF19300F058069F504AB282D7B5A946CBA1
                                                            APIs
                                                            • socket.WS2_32(00000002,00000001,00000006), ref: 001BEEB4
                                                            • gethostbyname.WS2_32(?), ref: 001BEEBD
                                                            • htons.WS2_32(?), ref: 001BEEE1
                                                            • InetNtopW.WS2_32(00000002,?,?,00000802), ref: 001BEF12
                                                            • connect.WS2_32(00000000,?,00000010), ref: 001BEF2B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InetNtopconnectgethostbynamehtonssocket
                                                            • String ID:
                                                            • API String ID: 2393792429-0
                                                            • Opcode ID: fae27d4ef009ee90f3ddcf932993ae009569478f85777fcd6aeaa124431017b8
                                                            • Instruction ID: 4c57cd9ef79b7cca68c2da06c258326286e10ec4aa77ebe01dbad9d89329788e
                                                            • Opcode Fuzzy Hash: fae27d4ef009ee90f3ddcf932993ae009569478f85777fcd6aeaa124431017b8
                                                            • Instruction Fuzzy Hash: 0111D0B29042A8BBE71097A4AC5EFFB7BACEF05320F014466F905C71D1D7B0C98487A0
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B9916
                                                            • DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B992D
                                                            • EnterCriticalSection.KERNEL32(002FDB10,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B9939
                                                            • GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,001B2E0D,?,00000001,?,?), ref: 001B9949
                                                            • LeaveCriticalSection.KERNEL32(002FDB10,?,00000000), ref: 001B999C
                                                              • Part of subcall function 001B1F4B: CreateThread.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 001B1F60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$CreateDeleteEnterHandleInitializeLeaveModuleThread
                                                            • String ID:
                                                            • API String ID: 2964645253-0
                                                            • Opcode ID: 49bf042c1f30794ab453e8f813b9bbf76b1b9a61e8f832624e4a1a487c7e18db
                                                            • Instruction ID: f533db58adcb2a19ec0b35defd61a5e1eca1362625f1cfbd876203b530a8c8a8
                                                            • Opcode Fuzzy Hash: 49bf042c1f30794ab453e8f813b9bbf76b1b9a61e8f832624e4a1a487c7e18db
                                                            • Instruction Fuzzy Hash: 0A01B531904208ABDB10AF61EC5DFEF7F7EE751364F424029F60557241DB759485CB90
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 001C0C97
                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 001C0CAC
                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 001C0CC4
                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 001C0CCF
                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 001C0CE0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 1789362936-0
                                                            • Opcode ID: 5f9a0a1215a78c69dc7f6d332399f6c07c253693eb87bc095f9a8b34f6299567
                                                            • Instruction ID: 656dcc65cb027aaa6e12f54173d8d14421c287d45f575ee43945ff1889fbad5d
                                                            • Opcode Fuzzy Hash: 5f9a0a1215a78c69dc7f6d332399f6c07c253693eb87bc095f9a8b34f6299567
                                                            • Instruction Fuzzy Hash: ED01D131200214EBD7216BB5EC4DF7E7ABCAB68765F1041A9F54592190E774CC818B15
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,00000001,?,00000000,001BB132), ref: 001BB9BA
                                                            • FreeLibrary.KERNEL32(?,?,00000000,001BB132), ref: 001BB9CA
                                                            • FreeLibrary.KERNEL32(?,?,00000000,001BB132), ref: 001BB9D8
                                                            • FreeLibrary.KERNEL32(?,?,00000000,001BB132), ref: 001BB9E6
                                                            • FreeLibrary.KERNEL32(?,?,00000000,001BB132), ref: 001BB9F4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 54bd3c257dd10fde81ee8071521d1816fbbf7d81f2f102b4af81df01603ee36f
                                                            • Instruction ID: a82c04241ec5a0feea9c60a464ac9dab2308fb971d958f12dfc0ae9b6ae119d7
                                                            • Opcode Fuzzy Hash: 54bd3c257dd10fde81ee8071521d1816fbbf7d81f2f102b4af81df01603ee36f
                                                            • Instruction Fuzzy Hash: B2F01EB1B00B26BEC7485F768C80B86FE2AFF09260F00422BA12C42221CB716474DFD2
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,001BABDF), ref: 001BB638
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,001BABDF), ref: 001BB648
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,001BABDF), ref: 001BB656
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,001BABDF), ref: 001BB664
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,001BABDF), ref: 001BB672
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 54bd3c257dd10fde81ee8071521d1816fbbf7d81f2f102b4af81df01603ee36f
                                                            • Instruction ID: a82c04241ec5a0feea9c60a464ac9dab2308fb971d958f12dfc0ae9b6ae119d7
                                                            • Opcode Fuzzy Hash: 54bd3c257dd10fde81ee8071521d1816fbbf7d81f2f102b4af81df01603ee36f
                                                            • Instruction Fuzzy Hash: B2F01EB1B00B26BEC7485F768C80B86FE2AFF09260F00422BA12C42221CB716474DFD2
                                                            APIs
                                                              • Part of subcall function 001BB559: LoadLibraryA.KERNEL32(vaultcli.dll,00000000,001BB229), ref: 001BB561
                                                            • FreeLibrary.KERNEL32(?), ref: 001BB506
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3248: lstrcmpW.KERNEL32(?,?), ref: 001B3252
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrarylstrcpylstrlen$LoadVirtuallstrcmp
                                                            • String ID: 4$8$Internet Explorer
                                                            • API String ID: 708496175-747916358
                                                            • Opcode ID: 270e2092ca54d571489e5e76f55a7c9e6e3dfc753f72e17e1076e346e501acb2
                                                            • Instruction ID: c7aed32745368064cda4fa08cc83f232ffa05126fa5a57fbdf8e2c3e047f3c59
                                                            • Opcode Fuzzy Hash: 270e2092ca54d571489e5e76f55a7c9e6e3dfc753f72e17e1076e346e501acb2
                                                            • Instruction Fuzzy Hash: B0A13871D00219ABCF15EFA5C895EEEBB79FF64300F14402AF415B7252EB70AA55CBA0
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000400,?), ref: 001C327D
                                                            • lstrcatW.KERNEL32(?,send.db), ref: 001C328F
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,001C1E0A,00000000,00000000,00000000,.bss,00000000), ref: 001B345C
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpylstrlen$FreePathTempVirtuallstrcat
                                                            • String ID: 5$send.db
                                                            • API String ID: 891666058-2022884741
                                                            • Opcode ID: c8a68d2ed75fd3d265a2b0a0e317a4239388f39e0c56eb6d9b7412190916ba87
                                                            • Instruction ID: 50def3b8fc5c26df2eb38dc31fc2cbcb4cef1a52da3bf8180ace5559fde8d433
                                                            • Opcode Fuzzy Hash: c8a68d2ed75fd3d265a2b0a0e317a4239388f39e0c56eb6d9b7412190916ba87
                                                            • Instruction Fuzzy Hash: B7013972940118ABCB10EB64DC46FEEBBBCAF60304F408065F515A2181EB749B96CBE0
                                                            APIs
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 001C3710
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 001C3722
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FolderFreePathVirtuallstrcat
                                                            • String ID: ;$\Microsoft Vision\
                                                            • API String ID: 1529938272-253167065
                                                            • Opcode ID: 71a732204add4851f5b91ba7eec24935f17d8766db1eff28c3c9a122636f1a73
                                                            • Instruction ID: e1f5ad8b456c4972e4c245bd69ae4e8a6354ace162c2fa1a2966cb285f02bd27
                                                            • Opcode Fuzzy Hash: 71a732204add4851f5b91ba7eec24935f17d8766db1eff28c3c9a122636f1a73
                                                            • Instruction Fuzzy Hash: 69011BB1C0011DBBCB10EBA0ED5AEDFBBB8AF24304F104155F515A2181EB34AB94DBD0
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(ntdll.dll), ref: 001BF4E6
                                                            • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 001BF4F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RtlGetVersion$ntdll.dll
                                                            • API String ID: 2574300362-1489217083
                                                            • Opcode ID: e7ee3e731e56992f805dcdffaf8a8b41644068d7e66674ba2f3918f895db0f98
                                                            • Instruction ID: 315a8e998bd263e19a8f393f8203719cf9936bc4efd9563733b018189faf4341
                                                            • Opcode Fuzzy Hash: e7ee3e731e56992f805dcdffaf8a8b41644068d7e66674ba2f3918f895db0f98
                                                            • Instruction Fuzzy Hash: A0E0D83478020C16CB346FB66C0BBE77AA81B12705F440178D182E1080DB74DA43CAE1
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(ntdll.dll), ref: 001BF535
                                                            • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 001BF545
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RtlGetVersion$ntdll.dll
                                                            • API String ID: 2574300362-1489217083
                                                            • Opcode ID: e67f5d243388ed830dab8cad7b9cbfab26c1d3cf3192696c5e149e0ae4c1af0d
                                                            • Instruction ID: bdf31bc0b81490907bee0866b6c026a2d2c8bdf308d5b0adda95603fb335a189
                                                            • Opcode Fuzzy Hash: e67f5d243388ed830dab8cad7b9cbfab26c1d3cf3192696c5e149e0ae4c1af0d
                                                            • Instruction Fuzzy Hash: ACE0123074021C5BCB34AFB1AC0BFD67BB85B21705F0041A8F246E1080DB74D9868E91
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,001BFC6D,?,?,001B2D84,?,001C4648,?,?,00000000,?), ref: 001C0C4B
                                                            • GetProcAddress.KERNEL32(00000000), ref: 001C0C52
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: IsWow64Process$kernel32
                                                            • API String ID: 1646373207-3789238822
                                                            • Opcode ID: 5358a89e7d0cbaf51a2affb5053dad78b9df509c7f91a2b7fd8b7a375e970197
                                                            • Instruction ID: c7c60d52c8362aaf4a56e116faf6f73fa1e898a435ff0c484783e0efeb2baaa4
                                                            • Opcode Fuzzy Hash: 5358a89e7d0cbaf51a2affb5053dad78b9df509c7f91a2b7fd8b7a375e970197
                                                            • Instruction Fuzzy Hash: 72E08C3A540204FBDB20DBE1DC0AF8E7BACEB18351B100048B001A2240DBB4EE00C764
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(?), ref: 001BD18E
                                                            • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 001BD1DD
                                                              • Part of subcall function 001B33F5: lstrcpyA.KERNEL32(00000000,?,?,00000000,?,001B2A97,?,?,00000000,exit,00000000,start), ref: 001B341A
                                                              • Part of subcall function 001B57FB: getaddrinfo.WS2_32(75A901C0,00000000,001B4EA0,00000000), ref: 001B5848
                                                              • Part of subcall function 001B57FB: socket.WS2_32(00000002,00000001,00000000), ref: 001B585F
                                                              • Part of subcall function 001B57FB: htons.WS2_32(00000000), ref: 001B5885
                                                              • Part of subcall function 001B57FB: freeaddrinfo.WS2_32(00000000), ref: 001B5895
                                                              • Part of subcall function 001B57FB: connect.WS2_32(?,?,00000010), ref: 001B58A1
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 001BD261
                                                            • EnterCriticalSection.KERNEL32(?), ref: 001BD27E
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 001BD288
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$Leave$Enter$connectfreeaddrinfogetaddrinfohtonslstrcpysocket
                                                            • String ID:
                                                            • API String ID: 4195813003-0
                                                            • Opcode ID: 3dd462edaef4cd618ec476e8f9fda21fe45456a0d3997f932df2e5d1b9c1df6e
                                                            • Instruction ID: 41be1564ca4165c396f7fde97d4091a63787022194b0c3ab957bfe45162f8074
                                                            • Opcode Fuzzy Hash: 3dd462edaef4cd618ec476e8f9fda21fe45456a0d3997f932df2e5d1b9c1df6e
                                                            • Instruction Fuzzy Hash: 5C318471600606BBD709EBB4DC51FEAB7ACBF24350F514119F51992091FB70BA55CBA0
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,?,001BDCAA), ref: 001BF6AA
                                                            • FindResourceW.KERNEL32(00000000,00000001,00000010,?,00000000,00000002,?,?,?,001BDCAA), ref: 001BF6BE
                                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000,00000002,?,?,?,001BDCAA), ref: 001BF6CA
                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,00000002,?,?,?,001BDCAA), ref: 001BF70F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoadResource$FindFree
                                                            • String ID:
                                                            • API String ID: 3272429154-0
                                                            • Opcode ID: c40163097c176048c828396be983db33ef4601c557c61c40fbd27fb2d20aba16
                                                            • Instruction ID: 676944b7886fcc90756c363e0b303b6aa1f9aaad50e2bd88df0e065747f69dfe
                                                            • Opcode Fuzzy Hash: c40163097c176048c828396be983db33ef4601c557c61c40fbd27fb2d20aba16
                                                            • Instruction Fuzzy Hash: 1E01C4B5304A019FD3084F66EC84EA6BBB5FF48314708827DE425C37A0D770D896C7A0
                                                            APIs
                                                              • Part of subcall function 001BCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 001BCC73
                                                              • Part of subcall function 001BCC54: LocalAlloc.KERNEL32(00000040,?,?,001BCBC6,?,00000000,?,00000000,?), ref: 001BCC81
                                                              • Part of subcall function 001BCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 001BCC97
                                                              • Part of subcall function 001BCC54: LocalFree.KERNEL32(?,?,001BCBC6,?,00000000,?,00000000,?), ref: 001BCCA5
                                                            • LocalFree.KERNEL32(?,00000000,-0000003A,00000000,?), ref: 001BCA6C
                                                              • Part of subcall function 001BCA78: GetLastError.KERNEL32 ref: 001BCADE
                                                            • LocalFree.KERNEL32(?), ref: 001BCA65
                                                              • Part of subcall function 001BCCB4: BCryptOpenAlgorithmProvider.BCRYPT(00000020,AES,00000000,00000000,?,00000000,?,?,?,001BCA5F,?), ref: 001BCCD1
                                                              • Part of subcall function 001BCCB4: BCryptSetProperty.BCRYPT(00000020,ChainingMode,ChainingModeGCM,00000020,00000000,?,001BCA5F,?), ref: 001BCCEA
                                                              • Part of subcall function 001BCCB4: BCryptGenerateSymmetricKey.BCRYPT(00000020,001BCA5F,00000000,00000000,?,00000020,00000000,?,001BCA5F,?), ref: 001BCCFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Crypt$Local$Free$BinaryString$AlgorithmAllocErrorGenerateLastOpenPropertyProviderSymmetric
                                                            • String ID: $DPAPI
                                                            • API String ID: 379455710-1819349886
                                                            • Opcode ID: 7024982ceb1fe2e2cc06d5ed2e1c9823fcfedb670d4248aff7a108b41fc02e99
                                                            • Instruction ID: 154760d508f76f3d281a88b81c96846e28dc7e0f6b16433041daaf0f120811ea
                                                            • Opcode Fuzzy Hash: 7024982ceb1fe2e2cc06d5ed2e1c9823fcfedb670d4248aff7a108b41fc02e99
                                                            • Instruction Fuzzy Hash: 13015BB290010DBBCF20EBA1D956DDEBB78AB94705F058265F805A3144F730EB85DBD0
                                                            APIs
                                                            • GetLastInputInfo.USER32(?), ref: 001B47FF
                                                            • GetTickCount.KERNEL32 ref: 001B4805
                                                            • GetForegroundWindow.USER32 ref: 001B4819
                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 001B482C
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Windowlstrlen$CountForegroundFreeInfoInputLastTextTickVirtuallstrcpy
                                                            • String ID:
                                                            • API String ID: 2567647128-0
                                                            • Opcode ID: 45e11aebe5f07e4c4649e48d19c0352303f19012db282304a5aa38bc64686e43
                                                            • Instruction ID: e53f27828ede0ddc8433da540b02a21cad508d2c4a9a573b373c3a05339b214f
                                                            • Opcode Fuzzy Hash: 45e11aebe5f07e4c4649e48d19c0352303f19012db282304a5aa38bc64686e43
                                                            • Instruction Fuzzy Hash: 8C111BB1D00208ABDB14EBA4ED5AADDBBB9EF68305F004155F412A6191EF74AB94CB60
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 001BEA95
                                                            • SetEvent.KERNEL32(00000000), ref: 001BEAA9
                                                            • WaitForSingleObject.KERNEL32(001C956C,00001388), ref: 001BEAB6
                                                            • TerminateThread.KERNEL32(001C956C,000000FE), ref: 001BEAC7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Thread$CurrentEventObjectSingleTerminateWait
                                                            • String ID:
                                                            • API String ID: 2174867186-0
                                                            • Opcode ID: 16411559ce00ddcfd2eed6bd3277e235a0e6c67402f844a683f5f1863ed2a7e8
                                                            • Instruction ID: a0ee62fab963ea03436adf1844a55816249ad0e512605650e756f055cd9438bc
                                                            • Opcode Fuzzy Hash: 16411559ce00ddcfd2eed6bd3277e235a0e6c67402f844a683f5f1863ed2a7e8
                                                            • Instruction Fuzzy Hash: 740131310046019BD734AF20E959EE9BBF6BF60321F544A29E092528E1CBB4A998CB51
                                                            APIs
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 001BFCFC
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001C0FC3: RegQueryValueExW.ADVAPI32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,001C3589,?,?,?,001C15B2,?,?,80000001), ref: 001C0FE6
                                                              • Part of subcall function 001C0FC3: RegQueryValueExW.ADVAPI32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,001C15B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 001C100A
                                                              • Part of subcall function 001C0FAE: RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValuelstrlen$CloseFreeOpenVirtuallstrcpy
                                                            • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                            • API String ID: 1903904756-1211650757
                                                            • Opcode ID: eb571b4be33b309b36a7e4c71a2d6085febc93d9e21445788321f693161044ef
                                                            • Instruction ID: 132a7c08d333725ab7db002b9676361d64c0260f29da2686aa43948b6fb51178
                                                            • Opcode Fuzzy Hash: eb571b4be33b309b36a7e4c71a2d6085febc93d9e21445788321f693161044ef
                                                            • Instruction Fuzzy Hash: 7F113A70A00119ABCB25EBA4CD92DEEB779AF74700B10056EF102A3191EBB09F45CB91
                                                            APIs
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,?,002FE020,?,?,001BE451,?,?), ref: 001BDE51
                                                              • Part of subcall function 001C0FC3: RegQueryValueExW.ADVAPI32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,001C3589,?,?,?,001C15B2,?,?,80000001), ref: 001C0FE6
                                                              • Part of subcall function 001C0FC3: RegQueryValueExW.ADVAPI32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,001C15B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 001C100A
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001C0FAE: RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            Strings
                                                            • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 001BDE2C
                                                            • ServiceDll, xrefs: 001BDE5F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValuelstrlen$CloseFreeOpenVirtuallstrcpy
                                                            • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll
                                                            • API String ID: 1903904756-387424650
                                                            • Opcode ID: 919e9079237d1f3c3000b2b7ec30753ef1d2aa8d39720da9f54d1351b63580b0
                                                            • Instruction ID: ed6a1c09c5f4de7da73de938b6198c85aae901ada92180d1ce8540a985018ec2
                                                            • Opcode Fuzzy Hash: 919e9079237d1f3c3000b2b7ec30753ef1d2aa8d39720da9f54d1351b63580b0
                                                            • Instruction Fuzzy Hash: 86118F31D00218ABCF25FBA0C956DEEB779AFB4700B100069F812B7281EB309F44CB50
                                                            APIs
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,00000000,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B35EE
                                                              • Part of subcall function 001B35E5: lstrlenW.KERNEL32(001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3605
                                                              • Part of subcall function 001B35E5: lstrcpyW.KERNEL32(?,001C1E02,?,001C1E02,00000000,00000000,.bss,00000000), ref: 001B3620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000102,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters), ref: 001BD9EA
                                                              • Part of subcall function 001C1039: RegSetValueExW.KERNEL32(?,75A901C0,00000000,?,?,?,?,?,001C1432,00000000,00000000,?,00000001,?,?,?), ref: 001C1058
                                                              • Part of subcall function 001B5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,001B5C2A,00000000,?,001C10EE,?,?,001C36B9), ref: 001B5EAD
                                                              • Part of subcall function 001C0FAE: RegCloseKey.KERNEL32(?,?,001C112D,?,?,001C36B9), ref: 001C0FB8
                                                            Strings
                                                            • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 001BD9C2
                                                            • ServiceDll, xrefs: 001BDA03
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$CloseFreeOpenValueVirtuallstrcpy
                                                            • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll
                                                            • API String ID: 2854241163-387424650
                                                            • Opcode ID: f19bdf3e3af3281f7cc4df5d5ee0263085a34e33f4e849eb8c3d085cdf75309f
                                                            • Instruction ID: 59803343d2616685a523addbd301a53ef3d054e2a2683db022bb0b152b64d46d
                                                            • Opcode Fuzzy Hash: f19bdf3e3af3281f7cc4df5d5ee0263085a34e33f4e849eb8c3d085cdf75309f
                                                            • Instruction Fuzzy Hash: BA112171D00218ABCB24EBA1CC96DEFBB79EFA4700F404459F51273181EB709B55CA60
                                                            APIs
                                                              • Part of subcall function 001B1085: GetProcessHeap.KERNEL32(00000000,?,001C1E36,00400000,?,?,00000000,?,?,001C349D), ref: 001B108B
                                                              • Part of subcall function 001B1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,001C349D), ref: 001B1092
                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000100,?,?,?,?,?,?,?,00000000,75A901C0,00000000,001C3628), ref: 001C3008
                                                            • WinExec.KERNEL32(00000000,00000000), ref: 001C304E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1685145058.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                            • Associated: 00000000.00000002.1685127008.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685168541.00000000001C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000001C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685189189.00000000002FD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1685257455.00000000002FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1b0000_OhWWbQcp7Q.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateExecFileModuleNameProcess
                                                            • String ID: powershell Add-MpPreference -ExclusionPath
                                                            • API String ID: 1183730998-2194938034
                                                            • Opcode ID: d8fded5037ebc35c6bac7bd84428ee8c70e430f394cccc216c3f1fed7c139f24
                                                            • Instruction ID: b52bb73dbdf3b2d6a1dd86690fb61221b67c548657f22b6a1247eaebd9dba9fa
                                                            • Opcode Fuzzy Hash: d8fded5037ebc35c6bac7bd84428ee8c70e430f394cccc216c3f1fed7c139f24
                                                            • Instruction Fuzzy Hash: 4DF096F154025076E12032756CDBFFF5A9CDFB9751F850025F604A21C2EB68DD8041B5

                                                            Execution Graph

                                                            Execution Coverage:9.9%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:58
                                                            execution_graph 9883 672473 9886 682217 9883->9886 9891 682c91 9886->9891 9888 682229 9889 682235 9888->9889 9894 682bf3 9888->9894 9892 682c9c 9891->9892 9893 682cfc CoUninitialize 9892->9893 9893->9888 9895 682c91 CoUninitialize 9894->9895 9898 682bfe 9895->9898 9896 682c27 9896->9889 9897 675ca3 3 API calls 9897->9898 9898->9896 9898->9897 9900 682f63 9898->9900 9903 675ea5 VirtualFree 9900->9903 9902 682f6d 9903->9902 12972 671d78 12977 675ea5 VirtualFree 12972->12977 12974 671d83 12978 675ea5 VirtualFree 12974->12978 12976 671d8e 12977->12974 12978->12976 9965 683251 9966 671052 9965->9966 9967 683272 GetTempPathW lstrcatW 9966->9967 9968 6735e5 4 API calls 9967->9968 9969 6832a7 9968->9969 9970 673437 3 API calls 9969->9970 9971 6832af 9970->9971 9980 675ea5 VirtualFree 9971->9980 9973 6832b7 9974 673761 7 API calls 9973->9974 9975 6832d5 9974->9975 9976 673679 8 API calls 9975->9976 9977 6832dc 9976->9977 9978 673665 2 API calls 9977->9978 9979 6832e4 9978->9979 9980->9973 13034 67395c 13035 673962 13034->13035 13036 681dc0 11 API calls 13035->13036 13037 67397a 13036->13037 13038 673437 3 API calls 13037->13038 13039 673984 13038->13039 13042 675ea5 VirtualFree 13039->13042 13041 67398c 13042->13041 13043 67ed5b 13044 6733f5 3 API calls 13043->13044 13045 67ed71 13044->13045 13054 674a75 13045->13054 13048 674f2b 15 API calls 13049 67ed82 13048->13049 13063 674a17 13049->13063 13053 67ed92 13055 67309d 10 API calls 13054->13055 13056 674a93 13055->13056 13057 673437 3 API calls 13056->13057 13058 674a9c 13057->13058 13067 675ea5 VirtualFree 13058->13067 13060 674aa4 13068 675ea5 VirtualFree 13060->13068 13062 674ab0 13062->13048 13069 675ea5 VirtualFree 13063->13069 13065 674a28 13066 675ea5 VirtualFree 13065->13066 13066->13053 13067->13060 13068->13062 13069->13065 13109 673d22 13110 673d2a 13109->13110 13111 681dc0 11 API calls 13110->13111 13112 673d91 13111->13112 13113 673437 3 API calls 13112->13113 13114 673d9b 13113->13114 13123 675ea5 VirtualFree 13114->13123 13116 673da3 13117 672e4c 8 API calls 13116->13117 13118 673dca 13117->13118 13119 672e93 2 API calls 13118->13119 13120 673dd3 13119->13120 13121 673036 2 API calls 13120->13121 13122 673ddb 13121->13122 13123->13116 9735 67122b 9738 67e703 InitializeCriticalSection 9735->9738 9790 675f53 GetProcessHeap HeapAlloc 9738->9790 9740 67e752 9791 6732ff 9740->9791 9743 6732ff 9 API calls 9744 67e79b 9743->9744 9745 6735e5 4 API calls 9744->9745 9746 67e7a8 9745->9746 9801 6731d4 9746->9801 9749 673437 3 API calls 9750 67e7bd 9749->9750 9806 675ea5 VirtualFree 9750->9806 9752 67e7c5 9807 675ea5 VirtualFree 9752->9807 9754 67e7d0 9808 67fc58 GetCurrentProcess 9754->9808 9757 67e80f 9760 6731d4 5 API calls 9757->9760 9758 67e7da 9759 6732ff 9 API calls 9758->9759 9761 67e7e6 9759->9761 9762 67e819 9760->9762 9764 6731d4 5 API calls 9761->9764 9763 673437 3 API calls 9762->9763 9765 67e826 9763->9765 9766 67e7f0 9764->9766 9813 675ea5 VirtualFree 9765->9813 9768 673437 3 API calls 9766->9768 9770 67e7fd 9768->9770 9769 67e80d 9771 67346a 9 API calls 9769->9771 9811 675ea5 VirtualFree 9770->9811 9773 67e83b 9771->9773 9775 67346a 9 API calls 9773->9775 9774 67e805 9776 6732ff 9 API calls 9774->9776 9777 67e843 9775->9777 9776->9769 9778 67346a 9 API calls 9777->9778 9779 67e852 9778->9779 9812 67f71f SHCreateDirectoryExW 9779->9812 9781 67e859 9782 673437 3 API calls 9781->9782 9783 67e866 9782->9783 9784 67346a 9 API calls 9783->9784 9785 67e872 9784->9785 9786 67346a 9 API calls 9785->9786 9787 67e87f 9786->9787 9788 67346a 9 API calls 9787->9788 9789 671230 9788->9789 9790->9740 9792 673310 9791->9792 9793 67330b 9791->9793 9795 6735e5 4 API calls 9792->9795 9815 675ea5 VirtualFree 9793->9815 9796 67331e 9795->9796 9797 673335 5 API calls 9796->9797 9798 673326 9797->9798 9814 675ea5 VirtualFree 9798->9814 9800 67332e 9800->9743 9802 671052 9801->9802 9803 6731f6 ExpandEnvironmentStringsW 9802->9803 9804 6735e5 4 API calls 9803->9804 9805 67321b 9804->9805 9805->9749 9806->9752 9807->9754 9816 680c36 GetModuleHandleA GetProcAddress 9808->9816 9811->9774 9812->9781 9813->9769 9814->9800 9815->9792 9817 67e7d5 9816->9817 9817->9757 9817->9758 13131 671b2b 13134 6737c0 13131->13134 13137 675ea5 VirtualFree 13134->13137 13136 671b33 13137->13136 10222 671c36 10225 675ea5 VirtualFree 10222->10225 10224 671c47 10225->10224 13154 67813c 13156 678148 13154->13156 13155 67817d 13156->13155 13158 678246 13156->13158 13160 671f2c 2 API calls 13156->13160 13161 671085 GetProcessHeap RtlAllocateHeap 13156->13161 13159 671f2c 2 API calls 13158->13159 13159->13155 13160->13156 13161->13156 10233 67120d 10236 67c98b 10233->10236 10239 672110 10236->10239 10242 675f53 GetProcessHeap HeapAlloc 10239->10242 10241 671212 10242->10241 10243 674c0a 10244 674c1d 10243->10244 10278 674c64 10243->10278 10245 674d56 10244->10245 10246 674c29 10244->10246 10249 674ddf 10245->10249 10253 674d66 10245->10253 10254 674dc8 10245->10254 10277 674dce 10245->10277 10247 674c2f 10246->10247 10248 674d4a 10246->10248 10251 674cdf 10247->10251 10252 674c38 10247->10252 10564 67c938 10248->10564 10260 674df3 10249->10260 10261 674e29 10249->10261 10249->10278 10289 674e35 10249->10289 10255 674ce4 10251->10255 10256 674d40 10251->10256 10258 674cd3 10252->10258 10259 674c3e 10252->10259 10262 674dbe 10253->10262 10263 674d6d 10253->10263 10717 6727d3 10254->10717 10264 674d32 10255->10264 10265 674ceb 10255->10265 10551 6729b3 10256->10551 10480 6729fb 10258->10480 10269 674c43 10259->10269 10270 674c9b 10259->10270 10281 674e20 10260->10281 10282 674dfa 10260->10282 10800 672686 10261->10800 10708 67990a InitializeCriticalSection DeleteCriticalSection EnterCriticalSection GetModuleHandleA 10262->10708 10283 674db3 10263->10283 10284 674d71 10263->10284 10542 68239e 10264->10542 10285 674cef 10265->10285 10286 674d28 10265->10286 10279 674c45 10269->10279 10280 674c8f 10269->10280 10274 674cc7 10270->10274 10275 674ca0 10270->10275 10455 672af6 SetLastError 10274->10455 10291 674ca7 10275->10291 10292 674cbb 10275->10292 10748 6726c4 10277->10748 10294 674c7d 10279->10294 10295 674c4a 10279->10295 10412 672be5 10280->10412 10794 672650 10281->10794 10296 674dfe 10282->10296 10297 674e19 10282->10297 10702 6798c4 EnterCriticalSection 10283->10702 10298 674d9c 10284->10298 10307 674d90 10284->10307 10308 674d79 10284->10308 10299 674cf3 10285->10299 10300 674d1e 10285->10300 10536 682367 10286->10536 10811 672968 10289->10811 10291->10278 10417 672a10 10291->10417 10440 672aa1 10292->10440 10372 672cec 10294->10372 10303 674c73 10295->10303 10304 674c51 10295->10304 10305 674e03 10296->10305 10306 674e10 10296->10306 10791 672639 10297->10791 10594 67e3fa InitializeCriticalSection DeleteCriticalSection EnterCriticalSection 10298->10594 10309 674e4e 10299->10309 10310 674cfb 10299->10310 10533 67298b 10300->10533 10359 672c8e 10303->10359 10317 674c55 10304->10317 10318 674c69 10304->10318 10305->10278 10761 672b80 10305->10761 10778 6725cb 10306->10778 10581 67275a 10307->10581 10308->10278 10572 67d328 EnterCriticalSection 10308->10572 10816 672961 10309->10816 10319 674d12 10310->10319 10320 674cff 10310->10320 10317->10278 10331 672bf4 10317->10331 10346 672c47 10318->10346 10509 6728cf 10319->10509 10320->10278 10485 683936 10320->10485 10332 67362d 3 API calls 10331->10332 10333 672c09 10332->10333 10835 67ff27 10333->10835 10336 671361 12 API calls 10337 672c1f 10336->10337 10853 674450 10337->10853 10340 674f2b 15 API calls 10341 672c2f 10340->10341 10858 67442d 10341->10858 10344 672c44 10344->10278 10345 671ad5 VirtualFree 10345->10344 10865 68002b 10346->10865 10348 672c58 10887 6713a8 10348->10887 10353 674f2b 15 API calls 10354 672c76 10353->10354 10898 67451b 10354->10898 10357 672c8b 10357->10278 10934 680d24 10359->10934 10361 672ca0 10962 67131a 10361->10962 10366 674f2b 15 API calls 10367 672cbe 10366->10367 10973 674624 10367->10973 10369 672cc6 10370 672ce8 10369->10370 10977 671416 10369->10977 10370->10278 11010 67f93f 10372->11010 10377 681e21 6 API calls 10378 672d32 10377->10378 10379 6735e5 4 API calls 10378->10379 10380 672d58 10379->10380 10381 6735e5 4 API calls 10380->10381 10382 672d61 10381->10382 11029 67fa1f GlobalMemoryStatusEx 10382->11029 10384 672d66 10385 6735e5 4 API calls 10384->10385 10386 672d77 10385->10386 11030 67fc7e GetComputerNameW 10386->11030 10389 67fc58 3 API calls 10390 672d84 10389->10390 10391 67fbfc 4 API calls 10390->10391 10392 672d8a 10391->10392 11033 67fa42 LoadLibraryA 10392->11033 10399 674f2b 15 API calls 10400 672daf 10399->10400 11083 6741ff 10400->11083 11109 6712ad 10412->11109 10416 672bf3 10416->10278 10418 6733bf 4 API calls 10417->10418 10419 672a29 10418->10419 11273 6733a3 lstrcmpA 10419->11273 10421 672a31 11274 675ea5 VirtualFree 10421->11274 10423 672a4c 10424 672a50 10423->10424 10425 672a58 10423->10425 11275 67edb5 10424->11275 10427 6733bf 4 API calls 10425->10427 10429 672a65 10427->10429 10428 672a56 10428->10278 11286 6733a3 lstrcmpA 10429->11286 10431 672a6d 11287 675ea5 VirtualFree 10431->11287 10433 672a77 10434 672a8e 10433->10434 10435 672a7b 10433->10435 11304 6733f5 10434->11304 11288 67ea89 10435->11288 11422 680cf6 OpenProcess 10440->11422 10442 672ab6 10443 672ac5 GetLastError 10442->10443 10444 672aba 10442->10444 10446 672ac1 10443->10446 10445 672c8e 38 API calls 10444->10445 10445->10446 11425 680c79 CreateToolhelp32Snapshot 10446->11425 10448 672ad8 11433 674346 10448->11433 10451 674f2b 15 API calls 10452 672ae9 10451->10452 11438 67432f 10452->11438 10456 67362d 3 API calls 10455->10456 10457 672b18 10456->10457 11443 67ff0b DeleteFileW 10457->11443 10459 672b1d 10460 672b22 10459->10460 10461 672b51 GetLastError 10459->10461 10463 67362d 3 API calls 10460->10463 10462 672b4f 10461->10462 10464 67362d 3 API calls 10462->10464 10465 672b2b 10463->10465 10466 672b62 10464->10466 10467 67362d 3 API calls 10465->10467 11455 673fcb 10466->11455 10468 672b37 10467->10468 11446 6739b5 10468->11446 10473 674f2b 15 API calls 10475 672b73 10473->10475 11460 673fb4 10475->11460 10476 672b47 11452 67399e 10476->11452 10481 6712ad 3 API calls 10480->10481 10482 672a07 10481->10482 10483 677574 24 API calls 10482->10483 10484 672a0e 10483->10484 10484->10278 10486 67304c 2 API calls 10485->10486 10487 68394d 10486->10487 10488 683ae8 10487->10488 10489 683959 10487->10489 10494 672f91 6 API calls 10488->10494 10490 683962 10489->10490 10491 683aa6 10489->10491 10492 68396b 10490->10492 10493 683a5d 10490->10493 10498 672f91 6 API calls 10491->10498 10495 683a14 10492->10495 10496 683974 10492->10496 10499 672f91 6 API calls 10493->10499 10504 6839a8 10494->10504 10503 672f91 6 API calls 10495->10503 10497 6839cb 10496->10497 10507 683979 10496->10507 10505 672f91 6 API calls 10497->10505 10498->10504 10499->10504 10500 683b2e 10502 673036 2 API calls 10500->10502 10501 683b28 SetEvent 10501->10500 10506 683b36 10502->10506 10503->10504 10504->10500 10504->10501 10505->10504 10506->10278 10507->10500 10508 672f91 6 API calls 10507->10508 10508->10504 10510 67362d 3 API calls 10509->10510 10511 6728e7 10510->10511 11468 680203 10511->11468 10514 67362d 3 API calls 10515 6728f8 PathFileExistsW 10514->10515 11475 675ea5 VirtualFree 10515->11475 10517 67290b 10518 672910 10517->10518 10519 67291b 10517->10519 11476 6801d1 CreateFileW 10518->11476 10521 680192 2 API calls 10519->10521 10522 672919 10521->10522 10523 672955 10522->10523 10524 67304c 2 API calls 10522->10524 10525 67feed 4 API calls 10523->10525 10527 672938 10524->10527 10526 67295d 10525->10526 10526->10278 10528 68013d 4 API calls 10527->10528 10529 672945 10528->10529 10530 673036 2 API calls 10529->10530 10531 67294d 10530->10531 10532 680125 CloseHandle 10531->10532 10532->10523 10534 674f2b 15 API calls 10533->10534 10535 6729a0 10534->10535 10535->10278 11480 68026f WaitForSingleObject 10536->11480 10538 682371 10539 682391 ReleaseMutex 10538->10539 10540 682c91 CoUninitialize 10538->10540 10539->10278 10541 68238a 10540->10541 10541->10539 11481 68026f WaitForSingleObject 10542->11481 10544 6823f8 ReleaseMutex 10544->10278 10545 6823ab 10545->10544 10546 6823d2 10545->10546 11482 675f53 GetProcessHeap HeapAlloc 10545->11482 11483 682d0a CoInitialize CoCreateInstance 10546->11483 10549 6823c6 10549->10546 10550 682ed4 20 API calls 10549->10550 10550->10546 11500 68223e 10551->11500 10558 674f2b 15 API calls 10559 6729e3 10558->10559 11528 67479b 10559->11528 10562 6729f8 10562->10278 10565 67c945 10564->10565 10566 67c94b 10564->10566 11568 671a7e 10565->11568 11572 675eff GetProcessHeap RtlAllocateHeap 10566->11572 10569 67c964 11573 671f4b CreateThread 10569->11573 10571 67c987 10571->10278 11584 671f76 10572->11584 10575 671f76 2 API calls 10576 67d34f 10575->10576 11587 675584 shutdown closesocket 10576->11587 10578 67d357 11588 675584 shutdown closesocket 10578->11588 10580 67d362 LeaveCriticalSection 10580->10278 10582 67d328 6 API calls 10581->10582 10583 672770 10582->10583 10584 6733bf 4 API calls 10583->10584 10585 67278e 10584->10585 11589 675c6d 10585->11589 10587 67279c 10588 673554 11 API calls 10587->10588 10589 6727a3 10588->10589 11592 67d36c 10589->11592 10591 6727a9 11607 675ea5 VirtualFree 10591->11607 10593 6727b1 10593->10298 11612 67de1f 10594->11612 10597 67e554 10599 67f51d 2 API calls 10597->10599 10598 67e459 10600 6735e5 4 API calls 10598->10600 10601 67e559 10599->10601 10602 67e466 10600->10602 10603 67e6cf 10601->10603 11671 67f4ce LoadLibraryA 10601->11671 11637 68168e 10602->11637 10607 674b91 3 API calls 10603->10607 10610 67e6e3 10607->10610 10608 67e567 10608->10603 10611 67e56f 10608->10611 10609 673437 3 API calls 10612 67e47d 10609->10612 10613 674f2b 15 API calls 10610->10613 10614 67fbfc 4 API calls 10611->10614 11655 675ea5 VirtualFree 10612->11655 10616 67e6eb 10613->10616 10617 67e574 10614->10617 10619 674b6e VirtualFree 10616->10619 10620 67e5a4 10617->10620 10621 67e579 10617->10621 10618 67e485 11656 675ea5 VirtualFree 10618->11656 10623 67e6f3 LeaveCriticalSection 10619->10623 10625 6734a7 21 API calls 10620->10625 10626 674b91 3 API calls 10621->10626 10624 67e6fc 10623->10624 10624->10278 10628 67e5af 10625->10628 10629 67e58d 10626->10629 10627 67e492 10630 6735e5 4 API calls 10627->10630 10633 673437 3 API calls 10628->10633 10631 674f2b 15 API calls 10629->10631 10632 67e49f 10630->10632 10634 67e595 10631->10634 10635 68168e 22 API calls 10632->10635 10636 67e5ba 10633->10636 10637 674b6e VirtualFree 10634->10637 10638 67e4ab 10635->10638 11674 675ea5 VirtualFree 10636->11674 10680 67e52a 10637->10680 10640 673437 3 API calls 10638->10640 10643 67e4b8 10640->10643 10641 67e5c2 10644 6734a7 21 API calls 10641->10644 10642 67e658 LeaveCriticalSection 10642->10624 11657 675ea5 VirtualFree 10643->11657 10646 67e5cd 10644->10646 10648 673437 3 API calls 10646->10648 10647 67e4c0 11658 675ea5 VirtualFree 10647->11658 10650 67e5da 10648->10650 11675 675ea5 VirtualFree 10650->11675 10651 67e4cb 10654 673261 lstrlenW 10651->10654 10653 67e5e2 RegCreateKeyExA RegSetValueExW RegCloseKey 11676 67d418 NetUserAdd 10653->11676 10656 67e4d5 10654->10656 10658 67e52c 10656->10658 10661 673261 lstrlenW 10656->10661 10662 674b91 3 API calls 10658->10662 10659 67e66b 10664 6735e5 4 API calls 10659->10664 10660 67e638 10663 674b91 3 API calls 10660->10663 10665 67e4e0 10661->10665 10666 67e53c 10662->10666 10668 67e648 10663->10668 10669 67e67d 10664->10669 10665->10658 10670 67e4e4 10665->10670 10667 674f2b 15 API calls 10666->10667 10671 67e544 10667->10671 10672 674f2b 15 API calls 10668->10672 11682 68165b 10669->11682 10674 6735e5 4 API calls 10670->10674 10676 674b6e VirtualFree 10671->10676 10677 67e650 10672->10677 10675 67e4f2 10674->10675 10679 6735e5 4 API calls 10675->10679 10676->10680 10681 674b6e VirtualFree 10677->10681 10684 67e4fc 10679->10684 10680->10642 10681->10642 10683 67e690 10685 6735e5 4 API calls 10683->10685 11659 674b91 10684->11659 10687 67e69e 10685->10687 10689 68165b 8 API calls 10687->10689 10691 67e6a6 10689->10691 10690 674f2b 15 API calls 10692 67e50f 10690->10692 11691 675ea5 VirtualFree 10691->11691 11664 674b6e 10692->11664 10695 67e6ae 11692 671f4b CreateThread 10695->11692 10699 67e6c3 LeaveCriticalSection 10699->10624 10700 67e51f 11670 675ea5 VirtualFree 10700->11670 10703 6798ff LeaveCriticalSection 10702->10703 10704 6798da 10702->10704 10703->10278 10705 671f76 2 API calls 10704->10705 10706 6798e4 10705->10706 11712 671f4b CreateThread 10706->11712 10709 679965 10708->10709 10710 67997c 10708->10710 11713 671f4b CreateThread 10709->11713 10712 671f76 2 API calls 10710->10712 10714 679981 10712->10714 10713 679970 10715 67999b LeaveCriticalSection 10713->10715 11714 671f4b CreateThread 10714->11714 10715->10278 10718 67f76b 5 API calls 10717->10718 10719 6727e9 10718->10719 10720 6734a7 21 API calls 10719->10720 10721 6727f4 10720->10721 10722 67346a 9 API calls 10721->10722 10723 672803 10722->10723 10724 673335 5 API calls 10723->10724 10725 67280b 10724->10725 11715 675ea5 VirtualFree 10725->11715 10727 672813 10728 67362d 3 API calls 10727->10728 10729 672822 10728->10729 11716 67351d 10729->11716 10732 673335 5 API calls 10733 672837 10732->10733 11721 675ea5 VirtualFree 10733->11721 10735 67283f 11722 675ea5 VirtualFree 10735->11722 10737 67284b 10738 67362d 3 API calls 10737->10738 10739 672857 URLDownloadToFileW 10738->10739 11723 675ea5 VirtualFree 10739->11723 10741 672870 10742 672874 10741->10742 10743 67287d ShellExecuteW 10741->10743 10744 674f2b 15 API calls 10742->10744 10743->10742 10745 6728b1 10744->10745 11724 675ea5 VirtualFree 10745->11724 10747 6728b9 10747->10277 10749 675c6d 3 API calls 10748->10749 10750 6726e4 10749->10750 10751 673554 11 API calls 10750->10751 10752 6726eb 10751->10752 11725 675ea5 VirtualFree 10752->11725 10754 6726f3 inet_addr 10755 672701 getaddrinfo 10754->10755 10756 672739 10754->10756 10755->10756 11726 683de9 10756->11726 10760 67274a 10760->10249 10762 67362d 3 API calls 10761->10762 10763 672b99 10762->10763 10764 67ff27 17 API calls 10763->10764 10765 672ba1 10764->10765 10766 671361 12 API calls 10765->10766 10767 672baf 10766->10767 10768 67362d 3 API calls 10767->10768 10769 672bb8 10768->10769 11734 673bbb 10769->11734 10772 674f2b 15 API calls 10773 672bcb 10772->10773 11745 673b8b 10773->11745 10776 672be0 10776->10278 10777 671ad5 VirtualFree 10777->10776 10779 67304c 2 API calls 10778->10779 10780 6725e9 10779->10780 11759 681e8c VirtualAlloc 10780->11759 10782 6725f6 10783 672612 10782->10783 10784 672619 10782->10784 11762 677af1 10783->11762 11781 6779e8 10784->11781 10788 67261e VirtualFree 10789 673036 2 API calls 10788->10789 10790 672634 10789->10790 10790->10278 10792 674f2b 15 API calls 10791->10792 10793 67264e 10792->10793 10793->10278 10795 672683 10794->10795 10796 67265c 10794->10796 10795->10278 10797 67362d 3 API calls 10796->10797 10798 672668 ShellExecuteW 10797->10798 11866 675ea5 VirtualFree 10798->11866 10801 675c6d 3 API calls 10800->10801 10802 6726a1 10801->10802 10803 673554 11 API calls 10802->10803 10804 6726a8 10803->10804 11867 67ee22 10804->11867 10808 6726b8 11871 675ea5 VirtualFree 10808->11871 10810 6726c0 10810->10289 10812 674f2b 15 API calls 10811->10812 10813 672981 10812->10813 11961 6832ed 10813->11961 10817 68171c 10816->10817 11965 680f31 RegDeleteKeyW 10817->11965 10819 681732 10820 681739 TerminateThread 10819->10820 10821 681746 10819->10821 10820->10821 10822 681788 10821->10822 10823 68106c 5 API calls 10821->10823 10825 681794 GetModuleFileNameA 10822->10825 10824 681762 10823->10824 10826 67362d 3 API calls 10824->10826 10833 6817c6 10825->10833 10827 68176e 10826->10827 11966 680f4c 10827->11966 10831 681781 10832 680fae RegCloseKey 10831->10832 10832->10822 10834 68181a CreateProcessA CloseHandle CloseHandle ExitProcess 10833->10834 10836 671875 2 API calls 10835->10836 10837 67ff4a FindFirstFileW 10836->10837 10849 67ff64 10837->10849 10838 680004 10839 671361 12 API calls 10838->10839 10840 68000f 10839->10840 10842 68001c 10840->10842 10843 671ad5 VirtualFree 10840->10843 10841 6735e5 4 API calls 10841->10849 10864 675ea5 VirtualFree 10842->10864 10843->10842 10845 673437 3 API calls 10845->10849 10846 672c11 10846->10336 10848 67362d 3 API calls 10848->10849 10849->10838 10849->10841 10849->10845 10849->10848 10850 671776 6 API calls 10849->10850 10862 675ea5 VirtualFree 10849->10862 10863 675ea5 VirtualFree 10849->10863 10850->10849 10852 67ffee FindNextFileW 10852->10849 10854 671361 12 API calls 10853->10854 10855 674468 10854->10855 10856 672c27 10855->10856 10857 671ad5 VirtualFree 10855->10857 10856->10340 10857->10856 10859 672c37 10858->10859 10860 67443d 10858->10860 10859->10344 10859->10345 10861 671ad5 VirtualFree 10860->10861 10861->10859 10862->10849 10863->10852 10864->10846 10906 675f53 GetProcessHeap HeapAlloc 10865->10906 10867 680043 10907 6719f6 10867->10907 10870 680070 10910 675f53 GetProcessHeap HeapAlloc 10870->10910 10872 680103 10875 6713a8 12 API calls 10872->10875 10873 680083 GetLogicalDriveStringsW 10885 68008d 10873->10885 10874 6735e5 4 API calls 10874->10885 10876 680111 10875->10876 10878 68011e 10876->10878 10879 671b00 VirtualFree 10876->10879 10877 673437 3 API calls 10877->10885 10878->10348 10879->10878 10881 6800b1 GetDriveTypeW 10882 67362d 3 API calls 10881->10882 10882->10885 10884 673261 lstrlenW 10884->10885 10885->10872 10885->10874 10885->10877 10885->10884 10911 675ea5 VirtualFree 10885->10911 10912 671903 10885->10912 10924 675ea5 VirtualFree 10885->10924 10888 6719f6 2 API calls 10887->10888 10892 6713c3 10888->10892 10889 6713e6 10893 67453e 10889->10893 10891 671903 6 API calls 10891->10892 10892->10889 10892->10891 10928 671a43 10892->10928 10894 6713a8 12 API calls 10893->10894 10895 674556 10894->10895 10896 672c6e 10895->10896 10897 671b00 VirtualFree 10895->10897 10896->10353 10897->10896 10899 672c7e 10898->10899 10900 67452b 10898->10900 10899->10357 10902 671b00 10899->10902 10901 671b00 VirtualFree 10900->10901 10901->10899 10903 671b23 10902->10903 10904 671b11 10902->10904 10903->10357 10904->10903 10933 675ea5 VirtualFree 10904->10933 10906->10867 10925 675f53 GetProcessHeap HeapAlloc 10907->10925 10909 671a1f GetLogicalDriveStringsW 10909->10870 10909->10885 10910->10873 10911->10881 10913 67191a 10912->10913 10921 6719be 10912->10921 10926 675f53 GetProcessHeap HeapAlloc 10913->10926 10915 673437 3 API calls 10916 6719d8 10915->10916 10927 675ea5 VirtualFree 10916->10927 10918 6719ef 10918->10885 10919 6719ac 10919->10921 10923 671b00 VirtualFree 10919->10923 10920 671943 10920->10919 10922 673437 3 API calls 10920->10922 10921->10915 10922->10920 10923->10921 10924->10885 10925->10909 10926->10920 10927->10918 10929 675ca3 3 API calls 10928->10929 10930 671a59 10929->10930 10931 67362d 3 API calls 10930->10931 10932 671a69 10931->10932 10932->10892 10933->10904 10935 680d46 10934->10935 10982 6716e3 10935->10982 10937 680d67 CreateToolhelp32Snapshot 10938 680d7b Process32FirstW 10937->10938 10939 680efd 10937->10939 10941 680d8d CloseHandle 10938->10941 10942 680dce 10938->10942 10940 67131a 12 API calls 10939->10940 10944 680f08 10940->10944 10945 67131a 12 API calls 10941->10945 10943 6732ff 9 API calls 10942->10943 10946 680dec OpenProcess 10943->10946 10947 680dc9 10944->10947 10948 671416 VirtualFree 10944->10948 10952 680d9f 10945->10952 10957 680e09 10946->10957 10947->10361 10948->10944 10949 6735e5 lstrlenW lstrlenW lstrcpyW VirtualAlloc 10949->10957 10950 671416 VirtualFree 10950->10952 10951 680e1c GetModuleFileNameExW 10951->10957 10952->10947 10952->10950 10953 675ea5 VirtualFree 10953->10957 10954 673437 lstrlenW lstrcpyW VirtualAlloc 10954->10957 10955 680e80 CloseHandle 10955->10957 10956 67362d lstrlenW lstrcpyW VirtualAlloc 10956->10957 10957->10949 10957->10951 10957->10953 10957->10954 10957->10955 10957->10956 10959 671416 VirtualFree 10957->10959 10985 6715c0 10957->10985 10960 680edd Process32NextW 10959->10960 10960->10942 10961 680ef6 CloseHandle 10960->10961 10961->10939 10963 6716e3 2 API calls 10962->10963 10966 671335 10963->10966 10964 671358 10968 674660 10964->10968 10966->10964 10967 6715c0 6 API calls 10966->10967 11001 671735 10966->11001 10967->10966 10969 67131a 12 API calls 10968->10969 10972 674678 10969->10972 10970 672cb6 10970->10366 10971 671416 VirtualFree 10971->10972 10972->10970 10972->10971 10974 674634 10973->10974 10975 674651 10973->10975 10974->10975 10976 671416 VirtualFree 10974->10976 10975->10369 10976->10974 11008 675ea5 VirtualFree 10977->11008 10979 671421 11009 675ea5 VirtualFree 10979->11009 10981 67142d 10981->10369 10999 675f53 GetProcessHeap HeapAlloc 10982->10999 10984 67170c 10984->10937 10984->10984 10986 6715d7 10985->10986 10987 67169c 10985->10987 11000 675f53 GetProcessHeap HeapAlloc 10986->11000 10989 673437 3 API calls 10987->10989 10990 6716c3 10989->10990 10991 673437 3 API calls 10990->10991 10992 6716d1 10991->10992 10994 671416 VirtualFree 10992->10994 10993 671600 10993->10993 10996 673437 lstrlenW lstrcpyW VirtualAlloc 10993->10996 10998 671676 10993->10998 10995 6716dc 10994->10995 10995->10957 10996->10993 10997 671416 VirtualFree 10997->10998 10998->10987 10998->10997 10999->10984 11000->10993 11002 675ca3 3 API calls 11001->11002 11003 67174a 11002->11003 11004 67362d 3 API calls 11003->11004 11005 671762 11004->11005 11006 67362d 3 API calls 11005->11006 11007 67176e 11006->11007 11007->10966 11008->10979 11009->10981 11012 67f97d 11010->11012 11092 671085 GetProcessHeap RtlAllocateHeap 11012->11092 11013 67f9e4 11014 6733bf 4 API calls 11013->11014 11015 67fa02 11014->11015 11016 67309d 10 API calls 11015->11016 11017 67fa09 11016->11017 11093 675ea5 VirtualFree 11017->11093 11019 67fa11 11094 671099 GetProcessHeap HeapFree 11019->11094 11021 672d04 11022 67f80e CoInitializeSecurity CoInitialize 11021->11022 11023 67f836 CoCreateInstance 11022->11023 11028 67f877 11022->11028 11026 67f854 11023->11026 11023->11028 11024 6735e5 4 API calls 11025 672d0c GetModuleFileNameA 11024->11025 11025->10377 11026->11025 11027 67f8ca VariantInit 11026->11027 11026->11028 11027->11026 11028->11024 11029->10384 11031 6735e5 4 API calls 11030->11031 11032 672d7f 11031->11032 11032->10389 11034 67fa64 GetProcAddress 11033->11034 11035 672d90 11033->11035 11034->11035 11036 67fcb8 11035->11036 11037 67fd58 11036->11037 11038 67fcde 11036->11038 11041 672e93 2 API calls 11037->11041 11039 6735e5 4 API calls 11038->11039 11040 67fceb RegOpenKeyExW 11039->11040 11095 675ea5 VirtualFree 11040->11095 11043 67fd6c 11041->11043 11045 673036 2 API calls 11043->11045 11044 67fd0e 11046 67fd3d 11044->11046 11050 6735e5 4 API calls 11044->11050 11047 67fd74 11045->11047 11097 67607a 11046->11097 11048 680fae RegCloseKey 11047->11048 11051 672d9f 11048->11051 11053 67fd24 11050->11053 11062 674241 11051->11062 11055 680fc3 12 API calls 11053->11055 11054 672e93 2 API calls 11056 67fd50 11054->11056 11057 67fd2d 11055->11057 11059 673036 2 API calls 11056->11059 11096 675ea5 VirtualFree 11057->11096 11059->11037 11060 67fd35 11061 680fae RegCloseKey 11060->11061 11061->11046 11063 67304c 2 API calls 11062->11063 11064 674259 11063->11064 11065 67362d 3 API calls 11064->11065 11066 67427d 11065->11066 11067 67362d 3 API calls 11066->11067 11068 674289 11067->11068 11069 67362d 3 API calls 11068->11069 11070 6742a1 11069->11070 11071 67362d 3 API calls 11070->11071 11072 6742ad 11071->11072 11073 673036 2 API calls 11072->11073 11074 6742b5 11073->11074 11101 675ea5 VirtualFree 11074->11101 11076 6742bd 11102 675ea5 VirtualFree 11076->11102 11078 6742c9 11103 675ea5 VirtualFree 11078->11103 11080 6742d5 11104 675ea5 VirtualFree 11080->11104 11082 672da7 11082->10399 11105 675ea5 VirtualFree 11083->11105 11085 674211 11106 675ea5 VirtualFree 11085->11106 11087 67421e 11107 675ea5 VirtualFree 11087->11107 11089 674229 11108 675ea5 VirtualFree 11089->11108 11091 674234 11092->11013 11093->11019 11094->11021 11095->11044 11096->11060 11098 676097 11097->11098 11099 672f91 6 API calls 11098->11099 11100 6760a5 11099->11100 11100->11054 11101->11076 11102->11078 11103->11080 11104->11082 11105->11085 11106->11087 11107->11089 11108->11091 11110 6712b6 11109->11110 11111 6712c9 11109->11111 11136 675f53 GetProcessHeap HeapAlloc 11110->11136 11115 6776c0 11111->11115 11113 6712be 11113->11111 11137 6777ae 11113->11137 11144 671085 GetProcessHeap RtlAllocateHeap 11115->11144 11117 6776d7 11118 673437 3 API calls 11117->11118 11119 6776fb 11118->11119 11145 671085 GetProcessHeap RtlAllocateHeap 11119->11145 11121 677719 11122 67362d 3 API calls 11121->11122 11123 677725 11122->11123 11124 67362d 3 API calls 11123->11124 11125 67772e 11124->11125 11126 673261 lstrlenW 11125->11126 11127 677736 11126->11127 11146 675ea5 VirtualFree 11127->11146 11129 677752 11147 675ea5 VirtualFree 11129->11147 11131 67775a 11148 68026f WaitForSingleObject 11131->11148 11133 677774 CreateThread 11149 671e9c 11133->11149 11154 6773bb 11133->11154 11136->11113 11142 675f53 GetProcessHeap HeapAlloc 11137->11142 11139 6777c9 11143 680298 CreateMutexA 11139->11143 11141 6777dd 11141->11111 11142->11139 11143->11141 11144->11117 11145->11121 11146->11129 11147->11131 11148->11133 11150 671edc ReleaseMutex 11149->11150 11151 671eb0 11149->11151 11150->10416 11153 675f53 GetProcessHeap HeapAlloc 11151->11153 11153->11150 11155 6735e5 4 API calls 11154->11155 11156 6773e0 11155->11156 11188 6778b0 11156->11188 11159 6774e3 PathFindFileNameW 11160 6735e5 4 API calls 11159->11160 11162 677510 11160->11162 11161 6774e1 11163 677549 11161->11163 11167 680125 CloseHandle 11161->11167 11212 6740ea 11162->11212 11220 677574 11163->11220 11167->11163 11168 677557 11242 6777e3 11168->11242 11171 674f2b 15 API calls 11176 677525 11171->11176 11172 677476 PathFindFileNameW 11175 6735e5 4 API calls 11172->11175 11173 677426 PathFindFileNameW 11177 6735e5 4 API calls 11173->11177 11186 6773f3 11175->11186 11217 674050 11176->11217 11177->11186 11178 673036 2 API calls 11180 677569 11178->11180 11181 6740ea lstrlenW lstrcpyW VirtualFree VirtualAlloc 11181->11186 11183 673036 2 API calls 11183->11161 11184 674f2b 15 API calls 11184->11186 11185 674050 VirtualFree 11185->11186 11186->11161 11186->11172 11186->11173 11186->11181 11186->11184 11186->11185 11187 673036 GetProcessHeap RtlFreeHeap 11186->11187 11199 67783b 11186->11199 11187->11186 11250 675f53 GetProcessHeap HeapAlloc 11188->11250 11190 6778ce 11190->11190 11191 67fece CreateMutexA 11190->11191 11192 6778f5 11191->11192 11193 673437 3 API calls 11192->11193 11194 677909 11193->11194 11195 680192 2 API calls 11194->11195 11196 677917 11195->11196 11251 675ea5 VirtualFree 11196->11251 11198 6773e9 11198->11159 11198->11186 11200 677846 11199->11200 11201 677893 11199->11201 11200->11201 11202 677862 11200->11202 11203 67789a 11200->11203 11201->11186 11252 67fe3d 11202->11252 11204 67fe3d 12 API calls 11203->11204 11204->11201 11208 67787b 11209 672f91 6 API calls 11208->11209 11210 67788d 11209->11210 11265 671099 GetProcessHeap HeapFree 11210->11265 11213 67362d 3 API calls 11212->11213 11214 674108 11213->11214 11269 675ea5 VirtualFree 11214->11269 11216 674134 11216->11171 11270 675ea5 VirtualFree 11217->11270 11219 674061 11219->11183 11271 68026f WaitForSingleObject 11220->11271 11222 67758f 11224 675ca3 3 API calls 11222->11224 11225 6775ee 11222->11225 11241 6775d8 11222->11241 11223 6775da ReleaseMutex 11223->11168 11224->11222 11226 675ca3 3 API calls 11225->11226 11227 6775f8 11226->11227 11272 675ea5 VirtualFree 11227->11272 11229 677610 11230 675ca3 3 API calls 11229->11230 11231 677621 TerminateThread 11230->11231 11232 675ca3 3 API calls 11231->11232 11233 67764d 11232->11233 11233->11223 11234 6740ea 4 API calls 11233->11234 11235 6776a2 11234->11235 11236 674f2b 15 API calls 11235->11236 11237 6776ab 11236->11237 11238 674050 VirtualFree 11237->11238 11239 6776b3 11238->11239 11240 673036 2 API calls 11239->11240 11240->11241 11241->11223 11243 6777f4 11242->11243 11244 6777ec 11242->11244 11246 67feed 4 API calls 11243->11246 11245 680125 CloseHandle 11244->11245 11245->11243 11249 6777fc 11246->11249 11247 677560 11247->11178 11248 673036 2 API calls 11248->11249 11249->11247 11249->11248 11250->11190 11251->11198 11253 67fe53 11252->11253 11254 67fe4b 11252->11254 11267 675eff GetProcessHeap RtlAllocateHeap 11253->11267 11266 68026f WaitForSingleObject 11254->11266 11257 67fe5f SetFilePointer ReadFile 11258 672f91 6 API calls 11257->11258 11259 67fe8f 11258->11259 11268 675eee GetProcessHeap RtlFreeHeap 11259->11268 11261 67fe96 11262 67786d 11261->11262 11263 67fe9c ReleaseMutex 11261->11263 11264 671085 GetProcessHeap RtlAllocateHeap 11262->11264 11263->11262 11264->11208 11265->11201 11266->11253 11267->11257 11268->11261 11269->11216 11270->11219 11271->11222 11272->11229 11273->10421 11274->10423 11276 67f76b 5 API calls 11275->11276 11277 67edcb 11276->11277 11278 67346a 9 API calls 11277->11278 11279 67edd8 11278->11279 11280 67362d 3 API calls 11279->11280 11281 67ede4 11280->11281 11320 67eafb 11281->11320 11283 67ede9 11357 675ea5 VirtualFree 11283->11357 11285 67edfb 11285->10428 11286->10431 11287->10433 11289 67ea95 GetCurrentThreadId 11288->11289 11290 67ead4 11288->11290 11291 67eaa0 11289->11291 11292 67eacd 11289->11292 11293 67ec8c CloseHandle 11290->11293 11294 67eaa6 SetEvent WaitForSingleObject 11291->11294 11295 67eaf4 11291->11295 11296 67ec8c CloseHandle 11292->11296 11297 67eadc 11293->11297 11294->11292 11298 67eac3 TerminateThread 11294->11298 11295->10428 11296->11290 11299 67ec8c CloseHandle 11297->11299 11298->11292 11300 67eae4 11299->11300 11301 67ec8c CloseHandle 11300->11301 11302 67eaec 11301->11302 11303 67ec8c CloseHandle 11302->11303 11303->11295 11305 673407 11304->11305 11306 672a97 11304->11306 11307 673372 lstrlenA 11305->11307 11311 67ecd0 11306->11311 11308 67340e 11307->11308 11405 675eb4 VirtualAlloc 11308->11405 11310 673415 lstrcpyA 11310->11306 11312 67ece2 11311->11312 11313 67ecde 11311->11313 11406 67315f 11312->11406 11413 675ea5 VirtualFree 11313->11413 11317 67ed18 11317->10428 11318 67308c lstrlenA 11319 67ed00 WriteFile 11318->11319 11319->11313 11321 67ea89 5 API calls 11320->11321 11322 67eb0e CreatePipe 11321->11322 11323 67ec47 11322->11323 11324 67eb4f GetCurrentProcess GetCurrentProcess DuplicateHandle 11322->11324 11326 67ec8c CloseHandle 11323->11326 11324->11323 11325 67eb77 CreatePipe 11324->11325 11325->11323 11327 67eb93 GetCurrentProcess GetCurrentProcess DuplicateHandle 11325->11327 11328 67ec4f 11326->11328 11327->11323 11330 67ebb1 GetCurrentProcess GetCurrentProcess DuplicateHandle 11327->11330 11329 67ec8c CloseHandle 11328->11329 11331 67ec57 11329->11331 11330->11323 11332 67ebcb 11330->11332 11333 67ec8c CloseHandle 11331->11333 11358 67ec8c 11332->11358 11335 67ec5f 11333->11335 11338 67ec8c CloseHandle 11335->11338 11337 67ec8c CloseHandle 11339 67ebdb 11337->11339 11340 67ec67 11338->11340 11341 67362d 3 API calls 11339->11341 11342 67ec8c CloseHandle 11340->11342 11343 67ebf0 11341->11343 11344 67ec6f 11342->11344 11361 67e891 11343->11361 11346 67ea89 5 API calls 11344->11346 11348 67ec79 11346->11348 11367 675ea5 VirtualFree 11348->11367 11349 67ec8c CloseHandle 11351 67ec01 11349->11351 11353 67ec8c CloseHandle 11351->11353 11352 67ec83 11352->11283 11354 67ec09 11353->11354 11355 67ec8c CloseHandle 11354->11355 11356 67ec11 CreateEventA CreateThread 11355->11356 11356->11323 11356->11348 11369 67e92a 11356->11369 11357->11285 11359 67ec94 CloseHandle 11358->11359 11360 67ebd3 11358->11360 11359->11360 11360->11337 11362 671052 11361->11362 11363 67e8a6 CreateProcessW 11362->11363 11364 67e8ed 11363->11364 11368 675ea5 VirtualFree 11364->11368 11366 67e8fe 11366->11323 11366->11349 11367->11352 11368->11366 11370 67e95d 11369->11370 11372 67e947 WaitForMultipleObjects 11370->11372 11376 67e96f 11370->11376 11378 67e996 11370->11378 11372->11370 11373 67e976 11372->11373 11374 67e996 25 API calls 11373->11374 11374->11376 11375 67ea89 5 API calls 11377 67e98c 11375->11377 11376->11375 11379 67ea49 PeekNamedPipe 11378->11379 11380 67ea67 GetLastError 11379->11380 11381 67e9a5 11379->11381 11382 67ea72 11380->11382 11381->11382 11394 671085 GetProcessHeap RtlAllocateHeap 11381->11394 11382->11370 11384 67e9b7 ReadFile 11384->11380 11392 67e9d9 11384->11392 11385 672f91 6 API calls 11385->11392 11387 672ecf 8 API calls 11387->11392 11389 67308c lstrlenA 11389->11392 11390 6733f5 3 API calls 11390->11392 11391 675ea5 VirtualFree 11391->11392 11392->11385 11392->11387 11392->11389 11392->11390 11392->11391 11393 673036 2 API calls 11392->11393 11395 671099 GetProcessHeap HeapFree 11392->11395 11396 672f22 11392->11396 11393->11379 11394->11384 11395->11392 11403 671085 GetProcessHeap RtlAllocateHeap 11396->11403 11398 672f33 11399 6733bf 4 API calls 11398->11399 11400 672f59 11399->11400 11401 672f63 11400->11401 11404 671099 GetProcessHeap HeapFree 11400->11404 11401->11392 11403->11398 11404->11401 11405->11310 11407 6733bf 4 API calls 11406->11407 11408 673173 11407->11408 11414 67318a 11408->11414 11410 67317b 11421 675ea5 VirtualFree 11410->11421 11412 673183 11412->11318 11413->11317 11415 67308c lstrlenA 11414->11415 11416 67319c 11415->11416 11417 67308c lstrlenA 11416->11417 11418 6731a5 11417->11418 11419 675e46 3 API calls 11418->11419 11420 6731b1 lstrcatA 11419->11420 11420->11410 11421->11412 11423 680d08 TerminateProcess CloseHandle 11422->11423 11424 680d20 11422->11424 11423->10442 11424->10442 11426 680ca4 Process32FirstW 11425->11426 11427 680cd5 11425->11427 11428 680cb4 11426->11428 11427->10448 11429 680cce CloseHandle 11428->11429 11430 680cbc Process32NextW 11428->11430 11431 680cdf CloseHandle 11428->11431 11429->11427 11430->11428 11432 6735e5 4 API calls 11431->11432 11432->11427 11434 67362d 3 API calls 11433->11434 11435 674364 11434->11435 11441 675ea5 VirtualFree 11435->11441 11437 672ae1 11437->10451 11442 675ea5 VirtualFree 11438->11442 11440 672af1 11440->10278 11441->11437 11442->11440 11463 675ea5 VirtualFree 11443->11463 11445 67ff22 11445->10459 11447 67362d 3 API calls 11446->11447 11448 6739cd 11447->11448 11464 675ea5 VirtualFree 11448->11464 11450 672b3f 11451 675ea5 VirtualFree 11450->11451 11451->10476 11465 675ea5 VirtualFree 11452->11465 11454 6739af 11454->10462 11456 67362d 3 API calls 11455->11456 11457 673fe9 11456->11457 11466 675ea5 VirtualFree 11457->11466 11459 672b6b 11459->10473 11467 675ea5 VirtualFree 11460->11467 11462 672b7b 11462->10278 11463->11445 11464->11450 11465->11454 11466->11459 11467->11462 11478 680298 CreateMutexA 11468->11478 11470 680217 11471 673437 3 API calls 11470->11471 11472 680223 11471->11472 11479 675ea5 VirtualFree 11472->11479 11474 6728ef 11474->10514 11475->10517 11477 6801f4 11476->11477 11477->10522 11478->11470 11479->11474 11480->10538 11481->10545 11482->10549 11484 682d42 11483->11484 11496 682e94 11483->11496 11485 682d71 11484->11485 11487 682a6b 4 API calls 11484->11487 11484->11496 11486 682d7a CoCreateInstance 11485->11486 11485->11496 11488 682d9c 11486->11488 11486->11496 11487->11485 11489 6824eb CoTaskMemFree 11488->11489 11488->11496 11490 682e5e 11489->11490 11491 682b2a 3 API calls 11490->11491 11492 682e72 11491->11492 11493 675ca3 3 API calls 11492->11493 11494 682e7d 11493->11494 11497 6825d8 11494->11497 11496->10544 11498 682f63 VirtualFree 11497->11498 11499 6825f0 11498->11499 11499->11496 11536 671534 11500->11536 11505 68226f 11508 682ed4 20 API calls 11505->11508 11510 68227b 11505->11510 11506 68228f 11507 6729c5 11506->11507 11509 675ca3 LoadLibraryA GetProcAddress ExitProcess 11506->11509 11511 6733bf 4 API calls 11506->11511 11512 67309d 10 API calls 11506->11512 11513 673437 3 API calls 11506->11513 11514 67362d 3 API calls 11506->11514 11516 675ea5 VirtualFree 11506->11516 11546 671433 11506->11546 11517 6712d3 11507->11517 11508->11510 11509->11506 11540 682c3f 11510->11540 11511->11506 11512->11506 11513->11506 11514->11506 11516->11506 11518 671534 2 API calls 11517->11518 11521 6712ee 11518->11521 11519 671311 11523 6747be 11519->11523 11521->11519 11522 671433 6 API calls 11521->11522 11562 671581 11521->11562 11522->11521 11524 6712d3 12 API calls 11523->11524 11525 6747d6 11524->11525 11526 6729db 11525->11526 11527 671aa8 VirtualFree 11525->11527 11526->10558 11527->11526 11529 6729eb 11528->11529 11530 6747ab 11528->11530 11529->10562 11532 671aa8 11529->11532 11531 671aa8 VirtualFree 11530->11531 11531->11529 11533 671acd 11532->11533 11534 671abb 11532->11534 11533->10562 11534->11533 11567 675ea5 VirtualFree 11534->11567 11558 675f53 GetProcessHeap HeapAlloc 11536->11558 11538 67155d 11538->11510 11539 675f53 GetProcessHeap HeapAlloc 11538->11539 11539->11505 11559 675f53 GetProcessHeap HeapAlloc 11540->11559 11542 682c88 11542->11506 11543 675ca3 3 API calls 11545 682c60 11543->11545 11544 672481 2 API calls 11544->11545 11545->11542 11545->11543 11545->11544 11547 67144a 11546->11547 11555 6714f4 11546->11555 11560 675f53 GetProcessHeap HeapAlloc 11547->11560 11549 673437 3 API calls 11550 671510 11549->11550 11561 675ea5 VirtualFree 11550->11561 11552 67152d 11552->11506 11553 671473 11554 6714e2 11553->11554 11556 673437 3 API calls 11553->11556 11554->11555 11557 671aa8 VirtualFree 11554->11557 11555->11549 11556->11553 11557->11555 11558->11538 11559->11545 11560->11553 11561->11552 11563 675ca3 3 API calls 11562->11563 11564 671596 11563->11564 11565 67362d 3 API calls 11564->11565 11566 6715a6 11565->11566 11566->11521 11567->11534 11569 671a91 11568->11569 11570 671aa0 11568->11570 11569->11570 11574 6713ef 11569->11574 11570->10566 11572->10569 11573->10571 11581 675ea5 VirtualFree 11574->11581 11576 6713fa 11582 675ea5 VirtualFree 11576->11582 11578 671406 11583 675ea5 VirtualFree 11578->11583 11580 671411 11580->11569 11581->11576 11582->11578 11583->11580 11585 671f90 11584->11585 11586 671f7e TerminateThread CloseHandle 11584->11586 11585->10575 11586->11585 11587->10578 11588->10580 11590 67362d 3 API calls 11589->11590 11591 675c80 11590->11591 11591->10587 11608 675eff GetProcessHeap RtlAllocateHeap 11592->11608 11594 67d382 11595 673125 4 API calls 11594->11595 11596 67d397 11595->11596 11597 673125 4 API calls 11596->11597 11598 67d3aa 11597->11598 11609 671f4b CreateThread 11598->11609 11600 67d3c5 11601 67d3d5 11600->11601 11602 67d3cc CloseHandle 11600->11602 11610 675ea5 VirtualFree 11601->11610 11602->11601 11604 67d3dd 11611 675ea5 VirtualFree 11604->11611 11606 67d3e5 11606->10591 11607->10593 11608->11594 11609->11600 11610->11604 11611->11606 11613 6735e5 4 API calls 11612->11613 11614 67de39 RegOpenKeyExW 11613->11614 11615 67de5b 11614->11615 11636 67de8b 11614->11636 11616 6735e5 4 API calls 11615->11616 11618 67de6c 11616->11618 11617 673036 2 API calls 11619 67de95 11617->11619 11620 680fc3 12 API calls 11618->11620 11694 675ea5 VirtualFree 11619->11694 11622 67de75 11620->11622 11693 675ea5 VirtualFree 11622->11693 11624 67de9d 11626 680fae RegCloseKey 11624->11626 11625 67de7f 11627 67de83 11625->11627 11628 67deab 11625->11628 11629 67dea5 11626->11629 11630 680fae RegCloseKey 11627->11630 11631 672ecf 8 API calls 11628->11631 11629->10597 11629->10598 11630->11636 11632 67debc 11631->11632 11695 673248 lstrcmpW 11632->11695 11634 67dec3 11696 675ea5 VirtualFree 11634->11696 11636->11617 11638 6816b4 11637->11638 11639 6816a4 11637->11639 11640 680fc3 12 API calls 11638->11640 11641 67362d 3 API calls 11639->11641 11642 6816c0 11640->11642 11647 6816b0 11641->11647 11643 672ecf 8 API calls 11642->11643 11654 6816e1 11642->11654 11646 6816d0 11643->11646 11644 67362d 3 API calls 11644->11647 11650 673437 3 API calls 11646->11650 11698 675ea5 VirtualFree 11647->11698 11648 6816f7 11649 673036 2 API calls 11648->11649 11651 67e472 11649->11651 11652 6816d9 11650->11652 11651->10609 11697 675ea5 VirtualFree 11652->11697 11654->11644 11655->10618 11656->10627 11657->10647 11658->10651 11660 67362d 3 API calls 11659->11660 11661 674bae 11660->11661 11662 67362d 3 API calls 11661->11662 11663 674bb9 11662->11663 11663->10690 11699 675ea5 VirtualFree 11664->11699 11666 674b7f 11700 675ea5 VirtualFree 11666->11700 11668 674b8b 11669 675ea5 VirtualFree 11668->11669 11669->10700 11670->10680 11672 67f4f0 GetProcAddress 11671->11672 11673 67f500 11671->11673 11672->11673 11673->10608 11674->10641 11675->10653 11677 67d464 11676->11677 11678 67d48b 11676->11678 11701 67f56d 11677->11701 11678->10659 11678->10660 11683 681668 11682->11683 11684 67e688 11682->11684 11685 673221 7 API calls 11683->11685 11690 675ea5 VirtualFree 11684->11690 11686 681676 11685->11686 11687 681039 RegSetValueExW 11686->11687 11688 681681 11687->11688 11689 673036 2 API calls 11688->11689 11689->11684 11690->10683 11691->10695 11692->10699 11693->11625 11694->11624 11695->11634 11696->11636 11697->11654 11698->11648 11699->11666 11700->11668 11702 671052 11701->11702 11703 67f5a1 AllocateAndInitializeSid 11702->11703 11704 67f5f1 GetLastError 11703->11704 11705 67f5cc LookupAccountSidW 11703->11705 11706 67f5f7 11704->11706 11705->11704 11705->11706 11707 67f605 11706->11707 11708 67f5fc FreeSid 11706->11708 11709 6735e5 4 API calls 11707->11709 11708->11707 11710 67d471 NetLocalGroupAddMembers 11709->11710 11711 675ea5 VirtualFree 11710->11711 11711->11678 11712->10703 11713->10713 11714->10715 11715->10727 11717 673525 PathFindExtensionW 11716->11717 11718 673530 11716->11718 11717->11718 11719 6735e5 4 API calls 11718->11719 11720 67282e 11719->11720 11720->10732 11721->10735 11722->10737 11723->10741 11724->10747 11725->10754 11732 675eff GetProcessHeap RtlAllocateHeap 11726->11732 11728 683df4 11733 671f4b CreateThread 11728->11733 11730 672742 11731 675ea5 VirtualFree 11730->11731 11731->10760 11732->11728 11733->11730 11735 671875 2 API calls 11734->11735 11736 673be2 11735->11736 11737 673437 3 API calls 11736->11737 11738 673bee 11737->11738 11751 671bed 11738->11751 11742 673c08 11743 672bc3 11742->11743 11744 671ad5 VirtualFree 11742->11744 11743->10772 11744->11743 11746 673ba2 11745->11746 11747 673b9c 11745->11747 11758 675ea5 VirtualFree 11746->11758 11749 671ad5 VirtualFree 11747->11749 11749->11746 11750 672bd3 11750->10776 11750->10777 11752 671875 2 API calls 11751->11752 11755 671bfa 11752->11755 11753 671c1f 11757 675ea5 VirtualFree 11753->11757 11754 6718c2 6 API calls 11754->11755 11755->11753 11755->11754 11756 671776 6 API calls 11755->11756 11756->11755 11757->11742 11758->11750 11760 681eb6 11759->11760 11760->11760 11761 681ec3 VirtualProtect 11760->11761 11761->10782 11763 677b0e 11762->11763 11764 677b09 11762->11764 11766 677b23 OpenProcess 11763->11766 11796 677948 11763->11796 11795 678617 GetCurrentProcess IsWow64Process GetProcessHeap 11764->11795 11768 677b40 11766->11768 11772 672617 11766->11772 11805 678633 11768->11805 11772->10788 11774 678633 7 API calls 11775 677b86 11774->11775 11775->11772 11821 678568 11775->11821 11777 677bc5 11777->11772 11778 678568 7 API calls 11777->11778 11779 677bf3 11778->11779 11779->11772 11829 6786e1 11779->11829 11782 6779fe 11781->11782 11783 677a0c OpenProcess 11781->11783 11865 678617 GetCurrentProcess IsWow64Process GetProcessHeap 11782->11865 11784 677a2a VirtualAllocEx 11783->11784 11788 677a22 11783->11788 11787 677a4a VirtualProtectEx VirtualAllocEx 11784->11787 11784->11788 11786 677a03 11786->11783 11787->11788 11789 677a80 11787->11789 11788->10788 11790 677a92 WriteProcessMemory 11789->11790 11790->11788 11791 677aa7 11790->11791 11791->11788 11792 677ab7 WriteProcessMemory 11791->11792 11792->11788 11793 677acf 11792->11793 11793->11788 11794 677ad4 CreateRemoteThread 11793->11794 11794->11788 11795->11763 11797 67f7e0 2 API calls 11796->11797 11798 67795e VirtualAlloc GetWindowsDirectoryA lstrlenA 11797->11798 11799 677995 11798->11799 11800 6779a1 CreateProcessA 11799->11800 11801 6779db 11800->11801 11802 6779cb Sleep 11800->11802 11804 67f7b9 2 API calls 11801->11804 11803 6779e3 11802->11803 11803->11766 11804->11803 11806 678653 11805->11806 11808 678668 11805->11808 11806->11808 11837 677fc0 11806->11837 11812 677b50 11808->11812 11845 677cb7 11808->11845 11812->11772 11813 67878c 11812->11813 11814 6787a7 11813->11814 11819 6787bc 11813->11819 11815 677fc0 4 API calls 11814->11815 11814->11819 11816 6787b0 11815->11816 11817 677c1d 4 API calls 11816->11817 11817->11819 11818 677cb7 3 API calls 11820 677b71 11818->11820 11819->11818 11819->11820 11820->11774 11822 678586 11821->11822 11825 67859b 11821->11825 11823 677fc0 4 API calls 11822->11823 11822->11825 11824 67858f 11823->11824 11826 677c1d 4 API calls 11824->11826 11827 677cb7 3 API calls 11825->11827 11828 6785f9 11825->11828 11826->11825 11827->11828 11828->11777 11830 678721 11829->11830 11831 67870c 11829->11831 11834 677cb7 3 API calls 11830->11834 11836 678773 11830->11836 11831->11830 11832 677fc0 4 API calls 11831->11832 11833 678715 11832->11833 11835 677c1d 4 API calls 11833->11835 11834->11836 11835->11830 11836->11772 11838 677fd9 11837->11838 11839 677fd0 11837->11839 11841 677c1d 11838->11841 11839->11838 11849 677fe6 11839->11849 11842 677c3e 11841->11842 11843 677c31 11841->11843 11842->11808 11843->11842 11862 677d1c 11843->11862 11846 677cc3 11845->11846 11847 677ccd GetModuleHandleW GetProcAddress GetProcAddress 11845->11847 11846->11847 11848 677d06 11846->11848 11847->11848 11848->11812 11850 677fff 11849->11850 11851 67817d 11849->11851 11850->11851 11853 678246 11850->11853 11856 671085 GetProcessHeap RtlAllocateHeap 11850->11856 11857 671f2c 11850->11857 11851->11838 11854 671f2c 2 API calls 11853->11854 11854->11851 11856->11850 11858 671f36 11857->11858 11859 671f43 11857->11859 11858->11859 11861 671099 GetProcessHeap HeapFree 11858->11861 11859->11850 11861->11859 11863 677fc0 4 API calls 11862->11863 11864 677d2d 11863->11864 11864->11842 11865->11786 11866->10795 11872 67f432 11867->11872 11869 6726b0 11870 675ea5 VirtualFree 11869->11870 11870->10808 11871->10810 11879 671085 GetProcessHeap RtlAllocateHeap 11872->11879 11874 67f443 11875 67f473 11874->11875 11876 67f44e lstrcpyA CreateThread 11874->11876 11880 671099 GetProcessHeap HeapFree 11875->11880 11878 67f479 11876->11878 11881 67ee44 WSAStartup 11876->11881 11878->11869 11879->11874 11880->11878 11888 67ee9a socket gethostbyname 11881->11888 11884 67ee74 WSACleanup 11885 67ee7a 11884->11885 11896 67ef4f 11885->11896 11912 67102c 11888->11912 11891 671052 11892 67eeff InetNtopW 11891->11892 11893 67ef21 11892->11893 11894 67ee6d 11892->11894 11895 67ef24 connect 11893->11895 11894->11884 11894->11885 11895->11894 11895->11895 11904 67ef66 11896->11904 11898 67ee95 11901 67f131 send 11901->11904 11903 67f006 InetNtopW 11903->11904 11904->11898 11904->11901 11904->11903 11905 67f0bc InetNtopW 11904->11905 11908 67f1da 5 API calls 11904->11908 11911 67f089 getaddrinfo 11904->11911 11914 675f53 GetProcessHeap HeapAlloc 11904->11914 11915 67f1da 11904->11915 11921 67f3bd socket connect 11904->11921 11925 671085 GetProcessHeap RtlAllocateHeap 11904->11925 11932 671099 GetProcessHeap HeapFree 11904->11932 11933 67f23d 11904->11933 11926 67f33c socket 11905->11926 11909 67f0fa CreateThread 11908->11909 11909->11904 11949 67f16e 11909->11949 11911->11904 11913 67103b htons 11912->11913 11913->11891 11914->11904 11944 671085 GetProcessHeap RtlAllocateHeap 11915->11944 11917 67f1f3 11918 67f21d send 11917->11918 11945 671099 GetProcessHeap HeapFree 11918->11945 11920 67f237 11920->11904 11922 67f401 11921->11922 11923 67f42b 11921->11923 11924 67f415 InetNtopW 11922->11924 11923->11904 11924->11923 11925->11904 11927 67102c 11926->11927 11928 67f370 connect 11927->11928 11929 67f3b6 11928->11929 11930 67f389 11928->11930 11929->11904 11931 67f39d InetNtopW 11930->11931 11931->11929 11932->11904 11946 671085 GetProcessHeap RtlAllocateHeap 11933->11946 11935 67f259 11947 671085 GetProcessHeap RtlAllocateHeap 11935->11947 11937 67f262 11938 67f27a recv 11937->11938 11939 67f32b 11937->11939 11942 67f2b8 11937->11942 11938->11937 11938->11939 11939->11904 11940 67f317 11948 671099 GetProcessHeap HeapFree 11940->11948 11941 67f2e2 recv 11941->11939 11941->11942 11942->11939 11942->11940 11942->11941 11944->11917 11945->11920 11946->11935 11947->11937 11948->11939 11956 67f184 11949->11956 11957 67f1c5 11949->11957 11951 67f18f recv 11952 67f1c7 closesocket 11951->11952 11951->11956 11960 671099 GetProcessHeap HeapFree 11952->11960 11954 67f1da 5 API calls 11954->11956 11956->11952 11956->11954 11956->11957 11958 671085 GetProcessHeap RtlAllocateHeap 11956->11958 11959 671099 GetProcessHeap HeapFree 11956->11959 11958->11951 11959->11956 11960->11957 11964 675ea5 VirtualFree 11961->11964 11963 672989 11963->10278 11964->11963 11965->10819 11967 680f65 11966->11967 11968 680f54 RegDeleteValueW 11966->11968 11969 675ea5 VirtualFree 11967->11969 11968->11967 11969->10831 13207 67ed1f 13208 6733f5 3 API calls 13207->13208 13209 67ed35 13208->13209 13210 674a75 10 API calls 13209->13210 13211 67ed3d 13210->13211 13212 674f2b 15 API calls 13211->13212 13213 67ed46 13212->13213 13214 674a17 VirtualFree 13213->13214 13215 67ed4e 13214->13215 13218 675ea5 VirtualFree 13215->13218 13217 67ed56 13218->13217 9717 67121c 9720 6799a8 9717->9720 9731 671875 9720->9731 9723 67fece CreateMutexA 9724 6799e3 LoadLibraryW 9723->9724 9725 680969 lstrcmpA 9724->9725 9726 679a13 9725->9726 9727 680969 lstrcmpA 9726->9727 9728 679a24 9727->9728 9729 680969 lstrcmpA 9728->9729 9730 671221 9729->9730 9734 675f53 GetProcessHeap HeapAlloc 9731->9734 9733 67189e InitializeCriticalSection 9733->9723 9734->9733 11979 683417 11982 672093 11979->11982 11983 672110 2 API calls 11982->11983 11986 6720ae 11983->11986 11984 6720d1 11986->11984 11988 672164 11986->11988 11993 671fcb 11986->11993 11989 675ca3 3 API calls 11988->11989 11990 672179 11989->11990 12005 671f95 11990->12005 11994 671fe1 11993->11994 12002 672064 11993->12002 12012 675f53 GetProcessHeap HeapAlloc 11994->12012 11996 6720da 3 API calls 11997 672081 11996->11997 11998 6713ef VirtualFree 11997->11998 11999 67208c 11998->11999 11999->11986 12000 672058 12000->12002 12004 671a7e VirtualFree 12000->12004 12001 67200a 12001->12000 12013 6720da 12001->12013 12002->11996 12004->12002 12006 67362d 3 API calls 12005->12006 12007 671fa5 12006->12007 12008 67362d 3 API calls 12007->12008 12009 671fb1 12008->12009 12010 67362d 3 API calls 12009->12010 12011 671fbd 12010->12011 12011->11986 12012->12001 12014 673437 3 API calls 12013->12014 12015 6720ea 12014->12015 12016 673437 3 API calls 12015->12016 12017 6720f6 12016->12017 12018 673437 3 API calls 12017->12018 12019 672102 12018->12019 12019->12001 8348 675ce2 GetCommandLineA 8349 675cf7 GetStartupInfoA 8348->8349 8357 675d70 8349->8357 8352 675d43 8353 675d52 GetModuleHandleA 8352->8353 8360 683435 8353->8360 8420 675c8e GetProcessHeap HeapAlloc 8357->8420 8359 675d7f 8359->8352 8361 68345b 8360->8361 8362 683467 GetTickCount 8361->8362 8421 6710ad 8362->8421 8364 683473 GetModuleFileNameA 8422 681e21 8364->8422 8366 6836ad 8784 6810d7 8366->8784 8368 68349d 8368->8366 8429 671085 GetProcessHeap RtlAllocateHeap 8368->8429 8373 6834c7 8374 6834e3 CreateEventA GetLastError 8373->8374 8374->8366 8375 683506 8374->8375 8375->8366 8376 683512 RegCreateKeyExA RegSetValueExA RegSetValueExA RegCloseKey 8375->8376 8430 675a10 Sleep 8376->8430 8420->8359 8421->8364 8802 671085 GetProcessHeap RtlAllocateHeap 8422->8802 8424 681e36 CreateFileA 8425 681e5b 8424->8425 8426 681e5e GetFileSize ReadFile 8424->8426 8425->8426 8427 681e7c 8426->8427 8428 681e7e CloseHandle 8426->8428 8427->8428 8428->8368 8429->8373 8803 68044f 8430->8803 8432 675a34 8808 680346 8432->8808 8440 675a67 8838 67304c 8440->8838 8442 675a73 8841 672e93 8442->8841 8444 675a7f 8845 673036 8444->8845 8454 675ab5 8455 681dc0 11 API calls 8454->8455 8456 675ad4 8455->8456 8457 673437 3 API calls 8456->8457 8458 675ae1 8457->8458 8880 675ea5 VirtualFree 8458->8880 8460 675ae9 8461 681dc0 11 API calls 8460->8461 8462 675b08 8461->8462 8463 673437 3 API calls 8462->8463 8464 675b15 8463->8464 8881 675ea5 VirtualFree 8464->8881 8466 675b1d 8467 681dc0 11 API calls 8466->8467 8468 675b3c 8467->8468 8469 673437 3 API calls 8468->8469 8470 675b49 8469->8470 8882 675ea5 VirtualFree 8470->8882 8472 675b51 8473 681dc0 11 API calls 8472->8473 8474 675b97 8473->8474 8475 673437 3 API calls 8474->8475 8476 675ba4 8475->8476 8883 675ea5 VirtualFree 8476->8883 8478 675bb4 8479 673036 2 API calls 8478->8479 8480 675bbc 8479->8480 8481 673036 2 API calls 8480->8481 8482 675bc4 8481->8482 8483 675bd1 8482->8483 8891 671e71 8482->8891 8485 673036 2 API calls 8483->8485 8486 675be4 8485->8486 8884 67feed 8486->8884 8489 6814a6 8997 6723ca 8489->8997 8785 6810e1 8784->8785 8786 6810e6 8784->8786 8787 680fae RegCloseKey 8785->8787 8788 675c16 3 API calls 8786->8788 8787->8786 8789 6810ee 8788->8789 9528 675ea5 VirtualFree 8789->9528 8791 6810f6 9529 675ea5 VirtualFree 8791->9529 8793 681101 9530 675ea5 VirtualFree 8793->9530 8795 68110c 9531 675ea5 VirtualFree 8795->9531 8797 681117 9532 675ea5 VirtualFree 8797->9532 8799 681122 8800 680fae RegCloseKey 8799->8800 8801 68112d 8800->8801 8802->8424 8895 67fece 8803->8895 8807 680477 8807->8432 8809 680362 8808->8809 8810 675a42 8808->8810 8809->8810 8811 6803df 8809->8811 8812 680381 8809->8812 8821 6733bf lstrlenA 8810->8821 8811->8810 8814 672f91 6 API calls 8811->8814 8900 672f91 8812->8900 8816 6803fd 8814->8816 8815 680397 8815->8810 8903 680ac3 8815->8903 8907 672296 8815->8907 8816->8810 8818 680ac3 6 API calls 8816->8818 8820 672296 6 API calls 8816->8820 8818->8816 8820->8816 8822 6733d2 lstrlenA 8821->8822 8823 6733ee 8821->8823 8929 675e22 VirtualAlloc 8822->8929 8826 6802b9 8823->8826 8825 6733e2 lstrcpyA 8825->8823 8833 6802cb 8826->8833 8835 675a5f 8826->8835 8829 6733bf 4 API calls 8829->8833 8832 673036 2 API calls 8832->8833 8833->8829 8833->8832 8834 680330 8833->8834 8833->8835 8931 675ca3 LoadLibraryA GetProcAddress 8833->8931 8936 680af9 8833->8936 8939 6733a3 lstrcmpA 8833->8939 8940 675ea5 VirtualFree 8833->8940 8941 67239e 8834->8941 8837 675ea5 VirtualFree 8835->8837 8837->8440 8946 675eff GetProcessHeap RtlAllocateHeap 8838->8946 8840 67305e 8840->8442 8842 672eab 8841->8842 8844 672eb0 8841->8844 8947 675eff GetProcessHeap RtlAllocateHeap 8842->8947 8844->8444 8846 673044 8845->8846 8847 67303f 8845->8847 8849 67595e 8846->8849 8948 675eee GetProcessHeap RtlFreeHeap 8847->8948 8949 672e4c 8849->8949 8852 67304c 2 API calls 8853 675991 8852->8853 8956 675911 8853->8956 8858 673036 2 API calls 8859 6759ae 8858->8859 8860 681dc0 8859->8860 8861 681dd4 8860->8861 8871 675aa3 8860->8871 8979 671085 GetProcessHeap RtlAllocateHeap 8861->8979 8863 681ddf 8980 6735e5 lstrlenW 8863->8980 8865 681e02 8866 673437 3 API calls 8865->8866 8867 681e0a 8866->8867 8985 675ea5 VirtualFree 8867->8985 8869 681e12 8986 671099 GetProcessHeap HeapFree 8869->8986 8872 673437 8871->8872 8873 673462 8872->8873 8874 673449 8872->8874 8879 675ea5 VirtualFree 8873->8879 8989 673384 8874->8989 8876 673450 8877 675e22 VirtualAlloc 8876->8877 8878 673457 lstrcpyW 8877->8878 8878->8873 8879->8454 8880->8460 8881->8466 8882->8472 8883->8478 8992 680125 8884->8992 8888 67fefd 8996 675ea5 VirtualFree 8888->8996 8890 675bec 8890->8489 8892 671e94 8891->8892 8893 671e83 8891->8893 8892->8483 8893->8892 8894 673036 2 API calls 8893->8894 8894->8893 8899 680298 CreateMutexA 8895->8899 8897 67fede 8898 675f53 GetProcessHeap HeapAlloc 8897->8898 8898->8807 8899->8897 8919 675ec5 8900->8919 8902 672fa7 8902->8815 8904 680adc 8903->8904 8905 672f91 6 API calls 8904->8905 8906 680af1 8905->8906 8906->8815 8908 6722b0 8907->8908 8909 672364 8907->8909 8928 675f53 GetProcessHeap HeapAlloc 8908->8928 8911 672e93 2 API calls 8909->8911 8912 67238c 8911->8912 8913 673036 2 API calls 8912->8913 8914 672397 8913->8914 8914->8815 8915 6722d9 8916 672355 8915->8916 8917 672e93 2 API calls 8915->8917 8916->8909 8918 671e71 2 API calls 8916->8918 8917->8915 8918->8909 8920 675ed0 8919->8920 8921 675ec9 GetProcessHeap RtlAllocateHeap 8919->8921 8923 675ed4 8920->8923 8924 675edc GetProcessHeap HeapReAlloc 8920->8924 8921->8902 8927 675eee GetProcessHeap RtlFreeHeap 8923->8927 8924->8902 8926 675ed9 8926->8902 8927->8926 8928->8915 8930 675e40 8929->8930 8930->8825 8932 675cc2 8931->8932 8933 675ce1 8931->8933 8934 675cc6 8932->8934 8935 675cd9 ExitProcess 8932->8935 8933->8833 8934->8935 8937 672e93 2 API calls 8936->8937 8938 680b21 8937->8938 8938->8833 8939->8833 8940->8833 8942 675ca3 3 API calls 8941->8942 8943 6723b3 8942->8943 8944 680af9 2 API calls 8943->8944 8945 6723c1 8944->8945 8945->8835 8946->8840 8947->8844 8948->8846 8977 675eff GetProcessHeap RtlAllocateHeap 8949->8977 8951 672e5b 8952 672f91 6 API calls 8951->8952 8953 672e84 8952->8953 8978 675eee GetProcessHeap RtlFreeHeap 8953->8978 8955 672e8b 8955->8852 8957 675923 8956->8957 8958 675945 8956->8958 8959 672e4c 8 API calls 8957->8959 8960 67304c 2 API calls 8958->8960 8961 675935 8959->8961 8962 675955 8960->8962 8963 672e93 2 API calls 8961->8963 8966 6760aa 8962->8966 8964 67593d 8963->8964 8965 673036 2 API calls 8964->8965 8965->8958 8967 67304c 2 API calls 8966->8967 8968 6760c2 8967->8968 8969 67304c 2 API calls 8968->8969 8970 676102 8969->8970 8971 673036 2 API calls 8970->8971 8972 67610a 8971->8972 8973 673036 2 API calls 8972->8973 8974 676112 8973->8974 8975 673036 2 API calls 8974->8975 8976 6759a3 8975->8976 8976->8858 8977->8951 8978->8955 8979->8863 8981 675e22 VirtualAlloc 8980->8981 8982 673600 lstrlenW 8981->8982 8987 675f31 8982->8987 8984 67361a lstrcpyW 8984->8865 8985->8869 8986->8871 8988 675f3d 8987->8988 8988->8984 8990 67338c lstrlenW 8989->8990 8991 673389 8989->8991 8990->8876 8991->8876 8993 67fef5 8992->8993 8994 68012e CloseHandle 8992->8994 8995 680283 ReleaseMutex CloseHandle 8993->8995 8994->8993 8995->8888 8996->8890 9528->8791 9529->8793 9530->8795 9531->8797 9532->8799 9533 6711ef 9536 682408 9533->9536 9543 680298 CreateMutexA 9536->9543 9538 68241d 9544 675f53 GetProcessHeap HeapAlloc 9538->9544 9540 682425 9541 6711f4 9540->9541 9545 682ed4 9540->9545 9543->9538 9544->9540 9557 675f53 GetProcessHeap HeapAlloc 9545->9557 9547 682ef4 9558 675f53 GetProcessHeap HeapAlloc 9547->9558 9549 682f1e 9550 682f2a 9549->9550 9568 68266a 9549->9568 9559 68290f CoInitialize CoCreateInstance 9550->9559 9554 682f4a 9554->9541 9555 682f3c 9555->9554 9571 68273a CoInitialize CoCreateInstance 9555->9571 9557->9547 9558->9549 9560 682a66 9559->9560 9566 68294f 9559->9566 9560->9554 9560->9555 9562 682996 VariantInit 9562->9566 9563 682a40 CoUninitialize 9563->9560 9566->9560 9566->9562 9566->9563 9582 675f53 GetProcessHeap HeapAlloc 9566->9582 9583 682bc7 9566->9583 9588 672481 9566->9588 9569 682bc7 2 API calls 9568->9569 9570 68267b 9569->9570 9570->9550 9572 682786 9571->9572 9573 6828aa CoUninitialize 9571->9573 9572->9573 9595 682a6b 9572->9595 9573->9555 9576 6827b0 9576->9573 9577 6827b9 CoCreateInstance 9576->9577 9577->9573 9578 6827d7 9577->9578 9578->9573 9599 6824eb 9578->9599 9582->9566 9592 675df1 GetProcessHeap HeapAlloc 9583->9592 9585 682bd2 9593 675df1 GetProcessHeap HeapAlloc 9585->9593 9587 682bde 9587->9566 9589 672490 9588->9589 9591 6724ad 9588->9591 9594 675f53 GetProcessHeap HeapAlloc 9589->9594 9591->9566 9592->9585 9593->9587 9594->9591 9609 682447 CoInitialize CoCreateInstance 9595->9609 9597 682a7d CoCreateInstance 9598 682aa6 9597->9598 9598->9576 9600 682505 9599->9600 9601 6824f6 CoTaskMemFree 9599->9601 9602 682b2a 9600->9602 9601->9600 9603 675ca3 3 API calls 9602->9603 9604 682b40 9603->9604 9605 675ca3 3 API calls 9604->9605 9606 682b57 9605->9606 9607 675ca3 3 API calls 9606->9607 9608 682b90 9607->9608 9608->9573 9610 6824df CoUninitialize 9609->9610 9611 68247b 9609->9611 9610->9597 9611->9610 9612 6711fe 9615 683b3c 9612->9615 9688 672550 9615->9688 9618 672550 VirtualAlloc 9619 683b59 9618->9619 9620 672550 VirtualAlloc 9619->9620 9621 683b63 9620->9621 9622 672550 VirtualAlloc 9621->9622 9623 683b6d 9622->9623 9624 672550 VirtualAlloc 9623->9624 9625 683b77 9624->9625 9626 672550 VirtualAlloc 9625->9626 9627 683b81 9626->9627 9691 671085 GetProcessHeap RtlAllocateHeap 9627->9691 9629 683ba8 9692 671085 GetProcessHeap RtlAllocateHeap 9629->9692 9631 683bb1 9693 671085 GetProcessHeap RtlAllocateHeap 9631->9693 9633 683bba 9694 671085 GetProcessHeap RtlAllocateHeap 9633->9694 9635 683bc3 9695 671085 GetProcessHeap RtlAllocateHeap 9635->9695 9637 683bcd 9696 671085 GetProcessHeap RtlAllocateHeap 9637->9696 9639 683bd7 9697 681ce2 9639->9697 9642 681ce2 2 API calls 9643 683be8 9642->9643 9644 681ce2 2 API calls 9643->9644 9645 683bef 9644->9645 9646 681ce2 2 API calls 9645->9646 9647 683bf7 9646->9647 9648 681ce2 2 API calls 9647->9648 9649 683bff 9648->9649 9650 681ce2 2 API calls 9649->9650 9651 683c07 9650->9651 9652 6733bf 4 API calls 9651->9652 9653 683c13 9652->9653 9701 67fda5 9653->9701 9655 683c1e 9704 675ea5 VirtualFree 9655->9704 9657 683c26 9658 6733bf 4 API calls 9657->9658 9659 683c30 9658->9659 9660 67fda5 5 API calls 9659->9660 9661 683c3b 9660->9661 9705 675ea5 VirtualFree 9661->9705 9663 683c43 9664 6733bf 4 API calls 9663->9664 9665 683c4d 9664->9665 9666 67fda5 5 API calls 9665->9666 9667 683c58 9666->9667 9706 675ea5 VirtualFree 9667->9706 9669 683c60 9670 6733bf 4 API calls 9669->9670 9671 683c6c 9670->9671 9672 67fda5 5 API calls 9671->9672 9673 683c77 9672->9673 9707 675ea5 VirtualFree 9673->9707 9675 683c7f 9676 6733bf 4 API calls 9675->9676 9677 683c8b 9676->9677 9678 67fda5 5 API calls 9677->9678 9679 683c96 9678->9679 9708 675ea5 VirtualFree 9679->9708 9681 683c9e 9682 6733bf 4 API calls 9681->9682 9683 683caa 9682->9683 9684 67fda5 5 API calls 9683->9684 9685 683cb5 9684->9685 9709 675ea5 VirtualFree 9685->9709 9687 671203 9710 67fdd1 9688->9710 9691->9629 9692->9631 9693->9633 9694->9635 9695->9637 9696->9639 9698 681ce8 9697->9698 9700 681d05 9698->9700 9713 681d0c Sleep GetTickCount 9698->9713 9700->9642 9702 673125 4 API calls 9701->9702 9703 67fdb7 CreateEventA 9702->9703 9703->9655 9704->9657 9705->9663 9706->9669 9707->9675 9708->9681 9709->9687 9711 6731c3 VirtualAlloc 9710->9711 9712 672563 9711->9712 9712->9618 9713->9698 9714 679fce 9715 675ea5 VirtualFree 9714->9715 9716 679fd9 9714->9716 13387 6737d7 13388 681dc0 11 API calls 13387->13388 13389 6737ef 13388->13389 13390 673437 3 API calls 13389->13390 13391 6737f9 13390->13391 13394 675ea5 VirtualFree 13391->13394 13393 673801 13394->13393 12656 6836d9 12657 6836e0 12656->12657 12658 683701 SHGetFolderPathW lstrcatW 12657->12658 12659 67346a 9 API calls 12658->12659 12660 683737 12659->12660 12661 673761 7 API calls 12660->12661 12662 683757 12661->12662 12663 673679 8 API calls 12662->12663 12664 68375e 12663->12664 12665 673665 2 API calls 12664->12665 12666 683766 12665->12666 12669 675ea5 VirtualFree 12666->12669 12668 68376e 12669->12668 12711 679aa8 12718 675f53 GetProcessHeap HeapAlloc 12711->12718 12713 679ab7 12714 67362d 3 API calls 12713->12714 12715 679ad1 12713->12715 12716 679aca 12714->12716 12717 680203 5 API calls 12716->12717 12717->12715 12718->12713 12761 677e82 12768 671085 GetProcessHeap RtlAllocateHeap 12761->12768 12763 677e96 12767 677f94 12763->12767 12769 671085 GetProcessHeap RtlAllocateHeap 12763->12769 12765 677ed0 12766 671f2c 2 API calls 12765->12766 12766->12767 12768->12763 12769->12765 12770 673c8f 12771 681dc0 11 API calls 12770->12771 12772 673ca8 12771->12772 12773 673554 11 API calls 12772->12773 12774 673cb5 12773->12774 12775 673125 4 API calls 12774->12775 12776 673cbe 12775->12776 12781 675ea5 VirtualFree 12776->12781 12778 673cc6 12782 675ea5 VirtualFree 12778->12782 12780 673cce 12781->12778 12782->12780 12783 671c8f 12786 673de2 12783->12786 12787 673036 2 API calls 12786->12787 12788 673df3 12787->12788 12791 675ea5 VirtualFree 12788->12791 12790 671c97 12791->12790

                                                            Control-flow Graph

                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00683467
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00683483
                                                              • Part of subcall function 00681E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,0068349D), ref: 00681E4E
                                                              • Part of subcall function 00681E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,0068349D), ref: 00681E61
                                                              • Part of subcall function 00681E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,0068349D), ref: 00681E72
                                                              • Part of subcall function 00681E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,0068349D), ref: 00681E7F
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 006834EA
                                                            • GetLastError.KERNEL32 ref: 006834F5
                                                            • RegCreateKeyExA.KERNEL32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 0068352F
                                                            • RegSetValueExA.KERNELBASE(?,MaxConnectionsPer1_0Server,00000000,00000004,?,00000004), ref: 0068354E
                                                            • RegSetValueExA.KERNELBASE(?,MaxConnectionsPerServer,00000000,00000004,?,00000004), ref: 00683563
                                                            • RegCloseKey.ADVAPI32(?), ref: 00683569
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 006835C5
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 006835D8
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 006835E7
                                                              • Part of subcall function 00681A3C: GetModuleFileNameW.KERNEL32(00000000,007BCBF0,00000208,00000000,00000000,?,?,?,006757B9,?,00000000,00000000), ref: 00681A58
                                                              • Part of subcall function 00681A3C: IsUserAnAdmin.SHELL32 ref: 00681A5E
                                                              • Part of subcall function 00681A3C: FindResourceW.KERNEL32(00000000,00000066,WM_DSP,?,?,?,?,006757B9,?,00000000,00000000), ref: 00681A87
                                                              • Part of subcall function 00681A3C: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,006757B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00681A91
                                                              • Part of subcall function 00681A3C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,006757B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00681A9B
                                                              • Part of subcall function 00681A3C: LockResource.KERNEL32(00000000,?,?,?,?,006757B9,?,00000000,00000000,?,?,?,?,?,?,00000000), ref: 00681AA2
                                                              • Part of subcall function 00681136: CopyFileW.KERNEL32(?,?,00000000,?,00684684,?,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 006811D7
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 00680BD9: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,75A901C0,00000000), ref: 00680C14
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            • \Microsoft Vision\, xrefs: 006835CB
                                                            • MaxConnectionsPerServer, xrefs: 0068355A
                                                            • Software\Microsoft\Windows\CurrentVersion\Internet Settings, xrefs: 00683525
                                                            • MaxConnectionsPer1_0Server, xrefs: 00683545
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Create$Resource$CloseHeapModuleNameProcessValue$AdminAllocateCopyCountDirectoryErrorEventFindFolderFreeHandleLastLoadLockPathReadSizeSizeofTickUserVirtuallstrcatlstrcpy
                                                            • String ID: MaxConnectionsPer1_0Server$MaxConnectionsPerServer$Software\Microsoft\Windows\CurrentVersion\Internet Settings$\Microsoft Vision\
                                                            • API String ID: 3138263686-2552559493
                                                            • Opcode ID: 993e751b20e3b1b484fe8cf0c5a83d34ac68b0d813393d05e5465a35326e71d3
                                                            • Instruction ID: 5e333993202e9015787062d41c1d84f0a11e6f74f974a1ffedceace18d9e1369
                                                            • Opcode Fuzzy Hash: 993e751b20e3b1b484fe8cf0c5a83d34ac68b0d813393d05e5465a35326e71d3
                                                            • Instruction Fuzzy Hash: FE6182B1408345AFD760FF60CC85EAF77EEEB94704F004A2EF68592251EE709A45CB56

                                                            Control-flow Graph

                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(007BE020), ref: 0067E710
                                                              • Part of subcall function 00675F53: GetProcessHeap.KERNEL32(00000000,000000F4,00680477,?,75A901C0,00000000,00675A34), ref: 00675F56
                                                              • Part of subcall function 00675F53: HeapAlloc.KERNEL32(00000000), ref: 00675F5D
                                                              • Part of subcall function 006731D4: ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 00673207
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCriticalEnvironmentExpandFreeInitializeProcessSectionStringsVirtuallstrcpy
                                                            • String ID: {$%ProgramFiles%$%ProgramW6432%$%windir%\System32$H{$TermService$T{$X{$X{$\Microsoft DN1$\rdpwrap.ini$\rfxvmt.dll$\sqlmap.dll$\{$`{$`{
                                                            • API String ID: 2811233055-3134099439
                                                            • Opcode ID: c228859bcef0a2efd79ba89c3266576537e26cdda7692298cabdb7c20233c6e9
                                                            • Instruction ID: 97a2dea34a4f404f1c904837e8e040651a92440814d1d5c00a66c76deb40c9d5
                                                            • Opcode Fuzzy Hash: c228859bcef0a2efd79ba89c3266576537e26cdda7692298cabdb7c20233c6e9
                                                            • Instruction Fuzzy Hash: 55312870B002606B9759BF24CC52AED37ABABD5700B20C13EB00B97392DEE84F45D758

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 126 68290f-682949 CoInitialize CoCreateInstance 127 68294f-68295b 126->127 128 682a66-682a6a 126->128 129 68295f-682964 127->129 129->128 130 68296a-682972 129->130 132 682a22-682a3a 130->132 134 682a40-682a45 132->134 135 682977-682990 132->135 136 682a50-682a55 134->136 137 682a47-682a4d 134->137 135->134 141 682996-6829b5 VariantInit 135->141 139 682a60 CoUninitialize 136->139 140 682a57-682a5d 136->140 137->136 139->128 140->139 145 6829ce-6829d8 call 675f53 141->145 146 6829b7-6829cc 141->146 150 6829da-6829e3 call 682bc7 145->150 151 6829e5 145->151 146->134 146->145 152 6829e7-6829f0 150->152 151->152 154 682a10-682a20 call 672481 152->154 155 6829f2 152->155 154->132 157 6829f4-682a0e 155->157 157->154 157->157
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0068291E
                                                            • CoCreateInstance.OLE32(006845E0,00000000,00000001,006873F0,?,?,?,?,00682F37,?,?,?,0068227B), ref: 0068293E
                                                            • VariantInit.OLEAUT32(?), ref: 0068299A
                                                            • CoUninitialize.OLE32(?,?,?,00682F37,?,?,?,0068227B), ref: 00682A60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInitInitializeInstanceUninitializeVariant
                                                            • String ID: Description$FriendlyName${"h
                                                            • API String ID: 4142528535-2338741783
                                                            • Opcode ID: 6fc26f7586fa9348a3aec4195d204468b97e8151536a7221b6bd2b70735fb4cc
                                                            • Instruction ID: e85b3754b2350e4e8c9ecfcf38b8e6ffc2e692bdae2e121a4479fc25419b3a22
                                                            • Opcode Fuzzy Hash: 6fc26f7586fa9348a3aec4195d204468b97e8151536a7221b6bd2b70735fb4cc
                                                            • Instruction Fuzzy Hash: 29413374A00206AFCF24DFA6C894DEEBBBAFF84704B14455DE446E7250DB70D941CB60

                                                            Control-flow Graph

                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(007BDB10,?,00671221), ref: 006799D3
                                                            • LoadLibraryW.KERNEL32(User32.dll,?,00671221), ref: 006799FE
                                                              • Part of subcall function 00680969: lstrcmpA.KERNEL32(?,00681BD0,?,open,00681BD0), ref: 006809A2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalInitializeLibraryLoadSectionlstrcmp
                                                            • String ID: GetRawInputData$MapVirtualKeyA$ToUnicode$User32.dll
                                                            • API String ID: 4274177235-2474467583
                                                            • Opcode ID: 6ffccb119de9ddfde7e3ddc7e6b24e00e27a4de5c08df5c874199e96b7b46c9c
                                                            • Instruction ID: 668e8c27948db60d280eaba80d4a69f08fba62e0156cea557c99dc2fee49ae9d
                                                            • Opcode Fuzzy Hash: 6ffccb119de9ddfde7e3ddc7e6b24e00e27a4de5c08df5c874199e96b7b46c9c
                                                            • Instruction Fuzzy Hash: CC0162F5A512119B87A8BF647855B4B3E979788B10B12C32FF1049B351FF780C418B8D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 171 6757fb-675850 call 673125 call 68026f getaddrinfo 176 675852-67586b socket 171->176 177 6758af 171->177 176->177 178 67586d-6758aa htons freeaddrinfo connect 176->178 179 6758b1-6758bf call 675ea5 177->179 180 6758c2-6758d1 ReleaseMutex 178->180 181 6758ac 178->181 180->179 181->177
                                                            APIs
                                                              • Part of subcall function 00673125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,006735C4,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 00673151
                                                              • Part of subcall function 0068026F: WaitForSingleObject.KERNEL32(?,000000FF,00675824,75A901C0,?,?,00000000,00674EA0,?,?,?,?,?,00000000,75A901C0), ref: 00680273
                                                            • getaddrinfo.WS2_32(75A901C0,00000000,00674EA0,00000000), ref: 00675848
                                                            • socket.WS2_32(00000002,00000001,00000000), ref: 0067585F
                                                            • htons.WS2_32(00000000), ref: 00675885
                                                            • freeaddrinfo.WS2_32(00000000), ref: 00675895
                                                            • connect.WS2_32(?,?,00000010), ref: 006758A1
                                                            • ReleaseMutex.KERNEL32(?), ref: 006758CB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MutexObjectReleaseSingleWaitconnectfreeaddrinfogetaddrinfohtonslstrcatsocket
                                                            • String ID:
                                                            • API String ID: 2516106447-0
                                                            • Opcode ID: ec0612024910ac190550a760fa97d01c5f746e5bc1c1e260151352f807904189
                                                            • Instruction ID: d45e76c75c66c781f2b06bb723db83f6374f4d22889a137deaa2ddb215863974
                                                            • Opcode Fuzzy Hash: ec0612024910ac190550a760fa97d01c5f746e5bc1c1e260151352f807904189
                                                            • Instruction Fuzzy Hash: C6217F71A00205EBDF10DF61D889BDABBBAFF44321F108166F91ADF291DB719A45CB50

                                                            Control-flow Graph

                                                            APIs
                                                            • setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 00675666
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,75A901C0,?,00675A4F,h\Hh,00000000), ref: 006733C8
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,?,00675A4F,h\Hh,00000000), ref: 006733D5
                                                              • Part of subcall function 006733BF: lstrcpyA.KERNEL32(00000000,?,?,00675A4F,h\Hh,00000000), ref: 006733E8
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            • recv.WS2_32(000000FF,?,0000000C,00000000), ref: 006756B6
                                                            • recv.WS2_32(000000FF,?,000000FF,00000000), ref: 00675726
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlenrecv$FreeVirtuallstrcpysetsockopt
                                                            • String ID: `$warzone160
                                                            • API String ID: 3973575906-811885577
                                                            • Opcode ID: 60d9d4a7493b3b8e5199933bfd072d0197fff23060ad919a28a1ab66e89a2968
                                                            • Instruction ID: 435f68ebe4f68b990e0544eaadd3aa3eeda69bd2aee547d72824375e874f6735
                                                            • Opcode Fuzzy Hash: 60d9d4a7493b3b8e5199933bfd072d0197fff23060ad919a28a1ab66e89a2968
                                                            • Instruction Fuzzy Hash: 4C519371900129ABCB55EB60CC96CEEBB3AEF54350F10826DF41AA6291EB745B44CBA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 248 675ce2-675cf5 GetCommandLineA 249 675cf7-675cfc 248->249 250 675d1f-675d21 248->250 253 675d0f-675d1a 249->253 254 675cfe 249->254 251 675d23 250->251 252 675d1c-675d1d 250->252 255 675d2c-675d2e 251->255 252->250 257 675d2a 253->257 256 675d00-675d04 254->256 258 675d25-675d27 255->258 259 675d30-675d5c GetStartupInfoA call 675d70 call 675d9d GetModuleHandleA call 683435 255->259 256->253 260 675d06-675d0d 256->260 257->255 258->259 261 675d29 258->261 267 675d61-675d69 call 675d85 ExitProcess 259->267 260->253 260->256 261->257
                                                            APIs
                                                            • GetCommandLineA.KERNEL32 ref: 00675CE9
                                                            • GetStartupInfoA.KERNEL32(?), ref: 00675D38
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 00675D54
                                                            • ExitProcess.KERNEL32 ref: 00675D69
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                            • String ID:
                                                            • API String ID: 2164999147-0
                                                            • Opcode ID: 4056415e70e3f1d02d3a44d7068e80bab96bc3d1c97f7b549bfe073688ed10e6
                                                            • Instruction ID: 0ad47459b695d10ac936db2051bf90f22b090b2c7db03c0c4b563eebc6fe291c
                                                            • Opcode Fuzzy Hash: 4056415e70e3f1d02d3a44d7068e80bab96bc3d1c97f7b549bfe073688ed10e6
                                                            • Instruction Fuzzy Hash: 1D01D228014A456EDB346F74A88E6F93BA79F16304FA4A1CCE4CF87313DA920C47876D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 270 681e21-681e59 call 671085 CreateFileA 273 681e5b 270->273 274 681e5e-681e7a GetFileSize ReadFile 270->274 273->274 275 681e7c 274->275 276 681e7e-681e8b CloseHandle 274->276 275->276
                                                            APIs
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,0068349D), ref: 00681E4E
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,0068349D), ref: 00681E61
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,0068349D), ref: 00681E72
                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,0068349D), ref: 00681E7F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                                            • String ID:
                                                            • API String ID: 2517252058-0
                                                            • Opcode ID: b6d607bdc19ba441b55ea85abfb4a0f708f0e502c4d737d4b2bb6df0d56aebbb
                                                            • Instruction ID: 9f4910534440c9cab21da045320b0cc44329273c8c298bb1a6a0c259c947e0ab
                                                            • Opcode Fuzzy Hash: b6d607bdc19ba441b55ea85abfb4a0f708f0e502c4d737d4b2bb6df0d56aebbb
                                                            • Instruction Fuzzy Hash: 7AF062B2A11211BFF3205B65AC4DFBB77ADEB55725F200225F951E61C0EBB05D0187A4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 277 67fbfc-67fc1d GetCurrentProcess OpenProcessToken 278 67fc3f-67fc43 277->278 279 67fc1f-67fc3b GetTokenInformation 277->279 280 67fc45-67fc48 CloseHandle 278->280 281 67fc4e-67fc57 278->281 279->278 280->281
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,00683589,?), ref: 0067FC0E
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00683589,?), ref: 0067FC15
                                                            • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00683589,?), ref: 0067FC33
                                                            • CloseHandle.KERNEL32(00000000), ref: 0067FC48
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                            • String ID:
                                                            • API String ID: 215268677-0
                                                            • Opcode ID: 028e3c1754d9f4198a3eb8ab6dd310c010c88101730d11301be63a74d54d43f1
                                                            • Instruction ID: 137f8fb46a5db1ad0f76b64c73488548d87424f320e3e41988890b20d45ab8b4
                                                            • Opcode Fuzzy Hash: 028e3c1754d9f4198a3eb8ab6dd310c010c88101730d11301be63a74d54d43f1
                                                            • Instruction Fuzzy Hash: D1F0E772900219FBDB159BA09D09ADEBBB9EF04741F114165AA01A6190DB709E44EB90

                                                            Control-flow Graph

                                                            APIs
                                                            • Sleep.KERNEL32(000001F4,00000000,75A901C0,00000000), ref: 00675A26
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,75A901C0,?,00675A4F,h\Hh,00000000), ref: 006733C8
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,?,00675A4F,h\Hh,00000000), ref: 006733D5
                                                              • Part of subcall function 006733BF: lstrcpyA.KERNEL32(00000000,?,?,00675A4F,h\Hh,00000000), ref: 006733E8
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpylstrlen$FreeSleepVirtual
                                                            • String ID: h\Hh$x5h
                                                            • API String ID: 277671435-1559918964
                                                            • Opcode ID: 746b917fbcce9ab6bfc760e438f6f9b9a26ac70e45192a1b343a4f85603f2879
                                                            • Instruction ID: 0ae5b65988b4a188b37ffcde53162d394e4f58b1b8afbd4ef86c443bcf0edd9e
                                                            • Opcode Fuzzy Hash: 746b917fbcce9ab6bfc760e438f6f9b9a26ac70e45192a1b343a4f85603f2879
                                                            • Instruction Fuzzy Hash: EB517575900559EFCB54EFA0C8D1CEEB7B6BF44304B1045AEE41AAB246EF30AB05CB94

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 414 680fc3-680fee RegQueryValueExW 415 681030 414->415 416 680ff0-681012 call 671085 RegQueryValueExW 414->416 418 681032-681036 415->418 416->415 420 681014-681022 call 672f91 416->420 423 68102b-68102e 420->423 424 681024-68102a call 671099 420->424 423->418 424->423
                                                            APIs
                                                            • RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,00683589,?,?,?,006815B2,?,?,80000001), ref: 00680FE6
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,006815B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 0068100A
                                                              • Part of subcall function 00671099: GetProcessHeap.KERNEL32(00000000,00000000,00681E18,00000000,00000000,00000000,00000000,h\Hh,00000000), ref: 0067109F
                                                              • Part of subcall function 00671099: HeapFree.KERNEL32(00000000), ref: 006710A6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$ProcessQueryValue$AllocateFree
                                                            • String ID:
                                                            • API String ID: 3459632794-0
                                                            • Opcode ID: 8937a24454dddab825bad43730ae2b2d43f6dc26d26af36f33c4e104c0bbcf50
                                                            • Instruction ID: 53e4e62150a88400cefd60766d7470a88ccfb85f5bfb5eda7e5aba9568241c86
                                                            • Opcode Fuzzy Hash: 8937a24454dddab825bad43730ae2b2d43f6dc26d26af36f33c4e104c0bbcf50
                                                            • Instruction Fuzzy Hash: C9019272500119BF9B15EBA0DC45EEF7B7EEF49350F10026AF505DA210EB31AE419B64

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00673261: lstrlenW.KERNEL32(75A901C0,00673646,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673268
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00674E98,?), ref: 00673581
                                                              • Part of subcall function 00675EB4: VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00673652,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00675EBE
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 006735AC
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,75A901C0,?,00675A4F,h\Hh,00000000), ref: 006733C8
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,?,00675A4F,h\Hh,00000000), ref: 006733D5
                                                              • Part of subcall function 006733BF: lstrcpyA.KERNEL32(00000000,?,?,00675A4F,h\Hh,00000000), ref: 006733E8
                                                              • Part of subcall function 00673125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,006735C4,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 00673151
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$ByteCharMultiVirtualWide$AllocFreelstrcatlstrcpy
                                                            • String ID:
                                                            • API String ID: 346377423-0
                                                            • Opcode ID: a6d494fe29affa3c44c459d503afbfa72745badba59b37971a22547db2aabd67
                                                            • Instruction ID: 57511ad59a064dd65eb29c7aa8398837061f52ab1e5b39c579504d1d8f33c430
                                                            • Opcode Fuzzy Hash: a6d494fe29affa3c44c459d503afbfa72745badba59b37971a22547db2aabd67
                                                            • Instruction Fuzzy Hash: 85017571701220BBDB55BBA4CC96FEE776F9F49750F104069B50AAB382CE706F0097A8

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 445 68106c-68107c 446 68107e-68108a call 67f731 445->446 447 6810b1-6810c3 RegOpenKeyExW 445->447 446->447 453 68108c-6810a8 RegCreateKeyExW 446->453 448 6810c8 447->448 449 6810c5-6810c6 447->449 451 6810ca-6810ce 448->451 449->451 453->448 454 6810aa-6810ac call 680fae 453->454 454->447
                                                            APIs
                                                            • RegOpenKeyExW.KERNEL32(75A901C0,00000000,00000000,00683589,?,?,?,00683589,?,0068158B,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 006810BB
                                                              • Part of subcall function 0067F731: RegOpenKeyExW.ADVAPI32(75A901C0,00000000,00000000,00020019,00000000,75A901C0,?,00681088,?,?,00683589,?,0068158B,80000001,?,000F003F), ref: 0067F747
                                                            • RegCreateKeyExW.ADVAPI32(75A901C0,00000000,00000000,00000000,00000000,00683589,00000000,?,?,?,?,00683589,?,0068158B,80000001,?), ref: 006810A0
                                                              • Part of subcall function 00680FAE: RegCloseKey.ADVAPI32(?,?,0068112D,?,?,006836B9), ref: 00680FB8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Open$CloseCreate
                                                            • String ID:
                                                            • API String ID: 1752019758-0
                                                            • Opcode ID: 8b72e5acf66d2c576aaa9169315a0b171a37ad19b7d536fffbebf666e6a52cb7
                                                            • Instruction ID: f37b61b419f7c9805f4db0ef47644a5b9162dd57d4a72c463c09851b6b5656d8
                                                            • Opcode Fuzzy Hash: 8b72e5acf66d2c576aaa9169315a0b171a37ad19b7d536fffbebf666e6a52cb7
                                                            • Instruction Fuzzy Hash: A6011D7120014EBFAB11AF51EC80CBF7B6FEF45395710412AFD0596210EB319DA29BB1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 456 681d0c-681d34 Sleep GetTickCount
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CountSleepTick
                                                            • String ID:
                                                            • API String ID: 2804873075-0
                                                            • Opcode ID: 6740908d24ad6fe53ddf92b698473d866d5708eadbc607f0b758aabf5be8ec68
                                                            • Instruction ID: 8558a20035afaf1e3c0087ed050c9b469400ca87e8c2fd7c20b177bebc543a53
                                                            • Opcode Fuzzy Hash: 6740908d24ad6fe53ddf92b698473d866d5708eadbc607f0b758aabf5be8ec68
                                                            • Instruction Fuzzy Hash: 83D0A9302481046BE30C9B09FC8E2213E4EE7E0B05F04902AB50EC90E0CDA055A04640
                                                            APIs
                                                            • ReleaseMutex.KERNEL32(?,?,0067FEFD,x5h,00675BEC,x5h,00000000,00000000,00000000,00000000,?,?,?,?,00000000,h\Hh), ref: 00680288
                                                            • CloseHandle.KERNEL32(?), ref: 00680290
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandleMutexRelease
                                                            • String ID:
                                                            • API String ID: 4207627910-0
                                                            • Opcode ID: 86d22ced4ab80d1d23bdfd48f1becf0acda16719671137a4123cf9d5def9ed58
                                                            • Instruction ID: 79c715b7bc0b4e77bb247292de0419af07d47cf5ebd2e9088ebb95360a21766a
                                                            • Opcode Fuzzy Hash: 86d22ced4ab80d1d23bdfd48f1becf0acda16719671137a4123cf9d5def9ed58
                                                            • Instruction Fuzzy Hash: 12B0923A005021EFEB252F54FC1C8A4BFA6FF08251315166AF1C1810389FB30C609B80
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                            • RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateProcess
                                                            • String ID:
                                                            • API String ID: 1357844191-0
                                                            • Opcode ID: 55bff317a9b0d2edadf901ef595ee8c014a646e57a6e23f51e95aa7957d0f68c
                                                            • Instruction ID: ade9255e09b8105a8c4b25ee4034172da3b4cc71f6200df17c156558e9265648
                                                            • Opcode Fuzzy Hash: 55bff317a9b0d2edadf901ef595ee8c014a646e57a6e23f51e95aa7957d0f68c
                                                            • Instruction Fuzzy Hash: DEB00275544201FBDF415BE09D4DF197B6AAB55703F015654F285C5060DE754490DB11
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,?,00673044,?,00675C22,00000000,?,006810EE,?,?,006836B9), ref: 00675EF1
                                                            • RtlFreeHeap.NTDLL(00000000,?,?,006836B9), ref: 00675EF8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$FreeProcess
                                                            • String ID:
                                                            • API String ID: 3859560861-0
                                                            • Opcode ID: 5b7f5a4ba72e4ef1f0f1b9ef8c4626640ef8b77f3051c407dd1b128081e1eb48
                                                            • Instruction ID: 54e07874c8cf6366c727327cd514aa849919fcd241780fc60fab07f6d37175c1
                                                            • Opcode Fuzzy Hash: 5b7f5a4ba72e4ef1f0f1b9ef8c4626640ef8b77f3051c407dd1b128081e1eb48
                                                            • Instruction Fuzzy Hash: B6A00271594101BBDF4457E09D0DB16352D9755702F005644B246C6150DE6454408731
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,?,00672FA7,BZg,?,?,006803FD,BZg,00675D61,?,75A901C0,00000000,?,00675A42,00000000), ref: 00675F02
                                                            • RtlAllocateHeap.NTDLL(00000000,?,006803FD,BZg,00675D61,?,75A901C0,00000000,?,00675A42,00000000), ref: 00675F09
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateProcess
                                                            • String ID:
                                                            • API String ID: 1357844191-0
                                                            • Opcode ID: e4b175e804d684c533a78193318825dd40d3ce3ce4ec5011df33202acf70b072
                                                            • Instruction ID: e6c8d19e370206e4e4c2f86bc4f4dbe0c152e87690cd6b35cef992ec43921e98
                                                            • Opcode Fuzzy Hash: e4b175e804d684c533a78193318825dd40d3ce3ce4ec5011df33202acf70b072
                                                            • Instruction Fuzzy Hash: 60A00271550101BBDF4457E49D4DF25361DA755702F015754B185C5050DD6554848721
                                                            APIs
                                                            • ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 00673207
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$EnvironmentExpandStringslstrcpy
                                                            • String ID:
                                                            • API String ID: 1709970682-0
                                                            • Opcode ID: 599fa2584a9ed9f64bbaa7c275f1395db47bbfabe287e2e8d9f69858fd543327
                                                            • Instruction ID: 6ecebf80939bb8d2f55298c572c09d507f47dc0200010c72f853f01cb65f41f6
                                                            • Opcode Fuzzy Hash: 599fa2584a9ed9f64bbaa7c275f1395db47bbfabe287e2e8d9f69858fd543327
                                                            • Instruction Fuzzy Hash: 1CE048F674021967DB20A6259C06F9677ADDBC4718F044079B70CF61C0ED75DA46C7A8
                                                            APIs
                                                              • Part of subcall function 00673261: lstrlenW.KERNEL32(75A901C0,00673646,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673268
                                                            • lstrcatW.KERNEL32(00000000,75A901C0,?,?,00683589,?,00681515,00683589,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673365
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcatlstrlen
                                                            • String ID:
                                                            • API String ID: 1475610065-0
                                                            • Opcode ID: ff5cdea8e8c1cadb4923dc9ee3514bc095c4dfb8aa5c95644729872ba9ccdead
                                                            • Instruction ID: fda480a647962711c035f63a04becbb96ea8bae29f1e204c856bf9d363152a27
                                                            • Opcode Fuzzy Hash: ff5cdea8e8c1cadb4923dc9ee3514bc095c4dfb8aa5c95644729872ba9ccdead
                                                            • Instruction Fuzzy Hash: EEE048723042149BCB016BA9E88496D775FEF95360B044539F90997311FA717D1096D4
                                                            APIs
                                                              • Part of subcall function 00680298: CreateMutexA.KERNEL32(00000000,00000000,00000000,?,0067FEDE,?,?,00680459,?,75A901C0,00000000,00675A34), ref: 006802A0
                                                            • WSAStartup.WS2_32(00000002,?), ref: 006758FC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateMutexStartup
                                                            • String ID:
                                                            • API String ID: 3730780901-0
                                                            • Opcode ID: 6bed8149b3119ae3fe8b009a9dc7c122b41e60551e33aede808c71b75af53323
                                                            • Instruction ID: 0972f72f0078d87ed7bac1be4facc11bbfcf7e2436a225aa591b28269be5a2d9
                                                            • Opcode Fuzzy Hash: 6bed8149b3119ae3fe8b009a9dc7c122b41e60551e33aede808c71b75af53323
                                                            • Instruction Fuzzy Hash: 0FE0C971501B109BD2B0AF2B9945897FBE9FF907207401B1FA4A782A61C7B0A5098B90
                                                            APIs
                                                              • Part of subcall function 00673125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,006735C4,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 00673151
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,?,?), ref: 0067FDC0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateEventlstrcat
                                                            • String ID:
                                                            • API String ID: 2275612694-0
                                                            • Opcode ID: bb727c4015ef7b5b7eecd4140bf8a392f03278ef9c0c9b4500167c67e92772bc
                                                            • Instruction ID: 102fb524441eae1e27deceb5ceb8af4ce6355ef20864321d765811ba7248dddd
                                                            • Opcode Fuzzy Hash: bb727c4015ef7b5b7eecd4140bf8a392f03278ef9c0c9b4500167c67e92772bc
                                                            • Instruction Fuzzy Hash: CFD05E722442057BD710EB91DD4AF96FF6AEB55760F008026F65986690DBB1A020D790
                                                            APIs
                                                            • CreateMutexA.KERNEL32(00000000,00000000,00000000,?,0067FEDE,?,?,00680459,?,75A901C0,00000000,00675A34), ref: 006802A0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: bb917759b73c2e4d47b4698447dc3fff66618ac2b08ca21929f88f69d47496ee
                                                            • Instruction ID: 5817af92009203bfec84cf3110054a9006afca300e4e14f65efeb8e4ea4a4ef7
                                                            • Opcode Fuzzy Hash: bb917759b73c2e4d47b4698447dc3fff66618ac2b08ca21929f88f69d47496ee
                                                            • Instruction Fuzzy Hash: 97D012B15045215FA3249F395C4896775DDEF98730315CF29B4A5C71D4E6308C408770
                                                            APIs
                                                            • SHCreateDirectoryExW.SHELL32(00000000,?,00000000,006811A6,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 0067F725
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateDirectory
                                                            • String ID:
                                                            • API String ID: 4241100979-0
                                                            • Opcode ID: de261e011cd38330da53dafbd6ba3cf6946703a372b25fa9e5b8d2a6732781f7
                                                            • Instruction ID: 611f3c841c699e12c8c1daf743f3b28a6bc127eebfc954d3a1206a23993bbed3
                                                            • Opcode Fuzzy Hash: de261e011cd38330da53dafbd6ba3cf6946703a372b25fa9e5b8d2a6732781f7
                                                            • Instruction Fuzzy Hash: F2B012303EC30267DB001B708C06F1035129742F07F200260B256C80E0CB5100005704
                                                            APIs
                                                            • lstrcmpA.KERNEL32(?,00681BD0,?,open,00681BD0), ref: 006809A2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmp
                                                            • String ID:
                                                            • API String ID: 1534048567-0
                                                            • Opcode ID: 03b1c92964b0f919e5ec83f6c7c4c6611f021f9cf899f5dd66f48c41d52f485b
                                                            • Instruction ID: f892c72d4fa7e7ebbe07222fa688aa1d16272c49b8e5be5af19c95b549d3705a
                                                            • Opcode Fuzzy Hash: 03b1c92964b0f919e5ec83f6c7c4c6611f021f9cf899f5dd66f48c41d52f485b
                                                            • Instruction Fuzzy Hash: F7015E71A00525AFEB50EF99C8959AAB7B9FF453147000669E441C3702EB30ED99CBD0
                                                            APIs
                                                              • Part of subcall function 00673554: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00674E98,?), ref: 00673581
                                                              • Part of subcall function 00673554: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 006735AC
                                                              • Part of subcall function 006757FB: getaddrinfo.WS2_32(75A901C0,00000000,00674EA0,00000000), ref: 00675848
                                                              • Part of subcall function 006757FB: socket.WS2_32(00000002,00000001,00000000), ref: 0067585F
                                                              • Part of subcall function 006757FB: htons.WS2_32(00000000), ref: 00675885
                                                              • Part of subcall function 006757FB: freeaddrinfo.WS2_32(00000000), ref: 00675895
                                                              • Part of subcall function 006757FB: connect.WS2_32(?,?,00000010), ref: 006758A1
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            • Sleep.KERNEL32(?,?,?,?,?,?,00000000,75A901C0,00000000), ref: 00674ECD
                                                              • Part of subcall function 0067562F: setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 00675666
                                                              • Part of subcall function 0067562F: recv.WS2_32(000000FF,?,0000000C,00000000), ref: 006756B6
                                                              • Part of subcall function 0067562F: recv.WS2_32(000000FF,?,000000FF,00000000), ref: 00675726
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ByteCharMultiWiderecv$FreeSleepVirtualconnectfreeaddrinfogetaddrinfohtonssetsockoptsocket
                                                            • String ID:
                                                            • API String ID: 3250391716-0
                                                            • Opcode ID: 3e0c15b82373aaa4c5c2a944a3b08323770b2c300570e8069bd6e5cb3548edb7
                                                            • Instruction ID: 2f2473d631d397d752c9f71fa2e825fd37b60a789d3c32743e4c2c49684aef32
                                                            • Opcode Fuzzy Hash: 3e0c15b82373aaa4c5c2a944a3b08323770b2c300570e8069bd6e5cb3548edb7
                                                            • Instruction Fuzzy Hash: FE01B571600A15ABDB54EB74C849BEEF77AFF40314F00425DE41E63181EBB06A55C7D4
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,006733E2,?,00675A4F,h\Hh,00000000), ref: 00675E30
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: f3f1fe339a96ad099adf4d25b171434d4dd9c788e84e4389388d578d283ecfd2
                                                            • Instruction ID: f6b3fd5b298b96239016211a90411a769e482d8a50ebd269a6858e3d6736a2f9
                                                            • Opcode Fuzzy Hash: f3f1fe339a96ad099adf4d25b171434d4dd9c788e84e4389388d578d283ecfd2
                                                            • Instruction Fuzzy Hash: 25C0123234862037F164122A7C1AF5B8D5DCBC1F71F11005EF7058A2D0DCD10C0241E5
                                                            APIs
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: 0f618e8a456516d6b939d5017a6e9e29492f9fdfcdf012fb902e48d801000b3e
                                                            • Instruction ID: ca9286f41b55a495a41b1eda03f48b8c4f150e8650a92ddf284a2ed6c2144749
                                                            • Opcode Fuzzy Hash: 0f618e8a456516d6b939d5017a6e9e29492f9fdfcdf012fb902e48d801000b3e
                                                            • Instruction Fuzzy Hash: 60B0923038070167EF2CCB308CA5F6923227B80B06FA1968CB146DA1D08AA6E5018A04
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00673652,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00675EBE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 4fef59b891257500b9fd9527b998fa9e39b098ce0a7ee451c719f36502888f24
                                                            • Instruction ID: a25265e81ab05f287640157f9913abbec4c80006e67b3c0a9f86d2b430828c23
                                                            • Opcode Fuzzy Hash: 4fef59b891257500b9fd9527b998fa9e39b098ce0a7ee451c719f36502888f24
                                                            • Instruction Fuzzy Hash: F4A002B07D53017AFE695760AD1FF163D19A740F16F301244B30D6D0D069E125008629
                                                            APIs
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: ab4e80c269bbac9083c1fb1a8a39c0eb024a6f73ff0ee61cf026aa71cb2b818d
                                                            • Instruction ID: 6f572cffabd8a6527c90b41753f664258b7d177d214053d802415ff837534f40
                                                            • Opcode Fuzzy Hash: ab4e80c269bbac9083c1fb1a8a39c0eb024a6f73ff0ee61cf026aa71cb2b818d
                                                            • Instruction Fuzzy Hash: 31A002706D470176EE7457205D5AF0526156740B01F2157447241A80E04DA6B1448B58
                                                            APIs
                                                            • RegQueryValueExW.ADVAPI32(?,Account Name,00000000,00000000,?,00001000,?,?,?,?,?,75A8E9B0,74E2F860,00000000,?,0067A25E), ref: 0067A31C
                                                            • RegQueryValueExW.ADVAPI32(?,Email,00000000,00000000,?,00001000,?,?,?,?,?,?,?,?,75A8E9B0,74E2F860), ref: 0067A363
                                                            • RegQueryValueExW.ADVAPI32(?,POP3 Server,00000000,00000000,?,00001000), ref: 0067A3A7
                                                            • RegQueryValueExW.ADVAPI32(?,POP3 User,00000000,00000000,?,00001000), ref: 0067A3EB
                                                            • RegQueryValueExW.ADVAPI32(?,SMTP Server,00000000,00000000,?,00001000), ref: 0067A42F
                                                            • RegQueryValueExW.ADVAPI32(?,POP3 Password,00000000,00000000,?,00001000), ref: 0067A473
                                                            • RegQueryValueExW.ADVAPI32(?,SMTP Password,00000000,00000000,?,00001000), ref: 0067A4E0
                                                            • RegQueryValueExW.ADVAPI32(?,HTTP Password,00000000,00000000,?,00001000), ref: 0067A54D
                                                            • RegQueryValueExW.ADVAPI32(?,IMAP Password,00000000,00000000,?,00001000), ref: 0067A5BA
                                                              • Part of subcall function 0067A632: GlobalAlloc.KERNEL32(00000040,-00000001,75A8E8E0,?,?,?,0067A5E6,00001000,?,00000000,00001000), ref: 0067A650
                                                              • Part of subcall function 0067A632: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,0067A5E6), ref: 0067A686
                                                              • Part of subcall function 0067A632: lstrcpyW.KERNEL32(?,Could not decrypt,?,?,0067A5E6,00001000,?,00000000,00001000), ref: 0067A6BD
                                                              • Part of subcall function 00673261: lstrlenW.KERNEL32(75A901C0,00673646,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673268
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValue$AllocCryptDataGlobalUnprotectlstrcpylstrlen
                                                            • String ID: Account Name$Email$HTTP Password$IMAP Password$POP3 Password$POP3 Server$POP3 User$SMTP Password$SMTP Server
                                                            • API String ID: 6593746-2537589853
                                                            • Opcode ID: f93c5dbed67cf1055ad0e0bf20454ba6c08478525363e415ecc2c8a0c38ea6c5
                                                            • Instruction ID: 62ca6874af317752e700bce2e4896aff2b6e9fba2326073ca6394a7db3cd892a
                                                            • Opcode Fuzzy Hash: f93c5dbed67cf1055ad0e0bf20454ba6c08478525363e415ecc2c8a0c38ea6c5
                                                            • Instruction Fuzzy Hash: E0A164B2D1011DBADB25EBA4CD46FEE737DAF14700F1041AAF509F6181EA74AB448F68
                                                            APIs
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 0067C118: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0067C154
                                                              • Part of subcall function 0067C118: lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 0067C162
                                                              • Part of subcall function 0067C118: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,0067A729,?,00000104,00000000), ref: 0067C17B
                                                              • Part of subcall function 0067C118: RegQueryValueExW.ADVAPI32(0067A729,Path,00000000,?,?,?,?,00000104,00000000), ref: 0067C198
                                                              • Part of subcall function 0067C118: RegCloseKey.ADVAPI32(0067A729,?,00000104,00000000), ref: 0067C1A1
                                                            • lstrcatW.KERNEL32(?,\firefox.exe,?), ref: 0067AC8C
                                                            • GetBinaryTypeW.KERNEL32(?,?), ref: 0067AC9D
                                                            • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,?), ref: 0067B11D
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00673272: wsprintfW.USER32 ref: 0067328D
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 00673554: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00674E98,?), ref: 00673581
                                                              • Part of subcall function 00673554: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 006735AC
                                                            • CopyFileW.KERNEL32(?,?,00000000,.tmp,00000000,00684684,\logins.json,?), ref: 0067AE14
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$ByteCharMultiWidelstrcatlstrlen$BinaryCloseCopyFileFreeOpenPrivateProfileQueryStringTypeValueVirtualwsprintf
                                                            • String ID: .tmp$Path$Profile$\Mozilla\Firefox\$\firefox.exe$\logins.json$encryptedPassword$encryptedUsername$firefox.exe$hostname$profiles.ini
                                                            • API String ID: 288196626-815594582
                                                            • Opcode ID: aa8438f895eccdb16a31f8b41ed341516ecc3a0a76f3be5a023707174ab68358
                                                            • Instruction ID: ba3a15f77f7cf0d6369b3fdc3ee512bda7230cc12cb4bef3ad65510c6a65e6a1
                                                            • Opcode Fuzzy Hash: aa8438f895eccdb16a31f8b41ed341516ecc3a0a76f3be5a023707174ab68358
                                                            • Instruction Fuzzy Hash: 98E10771900519ABDF55EFA0DC92DEEB77AAF44300F10816EE10AA7292EF706F45CB58
                                                            APIs
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 0067C118: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0067C154
                                                              • Part of subcall function 0067C118: lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 0067C162
                                                              • Part of subcall function 0067C118: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,0067A729,?,00000104,00000000), ref: 0067C17B
                                                              • Part of subcall function 0067C118: RegQueryValueExW.ADVAPI32(0067A729,Path,00000000,?,?,?,?,00000104,00000000), ref: 0067C198
                                                              • Part of subcall function 0067C118: RegCloseKey.ADVAPI32(0067A729,?,00000104,00000000), ref: 0067C1A1
                                                            • GetBinaryTypeW.KERNEL32(?,?), ref: 0067A747
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 0067B67E: GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 0067B6AC
                                                              • Part of subcall function 0067B67E: SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 0067B6B5
                                                              • Part of subcall function 0067B67E: PathFileExistsW.SHLWAPI(0067A760,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?,nss3.dll), ref: 0067B7A3
                                                            • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,?), ref: 0067ABCA
                                                              • Part of subcall function 0067B67E: PathFileExistsW.SHLWAPI(0067A760,.dll,?,0067A760,?,00000104,00000000), ref: 0067B7FF
                                                              • Part of subcall function 0067B67E: LoadLibraryW.KERNEL32(?,0067A760,?,00000104,00000000), ref: 0067B83E
                                                              • Part of subcall function 0067B67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B849
                                                              • Part of subcall function 0067B67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B854
                                                              • Part of subcall function 0067B67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B85F
                                                              • Part of subcall function 0067B67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B86A
                                                              • Part of subcall function 0067B67E: SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 0067B957
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad$CurrentDirectorylstrcpy$ExistsFilePathlstrlen$BinaryCloseOpenPrivateProfileQueryStringTypeValuelstrcat
                                                            • String ID: .tmp$Path$Profile$\Thunderbird\$\logins.json$encryptedPassword$encryptedUsername$hostname$profiles.ini$thunderbird.exe
                                                            • API String ID: 1065485167-1863067114
                                                            • Opcode ID: 81680b4d0bfcfa58589514026250fc29bea6361129fcd2ac51cdee932c7fcf6f
                                                            • Instruction ID: 5c40737197561f0b8d6074e871755fb09df0c4ee1e813e7fd2290c74ec803e1c
                                                            • Opcode Fuzzy Hash: 81680b4d0bfcfa58589514026250fc29bea6361129fcd2ac51cdee932c7fcf6f
                                                            • Instruction Fuzzy Hash: A2E1F872900119ABDF55EFA0DC92DEEB77AAF44300F10806EE50AA7292EF706F45CB54
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000005), ref: 0067DA82
                                                            • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,00000000,00000000,?,?,?,00000000), ref: 0067DAB9
                                                              • Part of subcall function 00675EFF: GetProcessHeap.KERNEL32(00000008,?,00672FA7,BZg,?,?,006803FD,BZg,00675D61,?,75A901C0,00000000,?,00675A42,00000000), ref: 00675F02
                                                              • Part of subcall function 00675EFF: RtlAllocateHeap.NTDLL(00000000,?,006803FD,BZg,00675D61,?,75A901C0,00000000,?,00675A42,00000000), ref: 00675F09
                                                            • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,00000000,?,?,?,?,00000000), ref: 0067DAE2
                                                            • GetLastError.KERNEL32 ref: 0067DAEC
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067DAFA
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000005,00000000,00000000,00000000), ref: 0067DBBB
                                                            • lstrcmpW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000), ref: 0067DBFE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnumHeapManagerOpenServicesStatus$AllocateCloseErrorHandleLastProcessServicelstrcmp
                                                            • String ID: ServicesActive
                                                            • API String ID: 899334174-3071072050
                                                            • Opcode ID: eea29cec5743c3a09b5afc9015a45f11db9c309007d8b5d9953389499782d076
                                                            • Instruction ID: 6713ab9adefe2cee86a4d4c7a4172d39584b5c40e41fcf353ba4aca676d38faf
                                                            • Opcode Fuzzy Hash: eea29cec5743c3a09b5afc9015a45f11db9c309007d8b5d9953389499782d076
                                                            • Instruction Fuzzy Hash: 64515FB190021AABDF15DFA0CC95BEEB7BAFF18701F118569E506B6281EB706E40CB54
                                                            APIs
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?,?,?,?,?), ref: 00677A16
                                                              • Part of subcall function 00678617: GetCurrentProcess.KERNEL32(00689698,00677A03,?,?,?,?), ref: 0067861C
                                                              • Part of subcall function 00678617: IsWow64Process.KERNEL32(00000000), ref: 00678623
                                                              • Part of subcall function 00678617: GetProcessHeap.KERNEL32 ref: 00678629
                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,00100000,00003000,00000040,00000000), ref: 00677A3A
                                                            • VirtualProtectEx.KERNEL32(00000000,00000000,00100000,00000040,00000000), ref: 00677A5B
                                                            • VirtualAllocEx.KERNEL32(00000000,33370000,00000100,00003000,00000040), ref: 00677A73
                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,XXXXXX,00000000,00000000), ref: 00677A9D
                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00677AC5
                                                            • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00677ADD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Virtual$AllocMemoryWrite$CreateCurrentHeapOpenProtectRemoteThreadWow64
                                                            • String ID: XXXXXX
                                                            • API String ID: 813767414-582547948
                                                            • Opcode ID: efc7976af3626501c740c3c2b92c89c148b5bd72e35c9c72efbc209828e25fc5
                                                            • Instruction ID: 23f2976273bdc0bf1e67fc8a038e28351099f3aaccc71d9b4ee9a192e1bcc1b5
                                                            • Opcode Fuzzy Hash: efc7976af3626501c740c3c2b92c89c148b5bd72e35c9c72efbc209828e25fc5
                                                            • Instruction Fuzzy Hash: B621A27160521ABFFB2197A49C06FBF7B6E9F01710F204215F618E41D0EBB48A00877A
                                                            APIs
                                                            • GetFullPathNameA.KERNEL32(006896A8,00000104,?,00000000), ref: 00679E17
                                                            • PathCombineA.SHLWAPI(?,?,00685F88), ref: 00679E36
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 00679E46
                                                            • PathCombineA.SHLWAPI(?,006896A8,0000002E), ref: 00679E7D
                                                            • PathCombineA.SHLWAPI(?,?,Accounts\Account.rec0), ref: 00679E8C
                                                              • Part of subcall function 00679ADF: CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 00679AFC
                                                              • Part of subcall function 00679ADF: GetLastError.KERNEL32 ref: 00679B09
                                                              • Part of subcall function 00679ADF: CloseHandle.KERNEL32(00000000), ref: 00679B10
                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 00679EA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Path$CombineFile$Find$CloseCreateErrorFirstFullHandleLastNameNext
                                                            • String ID: .$Accounts\Account.rec0
                                                            • API String ID: 3873318193-2526347284
                                                            • Opcode ID: 5d06387ba84bd2a89e049fc5b47a2316ebb2f24c801c77c5b9d323bbcfda5d61
                                                            • Instruction ID: 0096134ce4de6d66a34c20d1effeb42a1275242db89919a6950afd2e2639f497
                                                            • Opcode Fuzzy Hash: 5d06387ba84bd2a89e049fc5b47a2316ebb2f24c801c77c5b9d323bbcfda5d61
                                                            • Instruction Fuzzy Hash: CA1158B290121C6FDB20D7A4DC89EEF77BDDB45714F0045A6E609E3180E7749E848F60
                                                            APIs
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,00000000,00000000,75A901C0,00000000), ref: 00681FEC
                                                            • GetCurrentProcessId.KERNEL32 ref: 00681FF7
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,000000FF), ref: 00682015
                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,00000800,00003000,00000040), ref: 0068203F
                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,00689158,00000800,00000000), ref: 00682057
                                                            • VirtualProtectEx.KERNEL32(00681FD3,00000000,00000800,00000040,?), ref: 00682068
                                                            • VirtualAllocEx.KERNEL32(00681FD3,00000000,00000103,00003000,00000004), ref: 0068207F
                                                            • WriteProcessMemory.KERNEL32(00681FD3,00000000,?,00000103,00000000), ref: 00682095
                                                            • CreateRemoteThread.KERNEL32(00681FD3,00000000,00000000,0000010E,00000000,00000000,00000000), ref: 006820A8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Virtual$AllocHeapMemoryWrite$AllocateCreateCurrentFileModuleNameOpenProtectRemoteThread
                                                            • String ID:
                                                            • API String ID: 900395357-0
                                                            • Opcode ID: 22b580cc8671ebf2f6b433f18b56ad69d4a2e0f15ba115260e46e473e601531f
                                                            • Instruction ID: 26464a6b07c193c9ea0ffaaf1c10ffda00e9b362272bcbe6cf0818f9ce3abf45
                                                            • Opcode Fuzzy Hash: 22b580cc8671ebf2f6b433f18b56ad69d4a2e0f15ba115260e46e473e601531f
                                                            • Instruction Fuzzy Hash: 62219371640219BEF7209B51DC4BFEB7BADEB45B50F204266B744BA1D0DAF02E408FA4
                                                            APIs
                                                            • LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 0067CFE0
                                                            • BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 0067D00E
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • LocalFree.KERNEL32(?), ref: 0067D096
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapLocal$AllocAllocateCryptDecryptFreeProcess
                                                            • String ID: 0$V`h$v1
                                                            • API String ID: 4131498132-1905648294
                                                            • Opcode ID: 5162e86d0697bbb97b77e273963a2cd25c48c6a82527b04ff7fff05c7536eec0
                                                            • Instruction ID: 84762c86c2add455ec816cf56ba9308d63ed27700617201234835061d72b2016
                                                            • Opcode Fuzzy Hash: 5162e86d0697bbb97b77e273963a2cd25c48c6a82527b04ff7fff05c7536eec0
                                                            • Instruction Fuzzy Hash: 1941A2B2D00108BBDB119FE5DC45DEFBBBEEF45340F04842AF919E6240EA748E468B64
                                                            APIs
                                                            • BCryptOpenAlgorithmProvider.BCRYPT(00000020,AES,00000000,00000000,?,00000000,?,?,?,0067CA5F,?), ref: 0067CCD1
                                                            • BCryptSetProperty.BCRYPT(00000020,ChainingMode,ChainingModeGCM,00000020,00000000,?,0067CA5F,?), ref: 0067CCEA
                                                            • BCryptGenerateSymmetricKey.BCRYPT(00000020,0067CA5F,00000000,00000000,?,00000020,00000000,?,0067CA5F,?), ref: 0067CCFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Crypt$AlgorithmGenerateOpenPropertyProviderSymmetric
                                                            • String ID: AES$ChainingMode$ChainingModeGCM
                                                            • API String ID: 1692524283-1213888626
                                                            • Opcode ID: 8db39bf399b4b8411740bcb896aa669b4050d315196786faf8716a3bd0da42d3
                                                            • Instruction ID: 918f4bc7e32e89c35f3a0fcb6ee7ca4cfbd656a7ea1ac879c60ebea491248e26
                                                            • Opcode Fuzzy Hash: 8db39bf399b4b8411740bcb896aa669b4050d315196786faf8716a3bd0da42d3
                                                            • Instruction Fuzzy Hash: 55F096313513227BDB241F5BEC49F9BBFADEF5ABA1B11412AF505D2150DAA19800CBE0
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,75A901C0), ref: 006820C7
                                                            • Process32First.KERNEL32(00000000,?), ref: 006820F4
                                                            • Process32Next.KERNEL32(00000000,?), ref: 0068211B
                                                            • CloseHandle.KERNEL32(00000000), ref: 00682126
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                            • String ID: explorer.exe
                                                            • API String ID: 420147892-3187896405
                                                            • Opcode ID: 13160f71522ca9fd358e324ff94f964dba1dd7269b45ba40c3d0807f6dae9e50
                                                            • Instruction ID: 71037b4f5590f766d0601e6bbd7d2eb4d2014c5ae273e666cc12b6c357f3d1b8
                                                            • Opcode Fuzzy Hash: 13160f71522ca9fd358e324ff94f964dba1dd7269b45ba40c3d0807f6dae9e50
                                                            • Instruction Fuzzy Hash: 4101F971501115ABD760A764AC0DFEA77FDDF49710F1001A5FA49E5180EE34DAC08B54
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,-00000001,75A8E8E0,?,?,?,0067A5E6,00001000,?,00000000,00001000), ref: 0067A650
                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,0067A5E6), ref: 0067A686
                                                            • lstrcpyW.KERNEL32(?,Could not decrypt,?,?,0067A5E6,00001000,?,00000000,00001000), ref: 0067A6BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocCryptDataGlobalUnprotectlstrcpy
                                                            • String ID: Could not decrypt
                                                            • API String ID: 3112367126-1484008118
                                                            • Opcode ID: 16e725e8af114396ae4e29eb4503e8546e7b8ec279aa9b5b6c9e6b7caf317fea
                                                            • Instruction ID: 3b233726c79f23241ae848172efe1a56c2f9b5a7b30481a6f242e417b4fb2201
                                                            • Opcode Fuzzy Hash: 16e725e8af114396ae4e29eb4503e8546e7b8ec279aa9b5b6c9e6b7caf317fea
                                                            • Instruction Fuzzy Hash: 1711EC76900215EBC711DBD8C9849EEF7BEEF88700B14816AE959E7211E7319E01CBB1
                                                            APIs
                                                            • CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0067CC73
                                                            • LocalAlloc.KERNEL32(00000040,?,?,0067CBC6,?,00000000,?,00000000,?), ref: 0067CC81
                                                            • CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0067CC97
                                                            • LocalFree.KERNEL32(?,?,0067CBC6,?,00000000,?,00000000,?), ref: 0067CCA5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: BinaryCryptLocalString$AllocFree
                                                            • String ID:
                                                            • API String ID: 4291131564-0
                                                            • Opcode ID: 02b8cde808cf6feceb1c90ec183aa859112158882f3d9c6ec3d3e1e5655953c9
                                                            • Instruction ID: b6001b99727937de949d8c5ceeaf44fed0f4b1f48aade3f7edd7f757d31ed962
                                                            • Opcode Fuzzy Hash: 02b8cde808cf6feceb1c90ec183aa859112158882f3d9c6ec3d3e1e5655953c9
                                                            • Instruction Fuzzy Hash: E4011D71201222BFD7214B56DD4DE9BBFADEF497A1B100124F90CD6250EB718C00CBA0
                                                            APIs
                                                            • GetAsyncKeyState.USER32(00000010), ref: 00678A11
                                                            • CallNextHookEx.USER32(00000000,?,?,?), ref: 00678E12
                                                              • Part of subcall function 00678E66: GetForegroundWindow.USER32(?,?,?), ref: 00678E8F
                                                              • Part of subcall function 00678E66: GetWindowTextW.USER32(00000000,?,00000104), ref: 00678EA2
                                                              • Part of subcall function 00678E66: lstrlenW.KERNEL32(-00000210,{Unknown},?,?), ref: 00678F0B
                                                              • Part of subcall function 00678E66: CreateFileW.KERNEL32(?,00000004,00000001,00000000,00000004,00000080,00000000,?,?), ref: 00678F79
                                                              • Part of subcall function 00678E66: lstrlenW.KERNEL32(00684AD0,00000008,00000000,?,?), ref: 00678FA2
                                                              • Part of subcall function 00678E66: WriteFile.KERNEL32(?,00684AD0,00000000,?,?), ref: 00678FAE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileWindowlstrlen$AsyncCallCreateForegroundHookNextStateTextWrite
                                                            • String ID: Kh$[ALT]$[BKSP]$[CAPS]$[CTRL]$[DEL]$[ENTER]$[ESC]$[INSERT]$[TAB]$Kh$Kh$Kh$Kh
                                                            • API String ID: 2452648998-776801271
                                                            • Opcode ID: b68962be114bbe5256f5d5a744b827df73bfee31e260c4b06ad842b07b793398
                                                            • Instruction ID: 8dede5f6a5537355a8713288eed42365a003601364a46c8d8545075138e82507
                                                            • Opcode Fuzzy Hash: b68962be114bbe5256f5d5a744b827df73bfee31e260c4b06ad842b07b793398
                                                            • Instruction Fuzzy Hash: 8691E632BC5212DFC7286A58466C7B46927EB90300F65C736EA4F7B7E0EF508D415392
                                                            APIs
                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 0067B6AC
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 0067B6B5
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 00673272: wsprintfW.USER32 ref: 0067328D
                                                            • PathFileExistsW.SHLWAPI(0067A760,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?,nss3.dll), ref: 0067B7A3
                                                            • PathFileExistsW.SHLWAPI(0067A760,.dll,?,0067A760,?,00000104,00000000), ref: 0067B7FF
                                                            • LoadLibraryW.KERNEL32(?,0067A760,?,00000104,00000000), ref: 0067B83E
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B849
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B854
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B85F
                                                            • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 0067B86A
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 0067B957
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad$CurrentDirectory$ExistsFilePath$FreeVirtuallstrcpywsprintf
                                                            • String ID: .dll$NSSBase64_DecodeBuffer$NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_CheckUserPassword$PK11_FreeSlot$PK11_GetInternalKeySlot$PR_GetError$mozglue.dll$msvcp$msvcp120.dll$msvcr$msvcr120.dll$nss3.dll$softokn3.dll
                                                            • API String ID: 410702425-850564384
                                                            • Opcode ID: f41b0c5e3510467aa239e0f2210621a8819fa2ccdc181a8b4be3ab7129afacef
                                                            • Instruction ID: 3d0d679a1958ec93fff3e4465d5d78934795b4e259e8d97d43bd89bf8a51b11d
                                                            • Opcode Fuzzy Hash: f41b0c5e3510467aa239e0f2210621a8819fa2ccdc181a8b4be3ab7129afacef
                                                            • Instruction Fuzzy Hash: 10910E72A00519EBDB48FFB0D9959EEBB7BBF44300F10816AE51A67251EF306B04DB94
                                                            APIs
                                                            • DefWindowProcA.USER32(?,?,?,?), ref: 00679084
                                                            • GetRawInputData.USER32(?,10000003,00000000,?,00000010), ref: 006790A1
                                                            • GetRawInputData.USER32(?,10000003,00000000,?,00000010), ref: 006790D7
                                                            • GetForegroundWindow.USER32 ref: 006790F4
                                                            • GetWindowTextW.USER32(00000000,?,00000104), ref: 00679105
                                                            • lstrlenW.KERNEL32(-00000210,-00000010,?,Unknow), ref: 006791EE
                                                            • PostQuitMessage.USER32(00000000), ref: 00679381
                                                            • RegisterRawInputDevices.USER32 ref: 006793B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InputWindow$Data$DevicesForegroundMessagePostProcQuitRegisterTextlstrlen
                                                            • String ID: Unknow
                                                            • API String ID: 3853268301-1240069140
                                                            • Opcode ID: 56a5eea85c07938502f627a338acd3443f06626d1185330cc63b4d3c1ef89c3c
                                                            • Instruction ID: 061de619f98d71157507730c735eb11542f79305baa4d5ef4f30873d445c5530
                                                            • Opcode Fuzzy Hash: 56a5eea85c07938502f627a338acd3443f06626d1185330cc63b4d3c1ef89c3c
                                                            • Instruction Fuzzy Hash: 93A18A71104201AFD700EF64DC99EAB7BFAFF85310F448618F54A972A2EB31EA45CB65
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(?,?,?), ref: 0067E407
                                                            • DeleteCriticalSection.KERNEL32(?,?,?), ref: 0067E41E
                                                            • EnterCriticalSection.KERNEL32(007BE020,?,?), ref: 0067E42A
                                                              • Part of subcall function 0067DE1F: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,?,007BE020,?,?,0067E451,?,?), ref: 0067DE51
                                                            • RegCreateKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList,00000000,00000000,00000000,000F013F,00000000,?,?,00000000,00000000,?,?), ref: 0067E5FF
                                                            • RegSetValueExW.ADVAPI32(?,00000000,00000004,?,00000004,?,?), ref: 0067E61A
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 0067E623
                                                            • LeaveCriticalSection.KERNEL32(007BE020,00000000,007BE07C,007BE080,?,?), ref: 0067E65E
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00673261: lstrlenW.KERNEL32(75A901C0,00673646,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673268
                                                            • LeaveCriticalSection.KERNEL32(007BE020,00000000,rpdp,007BE080,00000000,rudp,007BE07C,007BE07C,007BE080,?,?), ref: 0067E6C4
                                                            • LeaveCriticalSection.KERNEL32(007BE020,00000000,?,?), ref: 0067E6F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$Leavelstrlen$lstrcpy$CloseCreateDeleteEnterFreeInitializeOpenValueVirtual
                                                            • String ID: {$ {$ {$ {$8{$HFh$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList$rpdp$rudp$|{$|{$|{
                                                            • API String ID: 2046459734-1993887963
                                                            • Opcode ID: 3b74e767cddf3a03c16b94f1bac8b37ca4ffc1b687eaf400e61053de4e0d8271
                                                            • Instruction ID: 7e967a0429b698818143bde14f68b5b40cdb6be5a943ece49c7b3b108695adc8
                                                            • Opcode Fuzzy Hash: 3b74e767cddf3a03c16b94f1bac8b37ca4ffc1b687eaf400e61053de4e0d8271
                                                            • Instruction Fuzzy Hash: 0E717370640114ABDB54FF60CC96EFE376BAF58700B10C129F50EAA292EF759A05C759
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 006795BC
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,-00000010), ref: 0067962B
                                                            • lstrcatW.KERNEL32(-00000010,\Microsoft Vision\), ref: 00679645
                                                            • CreateDirectoryW.KERNEL32(-00000010,00000000), ref: 00679651
                                                            • lstrcpyW.KERNEL32(?,-00000010), ref: 0067968B
                                                            • lstrcatW.KERNEL32(?,00684A58), ref: 0067969E
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 0067FF27: FindFirstFileW.KERNEL32(?,?,?,?), ref: 0067FF54
                                                            • GetLocalTime.KERNEL32(?,00000000,ExplorerIdentifier), ref: 00679721
                                                            • wsprintfW.USER32 ref: 00679758
                                                            • CreateFileW.KERNEL32(?,10000000,00000001,00000000,00000002,00000080,00000000,00000010,?), ref: 0067979A
                                                            • CloseHandle.KERNEL32(00000000), ref: 006797AA
                                                            • RegisterClassW.USER32 ref: 006797C9
                                                            • CreateWindowExW.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,?), ref: 006797E1
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00679802
                                                            • TranslateMessage.USER32(?), ref: 00679814
                                                            • DispatchMessageA.USER32(?), ref: 0067981F
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0067982F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Message$Create$FileHandlelstrcatlstrcpylstrlen$ClassCloseDirectoryDispatchFindFirstFolderLocalModulePathRegisterTimeTranslateWindowwsprintf
                                                            • String ID: %02d-%02d-%02d_%02d.%02d.%02d$ExplorerIdentifier$\Microsoft Vision\
                                                            • API String ID: 2678186124-2372768292
                                                            • Opcode ID: 2b82b0ac7c538835aff711db91126e06d7a2d8decb0f77abd3e8c1bfa9868b6b
                                                            • Instruction ID: cba18335178901c85b9279f8b5b1cad576c4ba4c8960a6a2c46a356df2c0ee2f
                                                            • Opcode Fuzzy Hash: 2b82b0ac7c538835aff711db91126e06d7a2d8decb0f77abd3e8c1bfa9868b6b
                                                            • Instruction Fuzzy Hash: 7671ADB2504304BBD710DFA8DC49EABB7EEFB89700F044A1DF649E6291EA31D944CB61
                                                            APIs
                                                            • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?), ref: 0067A12F
                                                            • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?), ref: 0067A14C
                                                            • lstrcpyW.KERNEL32(?,Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676), ref: 0067A19F
                                                            • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0067A1B5
                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,00000800,00000000,00000000,00000000,00000000), ref: 0067A1E8
                                                            • RegCloseKey.ADVAPI32(?), ref: 0067A1F9
                                                            • lstrcpyW.KERNEL32(?,?), ref: 0067A20D
                                                            • lstrcatW.KERNEL32(?,00684684), ref: 0067A21B
                                                            • lstrcatW.KERNEL32(?,?), ref: 0067A22F
                                                            • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?), ref: 0067A24C
                                                            • RegCloseKey.ADVAPI32(?,?), ref: 0067A261
                                                            • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?), ref: 0067A27E
                                                            Strings
                                                            • Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676, xrefs: 0067A15F, 0067A16F
                                                            • Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 0067A17C, 0067A181, 0067A191
                                                            • Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 0067A125
                                                            • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 0067A142, 0067A152
                                                            • Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 0067A135
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Open$Closelstrcatlstrcpy$EnumInfoQuery
                                                            • String ID: Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                                                            • API String ID: 1891545080-2020977430
                                                            • Opcode ID: b4ec3265ddad96da2eec1cd77541d7ce4972e78946ae4ac40a5e5af179ea536f
                                                            • Instruction ID: 7fa95b09fba084d71d8985cad622c1ac5121cbd0152d2eb41678ef9e0b8bc263
                                                            • Opcode Fuzzy Hash: b4ec3265ddad96da2eec1cd77541d7ce4972e78946ae4ac40a5e5af179ea536f
                                                            • Instruction Fuzzy Hash: EC413FB290021DBEEB21DBE0CC84EFF776EEF44784F1445A5B919E2101E6719F449BA1
                                                            APIs
                                                              • Part of subcall function 0067FBFC: GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,00683589,?), ref: 0067FC0E
                                                              • Part of subcall function 0067FBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00683589,?), ref: 0067FC15
                                                              • Part of subcall function 0067FBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00683589,?), ref: 0067FC33
                                                              • Part of subcall function 0067FBFC: CloseHandle.KERNEL32(00000000), ref: 0067FC48
                                                            • CloseHandle.KERNEL32(?,00000000), ref: 00681AD8
                                                            • GetCurrentProcess.KERNEL32(?), ref: 00681AE7
                                                            • IsWow64Process.KERNEL32(00000000), ref: 00681AEE
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000400), ref: 00681B25
                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00681B57
                                                            • lstrcatW.KERNEL32(?,\sdclt.exe), ref: 00681B69
                                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00681B81
                                                            • ShellExecuteExW.SHELL32(?), ref: 00681BB3
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00681BBD
                                                            • Sleep.KERNEL32(000007D0), ref: 00681BD5
                                                            • RegDeleteKeyA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command), ref: 00681BE5
                                                            • ExitProcess.KERNEL32 ref: 00681BEC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$CloseCurrentExecuteHandleShellToken$DeleteDirectoryExitFileInformationModuleNameOpenSleepSystemTerminateWow64lstrcat
                                                            • String ID: <$@$DelegateExecute$Software\Classes\Folder\shell\open\command$V`h$\sdclt.exe$open
                                                            • API String ID: 3164795406-4056476792
                                                            • Opcode ID: 616fe6846bdce2ee3da144f32a62f95de5da1c5ac60d0fb50c193bb6c0050715
                                                            • Instruction ID: 19b32957101054bca8c376e7e2ed154c660bcd310367e954777f3fee1d5b8ee1
                                                            • Opcode Fuzzy Hash: 616fe6846bdce2ee3da144f32a62f95de5da1c5ac60d0fb50c193bb6c0050715
                                                            • Instruction Fuzzy Hash: 77316CB1C01119FBDB50EBA4EC4DDEEBBBEEF45711F104269FA09A2150EB315A85CB60
                                                            APIs
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            • LoadResource.KERNEL32(00000000,?,00000000), ref: 006830EE
                                                            • SizeofResource.KERNEL32(00000000,?), ref: 006830FA
                                                            • LockResource.KERNEL32(00000000), ref: 00683104
                                                            • GetTempPathA.KERNEL32(00000400,?), ref: 0068313E
                                                            • lstrcatA.KERNEL32(?,find.exe), ref: 00683152
                                                            • GetTempPathA.KERNEL32(00000400,?), ref: 00683160
                                                            • lstrcatA.KERNEL32(?,find.db), ref: 0068316E
                                                            • CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000002,00000084,00000000), ref: 00683189
                                                            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 0068319B
                                                            • CloseHandle.KERNEL32(00000000), ref: 006831A2
                                                            • wsprintfA.USER32 ref: 006831D2
                                                            • ShellExecuteExA.SHELL32(0000003C), ref: 00683220
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Resource$FilePathTemplstrcat$CloseCreateExecuteFreeHandleLoadLockShellSizeofVirtualWritelstrcpywsprintf
                                                            • String ID: -w %ws -d C -f %s$<$@$find.db$find.exe
                                                            • API String ID: 2504251837-265381321
                                                            • Opcode ID: f7c101c0ae97cbbf20fe431092ac116c6333e3e58222a5eb6c56864ec35aa598
                                                            • Instruction ID: fd6ed570c1b1873ef17f8dfe67ff6a173a1704fb8230f32b1467f074e3f15e5b
                                                            • Opcode Fuzzy Hash: f7c101c0ae97cbbf20fe431092ac116c6333e3e58222a5eb6c56864ec35aa598
                                                            • Instruction Fuzzy Hash: 8C412BB180021DBBDB10DFA4DD88EDEBBBDFF89304F104256F609A6150DB749A858BA4
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 00678840
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,-00000010), ref: 00678894
                                                            • lstrcatW.KERNEL32(-00000010,\Microsoft Vision\), ref: 006788AE
                                                            • GetLocalTime.KERNEL32(?), ref: 006788B5
                                                            • wsprintfW.USER32 ref: 006788E9
                                                            • lstrcatW.KERNEL32(-00000010,?), ref: 00678900
                                                            • CreateFileW.KERNEL32(?,10000000,00000001,00000000,00000002,00000080,00000000,00000010), ref: 0067892C
                                                            • CloseHandle.KERNEL32(00000000), ref: 0067893C
                                                              • Part of subcall function 00681E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,0068349D), ref: 00681E4E
                                                              • Part of subcall function 00681E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,0068349D), ref: 00681E61
                                                              • Part of subcall function 00681E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,0068349D), ref: 00681E72
                                                              • Part of subcall function 00681E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,0068349D), ref: 00681E7F
                                                              • Part of subcall function 006809D2: VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,74E2F770,00000000,?,?,?,?,0067895D), ref: 006809FE
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 006789AF
                                                              • Part of subcall function 00680969: lstrcmpA.KERNEL32(?,00681BD0,?,open,00681BD0), ref: 006809A2
                                                            • TranslateMessage.USER32(?), ref: 00678996
                                                            • DispatchMessageA.USER32(?), ref: 006789A1
                                                            Strings
                                                            • \Microsoft Vision\, xrefs: 006788A8
                                                            • SetWindowsHookExA, xrefs: 00678962
                                                            • c:\windows\system32\user32.dll, xrefs: 0067894A
                                                            • %02d-%02d-%02d_%02d.%02d.%02d, xrefs: 006788E3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$HandleMessage$CloseCreatelstrcat$AllocDispatchFolderLocalModulePathReadSizeTimeTranslateVirtuallstrcmpwsprintf
                                                            • String ID: %02d-%02d-%02d_%02d.%02d.%02d$SetWindowsHookExA$\Microsoft Vision\$c:\windows\system32\user32.dll
                                                            • API String ID: 1431388325-3884914687
                                                            • Opcode ID: 1ab84627197046b84b870730d02331c167ed2249ee575535efd7dc4ee717fcab
                                                            • Instruction ID: 602a0538323519db665edc3732772d08380a28f6992e5a22025f22f242ccf4a5
                                                            • Opcode Fuzzy Hash: 1ab84627197046b84b870730d02331c167ed2249ee575535efd7dc4ee717fcab
                                                            • Instruction Fuzzy Hash: 1741B0B1504201BFE750EBA9EC49E2B77EEFB89700F044A19F649E3291EA35D944C731
                                                            APIs
                                                            • GetForegroundWindow.USER32(?,?,?), ref: 00678E8F
                                                            • GetWindowTextW.USER32(00000000,?,00000104), ref: 00678EA2
                                                            • lstrlenW.KERNEL32(-00000210,{Unknown},?,?), ref: 00678F0B
                                                            • lstrcpyW.KERNEL32(-00000210,?,?,?), ref: 00678F58
                                                            • CreateFileW.KERNEL32(?,00000004,00000001,00000000,00000004,00000080,00000000,?,?), ref: 00678F79
                                                            • lstrlenW.KERNEL32(00684AD0,00000008,00000000,?,?), ref: 00678FA2
                                                            • WriteFile.KERNEL32(?,00684AD0,00000000,?,?), ref: 00678FAE
                                                            • WriteFile.KERNEL32(?,?,00000000,-00000008,00000000,?,?), ref: 00678FD2
                                                            • lstrlenW.KERNEL32(00684AD0,-00000008,00000000,?,?), ref: 00678FE5
                                                            • WriteFile.KERNEL32(?,00684AD0,00000000,?,?), ref: 00678FF1
                                                            • lstrlenW.KERNEL32(?,00000008,00000000,?,?), ref: 00679003
                                                            • WriteFile.KERNEL32(?,?,00000000,?,?), ref: 00679011
                                                            • CloseHandle.KERNEL32(?,?,?), ref: 0067901B
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00673335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,00683589,?,00681515,00683589,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673365
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$File$Write$Windowlstrcpy$CloseCreateForegroundFreeHandleTextVirtuallstrcat
                                                            • String ID: {Unknown}
                                                            • API String ID: 2314120260-4054869793
                                                            • Opcode ID: 78bea1ea76f581acfb29ba5889070dce8a036ae4e809533757aec780a11abe11
                                                            • Instruction ID: fcdb9ffe545d0bc59e4187d0ec2caa60678ebcaf763f226e1099811ed514022f
                                                            • Opcode Fuzzy Hash: 78bea1ea76f581acfb29ba5889070dce8a036ae4e809533757aec780a11abe11
                                                            • Instruction Fuzzy Hash: C8519471A40214BFDB00EF64DC89FAA77BAFF44300F494168F50AA7251EB71AE40CB64
                                                            APIs
                                                              • Part of subcall function 0067EA89: GetCurrentThreadId.KERNEL32 ref: 0067EA95
                                                              • Part of subcall function 0067EA89: SetEvent.KERNEL32(00000000), ref: 0067EAA9
                                                              • Part of subcall function 0067EA89: WaitForSingleObject.KERNEL32(?,00001388), ref: 0067EAB6
                                                              • Part of subcall function 0067EA89: TerminateThread.KERNEL32(?,000000FE), ref: 0067EAC7
                                                            • CreatePipe.KERNEL32(00000000,00000000,?,00000000,?,?,00000000), ref: 0067EB41
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000001,00000002,?,00000000), ref: 0067EB5E
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 0067EB64
                                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 0067EB6D
                                                            • CreatePipe.KERNEL32(00000000,00000000,0000000C,00000000,?,00000000), ref: 0067EB85
                                                            • GetCurrentProcess.KERNEL32(00689560,00000000,00000000,00000002,?,00000000), ref: 0067EB9E
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 0067EBA4
                                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 0067EBA7
                                                            • GetCurrentProcess.KERNEL32(00689564,00000000,00000000,00000002,?,00000000), ref: 0067EBBC
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 0067EBC2
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0067EC18
                                                            • CreateThread.KERNEL32(00000000,00000000,0067E92A,,mh,00000000,00689570), ref: 0067EC38
                                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 0067EBC5
                                                              • Part of subcall function 0067EC8C: CloseHandle.KERNEL32(?,,mh,0067EADC,?,00000000,00672A8C,00000000,exit,00000000,start), ref: 0067EC96
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 0067E891: CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000010,00000000,00000000,?,00000000,?,?,00000001), ref: 0067E8E3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentProcess$Create$Handle$DuplicateThread$EventPipe$CloseObjectSingleTerminateWaitlstrcpy
                                                            • String ID: ,mh
                                                            • API String ID: 337272696-1563204118
                                                            • Opcode ID: 5457df63625e71a145bb69661f70339f37b2283def42bb720593c899b424773d
                                                            • Instruction ID: c0d90a837da2a36392a9175dc4051f0d0e09d3621ecd4188f328013887672eac
                                                            • Opcode Fuzzy Hash: 5457df63625e71a145bb69661f70339f37b2283def42bb720593c899b424773d
                                                            • Instruction Fuzzy Hash: 62418371900309BBDB16EBE0DD46FEE7B7AAF18741F104159B215B20D1DBB19A08CB65
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 0067D5A0
                                                            • OpenServiceW.ADVAPI32(00000000,?,00000001), ref: 0067D5B9
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D5C6
                                                            • QueryServiceConfigW.ADVAPI32(00000000,00000000,00000000,?), ref: 0067D5D5
                                                            • GetLastError.KERNEL32 ref: 0067D5DF
                                                            • QueryServiceConfigW.ADVAPI32(00000000,00000000,?,?), ref: 0067D600
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D611
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D614
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D624
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D627
                                                              • Part of subcall function 00671099: GetProcessHeap.KERNEL32(00000000,00000000,00681E18,00000000,00000000,00000000,00000000,h\Hh,00000000), ref: 0067109F
                                                              • Part of subcall function 00671099: HeapFree.KERNEL32(00000000), ref: 006710A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$ConfigHeapOpenQuery$ErrorFreeLastManagerProcess
                                                            • String ID: ServicesActive
                                                            • API String ID: 1929760286-3071072050
                                                            • Opcode ID: c90852f0daa5486bbcae18f296089f1be9e7e1ff4c0d36793af52af5e5d62bc8
                                                            • Instruction ID: e79e7fa66ea91ebb4313873e983bcd42560539a5e2a23d79559b6ecec2f7afe7
                                                            • Opcode Fuzzy Hash: c90852f0daa5486bbcae18f296089f1be9e7e1ff4c0d36793af52af5e5d62bc8
                                                            • Instruction Fuzzy Hash: 29118B7150021ABBCB20AB62DD48D9B7F7EEF95394B108525F60AD7210DF709E01CBA0
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32 ref: 0067DEEF
                                                              • Part of subcall function 0067FC58: GetCurrentProcess.KERNEL32(?,?,00672D84,?,00684648,?,?,00000000,?,?,?), ref: 0067FC5C
                                                            • PathFileExistsW.SHLWAPI(?), ref: 0067E099
                                                            • PathFileExistsW.SHLWAPI(?), ref: 0067DF0D
                                                              • Part of subcall function 0067FDF0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000001,00000000,00000000,?,?,?,00679A69,?,?,?), ref: 0067FE07
                                                              • Part of subcall function 0067FDF0: GetLastError.KERNEL32(?,?,?,00679A69,?,?,?), ref: 0067FE15
                                                            • LeaveCriticalSection.KERNEL32(?,00000000), ref: 0067E28C
                                                              • Part of subcall function 0067D9B6: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000102,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters), ref: 0067D9EA
                                                            • GetCurrentProcess.KERNEL32(SeDebugPrivilege), ref: 0067E17F
                                                            • LeaveCriticalSection.KERNEL32(?,00000000), ref: 0067E2CC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalFileSection$CurrentExistsLeavePathProcess$CreateEnterErrorLastOpen
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 1717069549-2896544425
                                                            • Opcode ID: e31844915e4b318d344a4f2375574698f68075095cb942e393047a204e9c6a1c
                                                            • Instruction ID: 44b823f8a23bec7cb1e67e220538f55ed1536e4b75153b24e29836d252a1d6f9
                                                            • Opcode Fuzzy Hash: e31844915e4b318d344a4f2375574698f68075095cb942e393047a204e9c6a1c
                                                            • Instruction Fuzzy Hash: C2B19371104205ABC754FF60CC92DAFB7AABF94344F408A2DF19A93191EF70EA08CB56
                                                            APIs
                                                              • Part of subcall function 0067F481: GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,00683589,?,00681618,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\,00000000,InitWindows), ref: 0067F4A2
                                                              • Part of subcall function 00680F6E: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,75A901C0,?,?,00681165,?,?), ref: 00680F8E
                                                              • Part of subcall function 00680FAE: RegCloseKey.ADVAPI32(?,?,0068112D,?,?,006836B9), ref: 00680FB8
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,00684684,?,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 006811D7
                                                              • Part of subcall function 0068106C: RegCreateKeyExW.ADVAPI32(75A901C0,00000000,00000000,00000000,00000000,00683589,00000000,?,?,?,?,00683589,?,0068158B,80000001,?), ref: 006810A0
                                                              • Part of subcall function 0068106C: RegOpenKeyExW.KERNEL32(75A901C0,00000000,00000000,00683589,?,?,?,00683589,?,0068158B,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 006810BB
                                                              • Part of subcall function 00681039: RegSetValueExW.ADVAPI32(?,75A901C0,00000000,?,?,?,?,?,00681432,00000000,00000000,?,00000001,?,?,?), ref: 00681058
                                                            • SHGetKnownFolderPath.SHELL32(00684550,00000000,00000000,?,?,?,?,?,00000000,75A901C0,00000000), ref: 00681264
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,:start,?,00687204,wmic process call create '",00000000,?,?,?,:start,") do %%A,for /F "usebackq tokens=*" %%A in ("), ref: 00681382
                                                              • Part of subcall function 0067F76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 0067F79C
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 0067F71F: SHCreateDirectoryExW.SHELL32(00000000,?,00000000,006811A6,00000000,?,?,?,?,00000000,75A901C0,00000000), ref: 0067F725
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 00673335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,00683589,?,00681515,00683589,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673365
                                                            • DeleteFileW.KERNEL32(?,00000000,:Zone.Identifier,?,?,?,?,?,00000000,75A901C0,00000000), ref: 0068147C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Create$CopyFolderPathlstrcpy$CloseDeleteDirectoryFreeKnownModuleNameOpenSpecialValueVirtuallstrcat
                                                            • String ID: ") do %%A$:Zone.Identifier$:start$\programs.bat$for /F "usebackq tokens=*" %%A in ("$wmic process call create '"
                                                            • API String ID: 2154703971-2016382161
                                                            • Opcode ID: db206ef3da7497b80ad8cd02f9e22427d9fda5e0e58c371794f20b11a72909c0
                                                            • Instruction ID: 8384d260c97131ef3f8834df5f0e33ffc751c7801fccef5f45d5ff24d99f4e2b
                                                            • Opcode Fuzzy Hash: db206ef3da7497b80ad8cd02f9e22427d9fda5e0e58c371794f20b11a72909c0
                                                            • Instruction Fuzzy Hash: C1A12D71600119ABDF59FFA0CC92CFE777AAF94300B10815DB8166B296EF70AB45CB54
                                                            APIs
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,SYSTEM\CurrentControlSet\Services\TermService), ref: 0067DCF3
                                                              • Part of subcall function 00680FC3: RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,00683589,?,?,?,006815B2,?,?,80000001), ref: 00680FE6
                                                              • Part of subcall function 00680FC3: RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,006815B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 0068100A
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00680FAE: RegCloseKey.ADVAPI32(?,?,0068112D,?,?,006836B9), ref: 00680FB8
                                                            • StrStrW.SHLWAPI(?,svchost.exe,?,00000000,ImagePath,?), ref: 0067DD57
                                                            • StrStrW.SHLWAPI(?,svchost.exe -k), ref: 0067DD65
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?), ref: 0067DD82
                                                            Strings
                                                            • ImagePath, xrefs: 0067DD05
                                                            • SYSTEM\CurrentControlSet\Services\TermService, xrefs: 0067DCBE
                                                            • ServiceDll, xrefs: 0067DD90
                                                            • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 0067DCCE
                                                            • svchost.exe -k, xrefs: 0067DD5D
                                                            • svchost.exe, xrefs: 0067DD4F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenQueryValuelstrlen$CloseFreeVirtuallstrcpy
                                                            • String ID: ImagePath$SYSTEM\CurrentControlSet\Services\TermService$SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$svchost.exe$svchost.exe -k
                                                            • API String ID: 2246401353-3333427388
                                                            • Opcode ID: 0751cb3e3909e09d634c7f0cc847ae4eb09a799fc7cee2fac091f1c588ec6e49
                                                            • Instruction ID: 791a2c2ed60df3d34d5fd5cd0ad01bef7268cb3468fde1567eecdfbdad252f7c
                                                            • Opcode Fuzzy Hash: 0751cb3e3909e09d634c7f0cc847ae4eb09a799fc7cee2fac091f1c588ec6e49
                                                            • Instruction Fuzzy Hash: A4410971D00129ABDF54EBA0CC92EEEB77AAF14740F508569F90676291EF706B04CBA4
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 0067D517
                                                            • OpenServiceW.ADVAPI32(00000000,?,00000010), ref: 0067D52C
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D539
                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 0067D546
                                                            • GetLastError.KERNEL32 ref: 0067D550
                                                            • Sleep.KERNEL32(000007D0), ref: 0067D562
                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 0067D56B
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D57F
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D582
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$OpenStart$ErrorLastManagerSleep
                                                            • String ID: ServicesActive
                                                            • API String ID: 104619213-3071072050
                                                            • Opcode ID: a9e749e63021f51a95b26513cf7854632565823df4869b378c6819d534705666
                                                            • Instruction ID: 2ce4420a938201f83f158514f97023b079ca7a1181ef9a865800dc1d7c94ca02
                                                            • Opcode Fuzzy Hash: a9e749e63021f51a95b26513cf7854632565823df4869b378c6819d534705666
                                                            • Instruction Fuzzy Hash: AF01DF716002667BE3301B22AC4CEAB3E7EEFD5B65B005624F70ADA150DE648900C7B0
                                                            APIs
                                                            • CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 00679AFC
                                                            • GetLastError.KERNEL32 ref: 00679B09
                                                            • CloseHandle.KERNEL32(00000000), ref: 00679B10
                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00679B1D
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00679B4C
                                                            • CloseHandle.KERNEL32(00000000), ref: 00679B53
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CloseHandle$CreateErrorLastReadSize
                                                            • String ID: Password$Password
                                                            • API String ID: 1366138817-7788977
                                                            • Opcode ID: 3b05cd230624db907b91a019b9dea92ec2915837e9c45fa498d10906e2d9141b
                                                            • Instruction ID: 530a9a37636efed9b3e97d079fae47a8515cb198c515ce302b1b542760703eb7
                                                            • Opcode Fuzzy Hash: 3b05cd230624db907b91a019b9dea92ec2915837e9c45fa498d10906e2d9141b
                                                            • Instruction Fuzzy Hash: 0681F270C042456EEF26ABA8D855AFE7FF7AF51314F10C09EE0496A282CB750E42C765
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0068274C
                                                            • CoCreateInstance.OLE32(006845A0,00000000,00000001,00687410,{"h), ref: 00682779
                                                            • CoUninitialize.OLE32 ref: 00682902
                                                              • Part of subcall function 00682A6B: CoCreateInstance.OLE32(006845E0,00000000,00000001,006873F0,?,756FE550,00000000,00000000,?,?,006827B0), ref: 00682A99
                                                            • CoCreateInstance.OLE32(006845F0,00000000,00000001,00687400,?), ref: 006827CA
                                                              • Part of subcall function 006824EB: CoTaskMemFree.OLE32(?,?,00000000,00682896), ref: 006824F9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInstance$FreeInitializeTaskUninitialize
                                                            • String ID: Grabber$Source$vids${"h
                                                            • API String ID: 533512943-1943566631
                                                            • Opcode ID: 43904b403700eea63f1eb9910aecd380de1441d546f062dcb072f9638d85e91a
                                                            • Instruction ID: 2fb72a1969a99965afa645365d8b1a0cc5eed6bb13523e70d332fdb5b9312150
                                                            • Opcode Fuzzy Hash: 43904b403700eea63f1eb9910aecd380de1441d546f062dcb072f9638d85e91a
                                                            • Instruction Fuzzy Hash: 0B5183B1A0020AAFDF14EFA4C898EAEB7BAFF44701F14865DF505AB250DB719D45CB60
                                                            APIs
                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0067F825
                                                            • CoInitialize.OLE32(00000000), ref: 0067F82C
                                                            • CoCreateInstance.OLE32(00684490,00000000,00000017,00686E60,?,?,?,?,?,?,?,?,?,00672D0C), ref: 0067F84A
                                                            • VariantInit.OLEAUT32(?), ref: 0067F8CE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Initialize$CreateInitInstanceSecurityVariant
                                                            • String ID: Name$SELECT Name FROM Win32_VideoController$WQL$root\CIMV2
                                                            • API String ID: 2382742315-3227336550
                                                            • Opcode ID: d2eb4bc897ebb95a9d53532fc11a2ae6be6738db2a02d485d7e8e9f2c993bf6b
                                                            • Instruction ID: b022a4c8feee10895128db4e8c295ed81e4976ef98220dd3e8527d6732216543
                                                            • Opcode Fuzzy Hash: d2eb4bc897ebb95a9d53532fc11a2ae6be6738db2a02d485d7e8e9f2c993bf6b
                                                            • Instruction Fuzzy Hash: 55410D74A00219BFCB14DB95CC48E9FBBBEEFC9B14B108558F515EB290DB719901CB21
                                                            APIs
                                                              • Part of subcall function 00680F31: RegDeleteKeyW.ADVAPI32(80000001,?), ref: 00680F38
                                                            • TerminateThread.KERNEL32(00000000,?,?), ref: 00681740
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 006817AD
                                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00681837
                                                            • CloseHandle.KERNEL32(?), ref: 00681846
                                                            • CloseHandle.KERNEL32(?), ref: 0068184B
                                                            • ExitProcess.KERNEL32 ref: 0068184E
                                                            Strings
                                                            • cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q , xrefs: 006817BB
                                                            • hrh, xrefs: 006817C8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandleProcess$CreateDeleteExitFileModuleNameTerminateThread
                                                            • String ID: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q $hrh
                                                            • API String ID: 3630425516-930638143
                                                            • Opcode ID: 8c463303bc548f4b67277ae6c8d0cb710c837656157acaf8362809fdb1cb0d03
                                                            • Instruction ID: 502a73e4e7d7efbbbb0e17c2c8f620ecd3eb5f425c0d52fc12fb6f558c4166ad
                                                            • Opcode Fuzzy Hash: 8c463303bc548f4b67277ae6c8d0cb710c837656157acaf8362809fdb1cb0d03
                                                            • Instruction Fuzzy Hash: 8A3161B2900619BFDB11EBE0CD86EEFB77EEB04300F00456AB605A6151DB74AF44CBA5
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,00000000,75A901C0,00000000), ref: 00681F25
                                                            • IsWow64Process.KERNEL32(00000000), ref: 00681F2C
                                                            • VirtualAlloc.KERNEL32(00000000,000000FF,00001000,00000040), ref: 00681F50
                                                            • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 00681F5E
                                                            • lstrlenA.KERNEL32(00000000,\System32\cmd.exe,00000014), ref: 00681F6C
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00681FA9
                                                            • Sleep.KERNEL32(000003E8), ref: 00681FB8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$AllocCreateCurrentDirectorySleepVirtualWindowsWow64lstrlen
                                                            • String ID: \System32\cmd.exe
                                                            • API String ID: 3151064845-2003734499
                                                            • Opcode ID: 731b4a9be2dffbd329409d3317b2997efcb0168ae3dcc92e9aa3c9caf90b1ddd
                                                            • Instruction ID: d527cd6fc3c93d651ba2f6b813b54fa0673af4dd537c9d5fb6d3bc8c0699c91e
                                                            • Opcode Fuzzy Hash: 731b4a9be2dffbd329409d3317b2997efcb0168ae3dcc92e9aa3c9caf90b1ddd
                                                            • Instruction Fuzzy Hash: AA1181B1A00209BBE710A7B5AC89FAF76AEEB05745F100225F705EA190EA709E458775
                                                            APIs
                                                            • lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0067C154
                                                            • lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 0067C162
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,0067A729,?,00000104,00000000), ref: 0067C17B
                                                            • RegQueryValueExW.ADVAPI32(0067A729,Path,00000000,?,?,?,?,00000104,00000000), ref: 0067C198
                                                            • RegCloseKey.ADVAPI32(0067A729,?,00000104,00000000), ref: 0067C1A1
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 0067C14E
                                                            • Path, xrefs: 0067C190
                                                            • thunderbird.exe, xrefs: 0067C15A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseOpenQueryValuelstrcatlstrcpy
                                                            • String ID: Path$Software\Microsoft\Windows\CurrentVersion\App Paths\$thunderbird.exe
                                                            • API String ID: 3135247354-1374996286
                                                            • Opcode ID: 76d89f068f1e4464a0eb5d763857f53994beac1fdc940c47d10777402f12ec3e
                                                            • Instruction ID: dbcb4455aa255cfc433a7a0640eb835453cd788c37679bb7488c78489bf26a07
                                                            • Opcode Fuzzy Hash: 76d89f068f1e4464a0eb5d763857f53994beac1fdc940c47d10777402f12ec3e
                                                            • Instruction Fuzzy Hash: 151161B294010DBFEB10EBE4EC89FEE77BDEB58304F100175B609E2150EA709E448B61
                                                            APIs
                                                            • lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0067C154
                                                            • lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 0067C162
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,0067A729,?,00000104,00000000), ref: 0067C17B
                                                            • RegQueryValueExW.ADVAPI32(0067A729,Path,00000000,?,?,?,?,00000104,00000000), ref: 0067C198
                                                            • RegCloseKey.ADVAPI32(0067A729,?,00000104,00000000), ref: 0067C1A1
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 0067C14E
                                                            • Path, xrefs: 0067C190
                                                            • thunderbird.exe, xrefs: 0067C15A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseOpenQueryValuelstrcatlstrcpy
                                                            • String ID: Path$Software\Microsoft\Windows\CurrentVersion\App Paths\$thunderbird.exe
                                                            • API String ID: 3135247354-1374996286
                                                            • Opcode ID: eb2af976c019dcec0384b9428e4706a69b639a681bb22aba12dabeabf72817b7
                                                            • Instruction ID: ef73bf1bffbcbe9e82103fbb292f42969f5fc7d4c5dd17775fabf38b3917b903
                                                            • Opcode Fuzzy Hash: eb2af976c019dcec0384b9428e4706a69b639a681bb22aba12dabeabf72817b7
                                                            • Instruction Fuzzy Hash: 0D1121B294011DBFEB10EBA4ED89FEE7B7DEB58354F1001B9F609E2150E6709E448B61
                                                            APIs
                                                              • Part of subcall function 0067F76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 0067F79C
                                                              • Part of subcall function 00673335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,00683589,?,00681515,00683589,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673365
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            • PathFileExistsW.SHLWAPI(00000000,?,00000000,00000000,00000000,.tmp,00000000,00684684,.tmp,00000000,00684684,?,00000000), ref: 0067C5A5
                                                            • PathFileExistsW.SHLWAPI(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0067C245), ref: 0067C5AF
                                                            • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0067C5C3
                                                            • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0067C5CF
                                                              • Part of subcall function 0067CED9: LocalFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0067C66B,?,?,00000000,?), ref: 0067CF43
                                                              • Part of subcall function 0067CED9: LocalFree.KERNEL32(?,00000000,00000000,00000000,00000000,?,0067C66B,?,?,00000000,?), ref: 0067CF4C
                                                              • Part of subcall function 0067CF58: LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 0067CFE0
                                                              • Part of subcall function 0067CF58: BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 0067D00E
                                                              • Part of subcall function 0067CF58: LocalFree.KERNEL32(?), ref: 0067D096
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,75A901C0,?,00675A4F,h\Hh,00000000), ref: 006733C8
                                                              • Part of subcall function 006733BF: lstrlenA.KERNEL32(?,?,00675A4F,h\Hh,00000000), ref: 006733D5
                                                              • Part of subcall function 006733BF: lstrcpyA.KERNEL32(00000000,?,?,00675A4F,h\Hh,00000000), ref: 006733E8
                                                              • Part of subcall function 00673125: lstrcatA.KERNEL32(00000000,75A901C0,?,00000000,?,006735C4,00000000,00000000,?,00674E98,?,?,?,?,?,00000000), ref: 00673151
                                                              • Part of subcall function 0067308C: lstrlenA.KERNEL32(00000000,006730B4,75A901C0,00000000,00000000,?,006732DC,0067350E,00000000,-00000001,75A901C0,?,0067350E,00000000,?,00000000), ref: 00673093
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileFreeLocal$Pathlstrlen$CopyExistslstrcat$AllocCryptDecryptFolderSpecialVirtuallstrcpy
                                                            • String ID: .tmp$select signon_realm, origin_url, username_value, password_value from logins$select signon_realm, origin_url, username_value, password_value from wow_logins
                                                            • API String ID: 881303001-3832748974
                                                            • Opcode ID: 7b3cd93418058919705a1c8d94e17e8386823ba4b68ee6cc7672522c571e57c5
                                                            • Instruction ID: fe30bcb766f05844dcbc1a8eba66fdccdb6f811c961e3ce63e2d7ca7c2898ed2
                                                            • Opcode Fuzzy Hash: 7b3cd93418058919705a1c8d94e17e8386823ba4b68ee6cc7672522c571e57c5
                                                            • Instruction Fuzzy Hash: 76D15F72900119ABDF59FFB4DC92AEEB77AAF44310F10802DF41AA6291EF709B05DB54
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(vaultcli.dll,00000000,0067B229), ref: 0067B561
                                                              • Part of subcall function 00680969: lstrcmpA.KERNEL32(?,00681BD0,?,open,00681BD0), ref: 006809A2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoadlstrcmp
                                                            • String ID: VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                            • API String ID: 2493137890-3967309459
                                                            • Opcode ID: 4c66167fa1d29a7cd6b32aeb421bc7f432abf4eac4c2d791e03dce3746fcd2e9
                                                            • Instruction ID: b985aacfada72b03eec6211f2773fcc5806d67b13f27d3d1d3537db02335f048
                                                            • Opcode Fuzzy Hash: 4c66167fa1d29a7cd6b32aeb421bc7f432abf4eac4c2d791e03dce3746fcd2e9
                                                            • Instruction Fuzzy Hash: A011EC70A01B11CFFBA4AB71A405BE676E7EB85301F145A2FD6AE97341DB30A801CB44
                                                            APIs
                                                            • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 0067D4AB
                                                            • OpenServiceW.ADVAPI32(00000000,?,00000002), ref: 0067D4C0
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D4CD
                                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0067D4E6
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D4FA
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0067D4FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                            • String ID: ServicesActive
                                                            • API String ID: 493672254-3071072050
                                                            • Opcode ID: f72b52c9f375882e10e934d8ab2b69da134f3aff0725e39648ad137bd5114514
                                                            • Instruction ID: 5f6a717524a754bcfc432e7dda960cc0ac897c123a585511d248d0e7455251bc
                                                            • Opcode Fuzzy Hash: f72b52c9f375882e10e934d8ab2b69da134f3aff0725e39648ad137bd5114514
                                                            • Instruction Fuzzy Hash: A5F0963220432677D7211B669C49E9B3E6EEFC67B5B115721FB1AD6290DE70D80187A0
                                                            APIs
                                                            • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,000F003F,?,00000208,007BCBF0,?,?,?,?,00681A78), ref: 006819E9
                                                            • RegCreateKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,00681A78), ref: 00681A06
                                                            • lstrlenW.KERNEL32(007BCBF0,?,?,?,?,00681A78,?,?,?,?,006757B9,?,00000000,00000000), ref: 00681A12
                                                            • RegSetValueExW.ADVAPI32(?,Install,00000000,00000001,007BCBF0,00000000,?,?,?,?,00681A78,?,?,?,?,006757B9), ref: 00681A28
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00681A78,?,?,?,?,006757B9,?,00000000,00000000), ref: 00681A31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseCreateOpenValuelstrlen
                                                            • String ID: Install$SOFTWARE\_rptls
                                                            • API String ID: 2036214137-3226779556
                                                            • Opcode ID: d0b67af52ea0682fb8485602c0df8caaa4462a2f1c6e76dc60299cbbd7bba2dc
                                                            • Instruction ID: 6af71123a9465fbb5f11f384fc7245446d7ef8c0899aa44ec8522069964cab50
                                                            • Opcode Fuzzy Hash: d0b67af52ea0682fb8485602c0df8caaa4462a2f1c6e76dc60299cbbd7bba2dc
                                                            • Instruction Fuzzy Hash: C9F04F72500058BFE7216B96EC4DEEB7E7DEB86791B100269BA05E2111DA619E40D7B0
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(00000000,007BCBF0,00000208,00000000,00000000,?,?,?,006757B9,?,00000000,00000000), ref: 00681A58
                                                            • IsUserAnAdmin.SHELL32 ref: 00681A5E
                                                              • Part of subcall function 0067FBFC: GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,00683589,?), ref: 0067FC0E
                                                              • Part of subcall function 0067FBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00683589,?), ref: 0067FC15
                                                              • Part of subcall function 0067FBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00683589,?), ref: 0067FC33
                                                              • Part of subcall function 0067FBFC: CloseHandle.KERNEL32(00000000), ref: 0067FC48
                                                              • Part of subcall function 006819C9: RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,000F003F,?,00000208,007BCBF0,?,?,?,?,00681A78), ref: 006819E9
                                                              • Part of subcall function 006819C9: RegCreateKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,00681A78), ref: 00681A06
                                                              • Part of subcall function 006819C9: lstrlenW.KERNEL32(007BCBF0,?,?,?,?,00681A78,?,?,?,?,006757B9,?,00000000,00000000), ref: 00681A12
                                                              • Part of subcall function 006819C9: RegSetValueExW.ADVAPI32(?,Install,00000000,00000001,007BCBF0,00000000,?,?,?,?,00681A78,?,?,?,?,006757B9), ref: 00681A28
                                                              • Part of subcall function 006819C9: RegCloseKey.ADVAPI32(?,?,?,?,?,00681A78,?,?,?,?,006757B9,?,00000000,00000000), ref: 00681A31
                                                            • FindResourceW.KERNEL32(00000000,00000066,WM_DSP,?,?,?,?,006757B9,?,00000000,00000000), ref: 00681A87
                                                            • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,006757B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00681A91
                                                            • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,006757B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00681A9B
                                                            • LockResource.KERNEL32(00000000,?,?,?,?,006757B9,?,00000000,00000000,?,?,?,?,?,?,00000000), ref: 00681AA2
                                                              • Part of subcall function 00681936: VirtualProtect.KERNEL32(00000000,000007D0,00000040,00000000,00000000,00000000,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000), ref: 00681974
                                                              • Part of subcall function 00681936: VirtualAlloc.KERNEL32(00000000,000001FE,00001000,00000040,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000,00000000), ref: 00681988
                                                              • Part of subcall function 00681936: GetWindowsDirectoryW.KERNEL32(00000000,00000104,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000,00000000), ref: 00681996
                                                              • Part of subcall function 00681936: lstrlenW.KERNEL32(00000000,\System32\cmd.exe,00000028,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000,00000000), ref: 006819A4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Resource$CloseOpenProcessTokenVirtuallstrlen$AdminAllocCreateCurrentDirectoryFileFindHandleInformationLoadLockModuleNameProtectSizeofUserValueWindows
                                                            • String ID: WM_DSP
                                                            • API String ID: 1403607128-506093727
                                                            • Opcode ID: 8bc82ce171456ae743e652b082d60f1a296da7f9519284cb79c2e581e8d1bc2c
                                                            • Instruction ID: 21d037c2a283ef7bf8e74b67733c5b34df05ac7682f09c54b1090b4bfd5e8c58
                                                            • Opcode Fuzzy Hash: 8bc82ce171456ae743e652b082d60f1a296da7f9519284cb79c2e581e8d1bc2c
                                                            • Instruction Fuzzy Hash: CFF0C2716002517BDB6037B2AC1DFAF2D5F9F93B50F051624F406EA251EE24C8828364
                                                            APIs
                                                            • lstrlenA.KERNEL32(00681B3D,00686056,?,?,00681B3D,00686056,?), ref: 0068185D
                                                            • RegOpenKeyExA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command,00000000,00020006,?,?,?,00681B3D,00686056,?), ref: 0068187A
                                                            • SetLastError.KERNEL32(00000000,?,?,00681B3D,00686056,?), ref: 00681885
                                                            • RegSetValueExA.ADVAPI32(?,V`h,00000000,00000001,00681B3D,00000000,?,?,00681B3D,00686056,?), ref: 0068189D
                                                            • RegCloseKey.ADVAPI32(?,?,?,00681B3D,00686056,?), ref: 006818A8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseErrorLastOpenValuelstrlen
                                                            • String ID: Software\Classes\Folder\shell\open\command$V`h
                                                            • API String ID: 1613093083-120741707
                                                            • Opcode ID: 9c0dff04bd14903a038e238c66203e1ef04354635673186fc17a4d6f8f67fb63
                                                            • Instruction ID: 1ea7ecf940d73a885688e5df92c2fa96faa28d1177b78e2ff3e919023c9d7282
                                                            • Opcode Fuzzy Hash: 9c0dff04bd14903a038e238c66203e1ef04354635673186fc17a4d6f8f67fb63
                                                            • Instruction Fuzzy Hash: DEF03075540214FBDF212FA0AC0AFDA7F6FEF09750F215350FA06BA160EA719A01AB90
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(USER32.DLL,?,006802E1,?,75A901C0,00000000), ref: 00675CAB
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00675CB7
                                                            • ExitProcess.KERNEL32 ref: 00675CDB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressExitLibraryLoadProcProcess
                                                            • String ID: An assertion condition failed$Assert$MessageBoxA$USER32.DLL
                                                            • API String ID: 881411216-1361702557
                                                            • Opcode ID: e6bdcb4ec574a6dfeeac33de3c1fdf9d6b7607d02d64058b83bbbca652076531
                                                            • Instruction ID: a6b6b05d184c3767b70f5574f4625092c95afe48b12e3a770916cd9f4b262d6f
                                                            • Opcode Fuzzy Hash: e6bdcb4ec574a6dfeeac33de3c1fdf9d6b7607d02d64058b83bbbca652076531
                                                            • Instruction Fuzzy Hash: FCD05EB07C53437AEB1077B12C1FFA52A1B6B15F05F155354B686D62C1EFD2C4808764
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(USER32.DLL), ref: 00675F6F
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00675F7B
                                                            • ExitProcess.KERNEL32 ref: 00675F9A
                                                            Strings
                                                            • USER32.DLL, xrefs: 00675F6A
                                                            • PureCall, xrefs: 00675F8A
                                                            • MessageBoxA, xrefs: 00675F75
                                                            • A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application, xrefs: 00675F8F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressExitLibraryLoadProcProcess
                                                            • String ID: A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application$MessageBoxA$PureCall$USER32.DLL
                                                            • API String ID: 881411216-4134947204
                                                            • Opcode ID: b79b0df34b3e3614297681104190f8b3edc5428e181e307aa55907e14788909c
                                                            • Instruction ID: 180c60fa99b181fac6ad3269ad6aab92af09f9834de004e4c07e4d8ded3b292c
                                                            • Opcode Fuzzy Hash: b79b0df34b3e3614297681104190f8b3edc5428e181e307aa55907e14788909c
                                                            • Instruction Fuzzy Hash: 36D0C9B03C43437EE7007BB16C0EF2829176B15F02F011310B645E40D1EFD1D0808729
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00680D6A
                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00680D83
                                                            • CloseHandle.KERNEL32(00000000), ref: 00680D8E
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            • OpenProcess.KERNEL32(00001410,00000000,?,?), ref: 00680DF8
                                                            • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000208), ref: 00680E2E
                                                            • CloseHandle.KERNEL32(00000000,00000000,00684C14), ref: 00680E81
                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00680EE5
                                                            • CloseHandle.KERNEL32(00000000), ref: 00680EF7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandle$Process32lstrcpylstrlen$CreateFileFirstFreeModuleNameNextOpenProcessSnapshotToolhelp32Virtual
                                                            • String ID:
                                                            • API String ID: 3514491001-0
                                                            • Opcode ID: fd04293955dbc2a5cc227d66edec38ca4dac5a4242ffd2e99d9604215c5eed3e
                                                            • Instruction ID: 11dd52117dfe54d88cf20b08bfb151c87dea32412b395d3e53598735ec76356d
                                                            • Opcode Fuzzy Hash: fd04293955dbc2a5cc227d66edec38ca4dac5a4242ffd2e99d9604215c5eed3e
                                                            • Instruction Fuzzy Hash: 0A51D772D00119ABEB50EBA4CC59EEE7BBAAF54710F014669F505B7280EF309F49CB54
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 00682D1A
                                                            • CoCreateInstance.OLE32(006845A0,00000000,00000001,00687410,011EE0E0,?,?), ref: 00682D32
                                                            • CoCreateInstance.OLE32(006845F0,00000000,00000001,00687400,011EE0EC,?,?,00684580,011EE0E4,?,?), ref: 00682D8C
                                                              • Part of subcall function 00682A6B: CoCreateInstance.OLE32(006845E0,00000000,00000001,006873F0,?,756FE550,00000000,00000000,?,?,006827B0), ref: 00682A99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateInstance$Initialize
                                                            • String ID: Grabber$Source$vids
                                                            • API String ID: 1108742289-4200688928
                                                            • Opcode ID: e3bbe5f300d5e9158e826f2555827606e1d02a110a404a1107f82c90d74e1b73
                                                            • Instruction ID: 8758c39b8b4f8ba5cd6e3aff2194261961029e07c0b6c8be6fe88cb723c72f5d
                                                            • Opcode Fuzzy Hash: e3bbe5f300d5e9158e826f2555827606e1d02a110a404a1107f82c90d74e1b73
                                                            • Instruction Fuzzy Hash: 9F518071600202AFCB24EF64C895E9A3B76BF49700B11465CFD05AF291DB71EC45CBA4
                                                            APIs
                                                              • Part of subcall function 0067F80E: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0067F825
                                                              • Part of subcall function 0067F80E: CoInitialize.OLE32(00000000), ref: 0067F82C
                                                              • Part of subcall function 0067F80E: CoCreateInstance.OLE32(00684490,00000000,00000017,00686E60,?,?,?,?,?,?,?,?,?,00672D0C), ref: 0067F84A
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00672D1B
                                                              • Part of subcall function 00681E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,0068349D), ref: 00681E4E
                                                              • Part of subcall function 00681E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,0068349D), ref: 00681E61
                                                              • Part of subcall function 00681E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,0068349D), ref: 00681E72
                                                              • Part of subcall function 00681E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,0068349D), ref: 00681E7F
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 0067FA1F: GlobalMemoryStatusEx.KERNEL32(?), ref: 0067FA30
                                                              • Part of subcall function 0067FC7E: GetComputerNameW.KERNEL32(00672D7F,00000010), ref: 0067FCA1
                                                              • Part of subcall function 0067FC58: GetCurrentProcess.KERNEL32(?,?,00672D84,?,00684648,?,?,00000000,?,?,?), ref: 0067FC5C
                                                              • Part of subcall function 0067FBFC: GetCurrentProcess.KERNEL32(00000008,00000000,75A901C0,00000000,75A901C0,00000000,?,?,?,?,00683589,?), ref: 0067FC0E
                                                              • Part of subcall function 0067FBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00683589,?), ref: 0067FC15
                                                              • Part of subcall function 0067FBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00683589,?), ref: 0067FC33
                                                              • Part of subcall function 0067FBFC: CloseHandle.KERNEL32(00000000), ref: 0067FC48
                                                              • Part of subcall function 0067FA42: LoadLibraryA.KERNEL32(ntdll.dll), ref: 0067FA5A
                                                              • Part of subcall function 0067FA42: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 0067FA6A
                                                              • Part of subcall function 0067FCB8: RegOpenKeyExW.ADVAPI32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 0067FCFC
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 00672DDF
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\,?,?), ref: 00672DF1
                                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?), ref: 00672DFF
                                                              • Part of subcall function 0067990A: InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 00679916
                                                              • Part of subcall function 0067990A: DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 0067992D
                                                              • Part of subcall function 0067990A: EnterCriticalSection.KERNEL32(007BDB10,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 00679939
                                                              • Part of subcall function 0067990A: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 00679949
                                                              • Part of subcall function 0067990A: LeaveCriticalSection.KERNEL32(007BDB10,?,00000000), ref: 0067999C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalFileSection$CreateHandleInitializeProcess$CloseCurrentModuleNameOpenTokenlstrlen$AddressComputerDeleteDirectoryEnterFolderGlobalInformationInstanceLeaveLibraryLoadMemoryPathProcReadSecuritySizeStatuslstrcatlstrcpy
                                                            • String ID: $uh$\Microsoft Vision\
                                                            • API String ID: 1987359387-2745996654
                                                            • Opcode ID: 29cbe8018da9183ee8f0d530fc613898fdc3664f65dc0d2e1b5f9f7f7e700d69
                                                            • Instruction ID: 6dce4aae3459211d63d6035460b614885ecc641e18eeef69658fade826142c76
                                                            • Opcode Fuzzy Hash: 29cbe8018da9183ee8f0d530fc613898fdc3664f65dc0d2e1b5f9f7f7e700d69
                                                            • Instruction Fuzzy Hash: 6131C3B1A10219BBDF44FBE0DC5ADEFB77EAF48300F00856CB509A6182DE705B458BA5
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,000000FF,00001000,00000040,00000000,?,?), ref: 0067796B
                                                            • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 00677979
                                                            • lstrlenA.KERNEL32(00000000,\System32\cmd.exe,00000014), ref: 00677987
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 006779C1
                                                            • Sleep.KERNEL32(000003E8), ref: 006779D0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocCreateDirectoryProcessSleepVirtualWindowslstrlen
                                                            • String ID: \System32\cmd.exe
                                                            • API String ID: 2560724043-2003734499
                                                            • Opcode ID: e2b1db92e715b846647af4af7eab723a4d7e81302e8a0271ff18c21429133908
                                                            • Instruction ID: 44b5482441ecd190e35e1b729129db4d1b83ee45fcb93c49091b6ae08c7b805f
                                                            • Opcode Fuzzy Hash: e2b1db92e715b846647af4af7eab723a4d7e81302e8a0271ff18c21429133908
                                                            • Instruction Fuzzy Hash: 5D115EB2600209BFE710ABB8EC86FAF777EAB04745F100525F705E6191DAB09E0486A5
                                                            APIs
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • VirtualProtect.KERNEL32(00000000,000007D0,00000040,00000000,00000000,00000000,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000), ref: 00681974
                                                            • VirtualAlloc.KERNEL32(00000000,000001FE,00001000,00000040,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000,00000000), ref: 00681988
                                                            • GetWindowsDirectoryW.KERNEL32(00000000,00000104,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000,00000000), ref: 00681996
                                                            • lstrlenW.KERNEL32(00000000,\System32\cmd.exe,00000028,?,00000000,?,00681AB4,?,?,?,006757B9,?,00000000,00000000), ref: 006819A4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapVirtual$AllocAllocateDirectoryProcessProtectWindowslstrlen
                                                            • String ID: \System32\cmd.exe$p`h
                                                            • API String ID: 2244922440-1741495605
                                                            • Opcode ID: 8ff472abbe1911453dde7073c209a59b9f486fbbbf5abc034aed933bb8144597
                                                            • Instruction ID: 6d3a2f4cafa6e33a32d18aae9f467addc5f040a416520606f2d574ce02208e5d
                                                            • Opcode Fuzzy Hash: 8ff472abbe1911453dde7073c209a59b9f486fbbbf5abc034aed933bb8144597
                                                            • Instruction Fuzzy Hash: 930147713403117BE32067749C0AFAB3BADCB86B11F100224F749FE1C0CDA5AD448398
                                                            APIs
                                                            • InitializeSecurityDescriptor.ADVAPI32(?,00000001,00000000,?,?,?,?,?,?,?,?,?,00681B06), ref: 006818C7
                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,00681B06), ref: 006818DB
                                                            • RegCreateKeyExA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command,00000000,00000000,00000000,00020006,0000000C,00681B06,?), ref: 00681913
                                                            • RegCloseKey.ADVAPI32(00681B06), ref: 00681920
                                                            • SetLastError.KERNEL32(00000000), ref: 0068192B
                                                            Strings
                                                            • Software\Classes\Folder\shell\open\command, xrefs: 00681909
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DescriptorSecurity$CloseCreateDaclErrorInitializeLast
                                                            • String ID: Software\Classes\Folder\shell\open\command
                                                            • API String ID: 1473660444-2536721355
                                                            • Opcode ID: 63ee69f6ee5fbdccd2ff2729249bd2c211950e482e467acf3fccb897a76e3c67
                                                            • Instruction ID: a9a5c5ff2728f3ee01198274bc8aecfaf236336e8a6851cec486de9a0f47ef4d
                                                            • Opcode Fuzzy Hash: 63ee69f6ee5fbdccd2ff2729249bd2c211950e482e467acf3fccb897a76e3c67
                                                            • Instruction Fuzzy Hash: 3D011A71900229BADF209BA19C49EDF7FBEEF09761F101221F605F6150EB708645DBA0
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 00679916
                                                            • DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 0067992D
                                                            • EnterCriticalSection.KERNEL32(007BDB10,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 00679939
                                                            • GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,00672E0D,?,00000001,?,?), ref: 00679949
                                                            • LeaveCriticalSection.KERNEL32(007BDB10,?,00000000), ref: 0067999C
                                                              • Part of subcall function 00671F4B: CreateThread.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 00671F60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$CreateDeleteEnterHandleInitializeLeaveModuleThread
                                                            • String ID: .g
                                                            • API String ID: 2964645253-793294742
                                                            • Opcode ID: d9788c2666c3adb927013140de85598825773f78a11e5be5673f7aa123c88a08
                                                            • Instruction ID: ef5788f42cf76e188d51e93415d9c65ea3b67afdcad0b59b3add36df4b717c2f
                                                            • Opcode Fuzzy Hash: d9788c2666c3adb927013140de85598825773f78a11e5be5673f7aa123c88a08
                                                            • Instruction Fuzzy Hash: 3B01B575900104BBCB20AFA59C4DFEB3FBBE746320F41C12AF50957241EB798885CBA0
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,006786D6,00000000), ref: 00677CD3
                                                            • GetProcAddress.KERNEL32(00000000,RtlNtStatusToDosError), ref: 00677CE1
                                                            • GetProcAddress.KERNEL32(00000000,RtlSetLastWin32Error), ref: 00677CF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: RtlNtStatusToDosError$RtlSetLastWin32Error$ntdll.dll
                                                            • API String ID: 667068680-2897241497
                                                            • Opcode ID: 0dddc868a117861dc49559a42f9b14375b3edbf824d38b578f7f51e737167e99
                                                            • Instruction ID: 42b21577acfbcf9b0b53c89025bbbfc36f397be165d330c0354b7f2e68b4fe73
                                                            • Opcode Fuzzy Hash: 0dddc868a117861dc49559a42f9b14375b3edbf824d38b578f7f51e737167e99
                                                            • Instruction Fuzzy Hash: C1F0F434248302AB9F246F65AC55FB63BAAAE847413119619F80AC3360DF759841C724
                                                            APIs
                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000000,?,00000000,?), ref: 0067CBDC
                                                            • GetFileSizeEx.KERNEL32(00000000,?,?,00000000,?), ref: 0067CBF2
                                                            • LocalAlloc.KERNEL32(00000040,?,?,?,00000000,?), ref: 0067CC0D
                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,?), ref: 0067CC25
                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?), ref: 0067CC48
                                                              • Part of subcall function 0067CC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0067CC73
                                                              • Part of subcall function 0067CC54: LocalAlloc.KERNEL32(00000040,?,?,0067CBC6,?,00000000,?,00000000,?), ref: 0067CC81
                                                              • Part of subcall function 0067CC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0067CC97
                                                              • Part of subcall function 0067CC54: LocalFree.KERNEL32(?,?,0067CBC6,?,00000000,?,00000000,?), ref: 0067CCA5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileLocal$AllocBinaryCryptString$CloseCreateFreeHandleReadSize
                                                            • String ID:
                                                            • API String ID: 4225742195-0
                                                            • Opcode ID: 00e28f2f4eee5dfd746b556d359e4e1544bb832d9a54a33b295d110c5da59a26
                                                            • Instruction ID: 368a07aa7d402911231d453e54c6424c371da385ab4e0db5bb4109b550cfefe7
                                                            • Opcode Fuzzy Hash: 00e28f2f4eee5dfd746b556d359e4e1544bb832d9a54a33b295d110c5da59a26
                                                            • Instruction Fuzzy Hash: F511A571500115BBCB269B69DC84EBEBBBEEF45760B14821CF90DD6250DB30DE01DB50
                                                            APIs
                                                              • Part of subcall function 00680969: lstrcmpA.KERNEL32(?,00681BD0,?,open,00681BD0), ref: 006809A2
                                                            • MessageBoxA.USER32(00000000,Bla2,Bla2,00000000), ref: 00680B70
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00680BD9: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,75A901C0,00000000), ref: 00680C14
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            • VirtualQuery, xrefs: 00680B37
                                                            • C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe, xrefs: 00680BAE
                                                            • Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper, xrefs: 00680B7E
                                                            • Bla2, xrefs: 00680B67, 00680B6D, 00680B6E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$CreateFreeMessageProcessVirtuallstrcmplstrcpy
                                                            • String ID: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper$Bla2$C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe$VirtualQuery
                                                            • API String ID: 1196126833-2308542105
                                                            • Opcode ID: f805e2a68769d642b55d367270d748acc8960251164898bede1ad61590d07035
                                                            • Instruction ID: f3eed4f298577002f9969115dfbfcbdd0c483364fc3ab756e1cd728ef439108a
                                                            • Opcode Fuzzy Hash: f805e2a68769d642b55d367270d748acc8960251164898bede1ad61590d07035
                                                            • Instruction Fuzzy Hash: 30111C71A01118BAEF88FBA4DD56CEFBB7E9E44710B10465EF406B2181DB709F08D768
                                                            APIs
                                                            • LocalFree.KERNEL32(?,00000000,00000000,0067CAF5), ref: 0067CE9A
                                                            • LocalFree.KERNEL32(?,00000000,00000000,0067CAF5), ref: 0067CEA5
                                                            • LocalFree.KERNEL32(?,00000000,00000000,0067CAF5), ref: 0067CEB0
                                                            • LocalFree.KERNEL32(?,00000000,00000000,0067CAF5), ref: 0067CEBB
                                                            • LocalFree.KERNEL32(?,00000000,00000000,0067CAF5), ref: 0067CEC6
                                                            • LocalFree.KERNEL32(?,00000000,00000000,0067CAF5), ref: 0067CED1
                                                            • LocalFree.KERNEL32(00000000,00000000,00000000,0067CAF5), ref: 0067CED4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLocal
                                                            • String ID:
                                                            • API String ID: 2826327444-0
                                                            • Opcode ID: 5f783a38566d4b2f6b289463e740aa74c0c5f084f7810d039a024b45717133c9
                                                            • Instruction ID: 58eabaec72ae16a45362c4e878cd58e2a7c80d189349446cfd1b1635f05f322c
                                                            • Opcode Fuzzy Hash: 5f783a38566d4b2f6b289463e740aa74c0c5f084f7810d039a024b45717133c9
                                                            • Instruction Fuzzy Hash: E1F0A931010B14DBD7366B2ADC08BA7B6F2BF80325F16493DD58651AB0C7B5A8D6DF50
                                                            APIs
                                                            • RegOpenKeyExA.ADVAPI32(80000001,software\Aerofox\FoxmailPreview,00000000,00020019,?), ref: 00679DB5
                                                            • RegQueryValueExA.ADVAPI32(?,Executable,00000000,00000000,006897B0,?), ref: 00679DDC
                                                            • PathRemoveFileSpecA.SHLWAPI(006897B0), ref: 00679DE7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileOpenPathQueryRemoveSpecValue
                                                            • String ID: Executable$software\Aerofox\FoxmailPreview
                                                            • API String ID: 3687894118-2371247776
                                                            • Opcode ID: 5b3e880263de955a968408b8deb9d864917947e03f3e8d2c985fa8e4808aec7f
                                                            • Instruction ID: e0df7338245f4e4434c1275d98ce21ad3eb5af432887c9ae44fb27b116c73206
                                                            • Opcode Fuzzy Hash: 5b3e880263de955a968408b8deb9d864917947e03f3e8d2c985fa8e4808aec7f
                                                            • Instruction Fuzzy Hash: 2BF0A774244204BFEB209B91DC8AFDA7BFEDB41B48F100254FA05F1180E7B099019B20
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: recv
                                                            • String ID:
                                                            • API String ID: 1507349165-0
                                                            • Opcode ID: b80286464948bb81da1d5098360fd744daef9045a556d21d23feb8a1068c3c0b
                                                            • Instruction ID: fff3d270f3bdd6ba70a53feced1668a7e683bbdd90c3c814ec7f9b40f2f76af6
                                                            • Opcode Fuzzy Hash: b80286464948bb81da1d5098360fd744daef9045a556d21d23feb8a1068c3c0b
                                                            • Instruction Fuzzy Hash: 3861C671904619AFDB10CFA4CC45FEEB7BABF09300F14C169F508AB281DBB5A945CBA5
                                                            APIs
                                                            • socket.WS2_32(00000002,00000001,00000006), ref: 0067EEB4
                                                            • gethostbyname.WS2_32(?), ref: 0067EEBD
                                                            • htons.WS2_32(?), ref: 0067EEE1
                                                            • InetNtopW.WS2_32(00000002,?,?,00000802), ref: 0067EF12
                                                            • connect.WS2_32(00000000,?,00000010), ref: 0067EF2B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InetNtopconnectgethostbynamehtonssocket
                                                            • String ID:
                                                            • API String ID: 2393792429-0
                                                            • Opcode ID: f434d1b6d2fb53509c16ec7555bfd9481d2780e139fe544304befbd867b68b40
                                                            • Instruction ID: 019075085b624f7545653e5569dedf8f8a17df0b37959b0122ae2d0bfc7583a4
                                                            • Opcode Fuzzy Hash: f434d1b6d2fb53509c16ec7555bfd9481d2780e139fe544304befbd867b68b40
                                                            • Instruction Fuzzy Hash: 9D110B729002547FE71097A4AC4AFBB77ADEF05320F048566F909CB191EAB0894487A0
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00680C97
                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00680CAC
                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00680CC4
                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00680CCF
                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00680CE0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 1789362936-0
                                                            • Opcode ID: be4e7cf66512b83b802e2a69f12811296021c8a3346949388fb510c745e6cfa2
                                                            • Instruction ID: c82742629c04ecd1ed4d03fb1e1af6f75605bb435fbda8f805494e0636d30c7f
                                                            • Opcode Fuzzy Hash: be4e7cf66512b83b802e2a69f12811296021c8a3346949388fb510c745e6cfa2
                                                            • Instruction Fuzzy Hash: CD01F431201215BBE7206FB5EC4CBBE7BBEEB44725F104769F545E2290EB708D898B10
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,00000001,?,00000000,0067B132), ref: 0067B9BA
                                                            • FreeLibrary.KERNEL32(?,?,00000000,0067B132), ref: 0067B9CA
                                                            • FreeLibrary.KERNEL32(?,?,00000000,0067B132), ref: 0067B9D8
                                                            • FreeLibrary.KERNEL32(?,?,00000000,0067B132), ref: 0067B9E6
                                                            • FreeLibrary.KERNEL32(?,?,00000000,0067B132), ref: 0067B9F4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 48bf2bea44bfe2f0005bea1525e6e2adec2d9829796835456fcb3f9374951a19
                                                            • Instruction ID: 13a49065228b042e667d43d028877ada0954e116dff1bee79505ae60d1c87c73
                                                            • Opcode Fuzzy Hash: 48bf2bea44bfe2f0005bea1525e6e2adec2d9829796835456fcb3f9374951a19
                                                            • Instruction Fuzzy Hash: 94F0AEB1B00B26BED7495F768C84B86FE6AFF49260F01522BA56C42221CB716474DFD2
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,0067ABDF), ref: 0067B638
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,0067ABDF), ref: 0067B648
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,0067ABDF), ref: 0067B656
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,0067ABDF), ref: 0067B664
                                                            • FreeLibrary.KERNEL32(?,?,?,00000000,0067ABDF), ref: 0067B672
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 48bf2bea44bfe2f0005bea1525e6e2adec2d9829796835456fcb3f9374951a19
                                                            • Instruction ID: 13a49065228b042e667d43d028877ada0954e116dff1bee79505ae60d1c87c73
                                                            • Opcode Fuzzy Hash: 48bf2bea44bfe2f0005bea1525e6e2adec2d9829796835456fcb3f9374951a19
                                                            • Instruction Fuzzy Hash: 94F0AEB1B00B26BED7495F768C84B86FE6AFF49260F01522BA56C42221CB716474DFD2
                                                            APIs
                                                              • Part of subcall function 0067B559: LoadLibraryA.KERNEL32(vaultcli.dll,00000000,0067B229), ref: 0067B561
                                                            • FreeLibrary.KERNEL32(?), ref: 0067B506
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00673248: lstrcmpW.KERNEL32(?,?), ref: 00673252
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrarylstrcpylstrlen$LoadVirtuallstrcmp
                                                            • String ID: 4$8$Internet Explorer
                                                            • API String ID: 708496175-747916358
                                                            • Opcode ID: ecd883b73b75afebd2114c48e14834a49689e01cf686d01739e03fbb3cdba975
                                                            • Instruction ID: 1a593c820a3672c0d399b48d306c90c4d77202c8da9632d64872e1fb8623a351
                                                            • Opcode Fuzzy Hash: ecd883b73b75afebd2114c48e14834a49689e01cf686d01739e03fbb3cdba975
                                                            • Instruction Fuzzy Hash: 63A15070D00219ABDF15EFE5C885AEEBBBAFF44300F14815AF409BB256DB70AA45CB54
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(ntdll.dll), ref: 0067FA5A
                                                            • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 0067FA6A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RtlGetVersion$ntdll.dll
                                                            • API String ID: 2574300362-1489217083
                                                            • Opcode ID: b6416e3dcb63217e5ffb688e4de5e30d5894cecc9c95f43db25ffbb8bea36dc0
                                                            • Instruction ID: 9139a0e35ca88f51aaa2432b3bf34d8edfea2d0dd531339d16d329eeaa20c665
                                                            • Opcode Fuzzy Hash: b6416e3dcb63217e5ffb688e4de5e30d5894cecc9c95f43db25ffbb8bea36dc0
                                                            • Instruction Fuzzy Hash: D6416B30A0012CAADF248B55D866BFC76F6AB11B4DF1084F5E549F0281E678CEC5CB54
                                                            APIs
                                                              • Part of subcall function 00675F53: GetProcessHeap.KERNEL32(00000000,000000F4,00680477,?,75A901C0,00000000,00675A34), ref: 00675F56
                                                              • Part of subcall function 00675F53: HeapAlloc.KERNEL32(00000000), ref: 00675F5D
                                                            • GetLogicalDriveStringsW.KERNEL32(00000104,00000000), ref: 00680060
                                                            • GetLogicalDriveStringsW.KERNEL32(00000000,00000000), ref: 00680087
                                                            • GetDriveTypeW.KERNEL32(?,00000000,00000000), ref: 006800B7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Drive$HeapLogicalStrings$AllocProcessType
                                                            • String ID: X,g
                                                            • API String ID: 2408535517-1997093199
                                                            • Opcode ID: a4783244c685bf8d952d4c5e3605205e8ef4e0b1aadcaba839b3f3f081c15112
                                                            • Instruction ID: 0054124c310695008081d7241af9d83157d03ed5eb22b02de720d32c60b2abbe
                                                            • Opcode Fuzzy Hash: a4783244c685bf8d952d4c5e3605205e8ef4e0b1aadcaba839b3f3f081c15112
                                                            • Instruction Fuzzy Hash: 42319571E002199BDF54EFE8C5859EFB7F5AF44340F10455EE506B7281EA705E44CBA1
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000400,?), ref: 0068327D
                                                            • lstrcatW.KERNEL32(?,send.db), ref: 0068328F
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00673437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00681E0A,00000000,00000000,00000000,h\Hh,00000000), ref: 0067345C
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpylstrlen$FreePathTempVirtuallstrcat
                                                            • String ID: 5$send.db
                                                            • API String ID: 891666058-2022884741
                                                            • Opcode ID: b319e855f7d1498e3ba42642d07f105f63b6c39bca71363ababfe7d18c76177a
                                                            • Instruction ID: 956ed18584d3c23647b08f672960ed614c5a6ababdf3549322f2011e2631824c
                                                            • Opcode Fuzzy Hash: b319e855f7d1498e3ba42642d07f105f63b6c39bca71363ababfe7d18c76177a
                                                            • Instruction Fuzzy Hash: 85015B72D4011DABCB10EB64DC46EEEB7BDAF50304F10C169B509A6281EF74AB46CBD4
                                                            APIs
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 00683710
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 00683722
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FolderFreePathVirtuallstrcat
                                                            • String ID: ;$\Microsoft Vision\
                                                            • API String ID: 1529938272-253167065
                                                            • Opcode ID: bd3424937e45ca495e504e761349b86577996e8dc43d7212ac5be92b3f57b04b
                                                            • Instruction ID: bb1fa78adf17721d54bcc72ee07c01511d02a1ac60fe51bc69832e104c2c3a8a
                                                            • Opcode Fuzzy Hash: bd3424937e45ca495e504e761349b86577996e8dc43d7212ac5be92b3f57b04b
                                                            • Instruction Fuzzy Hash: E6015EB1C0012DFACB50EBA0DD49DDFBBB9EF14300F108155B509A2141EB34AB45DBD4
                                                            APIs
                                                            • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 00683710
                                                            • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 00683722
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FolderFreePathVirtuallstrcat
                                                            • String ID: ;$\Microsoft Vision\
                                                            • API String ID: 1529938272-253167065
                                                            • Opcode ID: 1bae866ef1643ba0e2e19e5fb13d2ce5d0a06bb410a014e00087fa113297be7b
                                                            • Instruction ID: a832d2e1756953eeb849b9142bc698f7b3079e92bc9039395878430c5ad1de86
                                                            • Opcode Fuzzy Hash: 1bae866ef1643ba0e2e19e5fb13d2ce5d0a06bb410a014e00087fa113297be7b
                                                            • Instruction Fuzzy Hash: A8011BB1C0012EFACB10EBA0DD4ADDFBBB9AF15344F108156B509A2181EB74AB84DBD4
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(ntdll.dll), ref: 0067F4E6
                                                            • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 0067F4F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RtlGetVersion$ntdll.dll
                                                            • API String ID: 2574300362-1489217083
                                                            • Opcode ID: 5d13592b8a4eb2ad64055912ba86b96b8ac3e98112168e6a4d85af1a5733f339
                                                            • Instruction ID: 50f3e36e6c6b719e9b4193a3b4ae2d4baba04301e5f3dad474518f63c732d289
                                                            • Opcode Fuzzy Hash: 5d13592b8a4eb2ad64055912ba86b96b8ac3e98112168e6a4d85af1a5733f339
                                                            • Instruction Fuzzy Hash: E9E0923068021826DB247F75EC0BAE77AAA1F12705F444260A146D1280EE64DA028BE1
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(ntdll.dll), ref: 0067F535
                                                            • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 0067F545
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RtlGetVersion$ntdll.dll
                                                            • API String ID: 2574300362-1489217083
                                                            • Opcode ID: 7f5f42e53c4f9adb5d9b5f950d1b63436204ab1dee3818dc2be4a019f4048057
                                                            • Instruction ID: 96d4ea22bdb5865505ce97f5c49e93b78771cb99039b56aab13346d0427fb1b9
                                                            • Opcode Fuzzy Hash: 7f5f42e53c4f9adb5d9b5f950d1b63436204ab1dee3818dc2be4a019f4048057
                                                            • Instruction Fuzzy Hash: 4BE0123074021D57DB24BF71DC0AAD677AA6B21B45F0082E4B205E2180EA74DA858F90
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,0067FC6D,?,?,00672D84,?,00684648,?,?,00000000,?), ref: 00680C4B
                                                            • GetProcAddress.KERNEL32(00000000), ref: 00680C52
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: IsWow64Process$kernel32
                                                            • API String ID: 1646373207-3789238822
                                                            • Opcode ID: 3bd7733f20f0e4987f92d861c99b7b8d78debc2ffba05f7529fd1028e4f240a0
                                                            • Instruction ID: 839fddc2e1690bda711ca8f83b5bb73ae83576b54bb7dbba89e5dff0a6ebb0b1
                                                            • Opcode Fuzzy Hash: 3bd7733f20f0e4987f92d861c99b7b8d78debc2ffba05f7529fd1028e4f240a0
                                                            • Instruction Fuzzy Hash: 88E08C3A540204FBDB20EBA1DC0EA9A76ADEB04352B100248B001A2240DBB5AB008750
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(?), ref: 0067D18E
                                                            • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 0067D1DD
                                                              • Part of subcall function 006733F5: lstrcpyA.KERNEL32(00000000,?,?,00000000,?,00672A97,?,?,00000000,exit,00000000,start), ref: 0067341A
                                                              • Part of subcall function 006757FB: getaddrinfo.WS2_32(75A901C0,00000000,00674EA0,00000000), ref: 00675848
                                                              • Part of subcall function 006757FB: socket.WS2_32(00000002,00000001,00000000), ref: 0067585F
                                                              • Part of subcall function 006757FB: htons.WS2_32(00000000), ref: 00675885
                                                              • Part of subcall function 006757FB: freeaddrinfo.WS2_32(00000000), ref: 00675895
                                                              • Part of subcall function 006757FB: connect.WS2_32(?,?,00000010), ref: 006758A1
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 0067D261
                                                            • EnterCriticalSection.KERNEL32(?), ref: 0067D27E
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 0067D288
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$Leave$Enter$connectfreeaddrinfogetaddrinfohtonslstrcpysocket
                                                            • String ID:
                                                            • API String ID: 4195813003-0
                                                            • Opcode ID: 694f2597255817f0641ecd894a07138121586bf4ef40d4a723e86ad57cce0d0b
                                                            • Instruction ID: b3822d8feeabb2709706638c9fdb3bbc60b428295e6e25d4f2dbc5b4ef7a6357
                                                            • Opcode Fuzzy Hash: 694f2597255817f0641ecd894a07138121586bf4ef40d4a723e86ad57cce0d0b
                                                            • Instruction Fuzzy Hash: 1C319371200606BBD709EBA0CC51FEAB7BEFF15350F509619F52E92181EF70AA118BA4
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,0067D471,?,?,00000001), ref: 0067F5C2
                                                            • LookupAccountSidW.ADVAPI32(00000000,0067D471,?,00000104,?,00000010,?), ref: 0067F5E7
                                                            • GetLastError.KERNEL32(?,?,00000001), ref: 0067F5F1
                                                            • FreeSid.ADVAPI32(0067D471,?,?,00000001), ref: 0067F5FF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AccountAllocateErrorFreeInitializeLastLookup
                                                            • String ID:
                                                            • API String ID: 1866703397-0
                                                            • Opcode ID: 1a097b4dc0f77b8f3a4975e7d63e27b3401568dab48d5eeb7aa2de5af01104c5
                                                            • Instruction ID: 5e3223ad35211ecd1df125f58841f00a1fedbb7d7394c05b3daaceba00c7fab5
                                                            • Opcode Fuzzy Hash: 1a097b4dc0f77b8f3a4975e7d63e27b3401568dab48d5eeb7aa2de5af01104c5
                                                            • Instruction Fuzzy Hash: 0111CBB190021DBBDB10DFD5DC89EEEB7BDEB04344F104566E609E2150EB709B449BA5
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,?,0067DCAA), ref: 0067F6AA
                                                            • FindResourceW.KERNEL32(00000000,00000001,00000010,?,00000000,00000002,?,?,?,0067DCAA), ref: 0067F6BE
                                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000,00000002,?,?,?,0067DCAA), ref: 0067F6CA
                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,00000002,?,?,?,0067DCAA), ref: 0067F70F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoadResource$FindFree
                                                            • String ID:
                                                            • API String ID: 3272429154-0
                                                            • Opcode ID: 142d04bb86755c4b5f42e56f2b8474864b1505846d73aceeb9fb71ef49b728dd
                                                            • Instruction ID: 76eb1ec7249eb47d0cfc81b8d9bf703aa7d2426080d954a3fccccf6cc07d3487
                                                            • Opcode Fuzzy Hash: 142d04bb86755c4b5f42e56f2b8474864b1505846d73aceeb9fb71ef49b728dd
                                                            • Instruction Fuzzy Hash: 520184B5300A02AFD3085F69EC99EA6B7B6FF88714705C239E429C33A0D774D855C7A0
                                                            APIs
                                                              • Part of subcall function 0067CC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0067CC73
                                                              • Part of subcall function 0067CC54: LocalAlloc.KERNEL32(00000040,?,?,0067CBC6,?,00000000,?,00000000,?), ref: 0067CC81
                                                              • Part of subcall function 0067CC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0067CC97
                                                              • Part of subcall function 0067CC54: LocalFree.KERNEL32(?,?,0067CBC6,?,00000000,?,00000000,?), ref: 0067CCA5
                                                            • LocalFree.KERNEL32(?,00000000,-0000003A,00000000,?), ref: 0067CA6C
                                                              • Part of subcall function 0067CA78: GetLastError.KERNEL32 ref: 0067CADE
                                                            • LocalFree.KERNEL32(?), ref: 0067CA65
                                                              • Part of subcall function 0067CCB4: BCryptOpenAlgorithmProvider.BCRYPT(00000020,AES,00000000,00000000,?,00000000,?,?,?,0067CA5F,?), ref: 0067CCD1
                                                              • Part of subcall function 0067CCB4: BCryptSetProperty.BCRYPT(00000020,ChainingMode,ChainingModeGCM,00000020,00000000,?,0067CA5F,?), ref: 0067CCEA
                                                              • Part of subcall function 0067CCB4: BCryptGenerateSymmetricKey.BCRYPT(00000020,0067CA5F,00000000,00000000,?,00000020,00000000,?,0067CA5F,?), ref: 0067CCFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Crypt$Local$Free$BinaryString$AlgorithmAllocErrorGenerateLastOpenPropertyProviderSymmetric
                                                            • String ID: $DPAPI
                                                            • API String ID: 379455710-1819349886
                                                            • Opcode ID: 15e39dad349f3944833dc4e9cb0433fd972dc99e286f31897be079d7120265a8
                                                            • Instruction ID: 9f11f637746dfeb53366a4cecea989ec08e878c08b016639f84b04736eece143
                                                            • Opcode Fuzzy Hash: 15e39dad349f3944833dc4e9cb0433fd972dc99e286f31897be079d7120265a8
                                                            • Instruction Fuzzy Hash: 9901C47290060DBBCF10EBA4DD459DEB77AEB45725F00C269EC08E6144FB30AB85DB90
                                                            APIs
                                                            • GetLastInputInfo.USER32(?), ref: 006747FF
                                                            • GetTickCount.KERNEL32 ref: 00674805
                                                            • GetForegroundWindow.USER32 ref: 00674819
                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0067482C
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Windowlstrlen$CountForegroundFreeInfoInputLastTextTickVirtuallstrcpy
                                                            • String ID:
                                                            • API String ID: 2567647128-0
                                                            • Opcode ID: 5ef43e9f1dd188028bd9b4fade7df77b6e6173bc28402fc1df5e4e82ea64bb6c
                                                            • Instruction ID: 54fc926a6a63b42deaf5d8538485b1e75de9d5130264e7c8d5862662d74200d6
                                                            • Opcode Fuzzy Hash: 5ef43e9f1dd188028bd9b4fade7df77b6e6173bc28402fc1df5e4e82ea64bb6c
                                                            • Instruction Fuzzy Hash: 98118BB1C00218ABCB04EBB0DD59AEDB7BAEF48300F008259B406A2290EF74AB44CB54
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 0067EA95
                                                            • SetEvent.KERNEL32(00000000), ref: 0067EAA9
                                                            • WaitForSingleObject.KERNEL32(?,00001388), ref: 0067EAB6
                                                            • TerminateThread.KERNEL32(?,000000FE), ref: 0067EAC7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Thread$CurrentEventObjectSingleTerminateWait
                                                            • String ID:
                                                            • API String ID: 2174867186-0
                                                            • Opcode ID: 139942c02b511399c96689162a5997d2d49301263bfddba08441d50e88536a76
                                                            • Instruction ID: 1376273f8f2f7043ee3b97efb63a06566a87b6f75d1f90229afcc67ba6aab1ac
                                                            • Opcode Fuzzy Hash: 139942c02b511399c96689162a5997d2d49301263bfddba08441d50e88536a76
                                                            • Instruction Fuzzy Hash: 70011D35100701ABD735AF10E949BAA77B3BF58311F508BADE066528F1CFB2698CCB51
                                                            APIs
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,?,00672617,?,?), ref: 00677B2C
                                                              • Part of subcall function 00678617: GetCurrentProcess.KERNEL32(00689698,00677A03,?,?,?,?), ref: 0067861C
                                                              • Part of subcall function 00678617: IsWow64Process.KERNEL32(00000000), ref: 00678623
                                                              • Part of subcall function 00678617: GetProcessHeap.KERNEL32 ref: 00678629
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$CurrentHeapOpenWow64
                                                            • String ID: XXXXXX$YYj
                                                            • API String ID: 1563638298-1957121946
                                                            • Opcode ID: c99605e4c00dc287fe1759ecedbf040863fd3ef740785556ea043f959b143409
                                                            • Instruction ID: 4977ef0fc0cd842d91d407f85e21f9ee42acb8f4627674407965d8e04c2ba244
                                                            • Opcode Fuzzy Hash: c99605e4c00dc287fe1759ecedbf040863fd3ef740785556ea043f959b143409
                                                            • Instruction Fuzzy Hash: 9931E4B1A04205BFEF15AA688C45BBF76AFDF50764F20C22DF81C97281FA708D4186A1
                                                            APIs
                                                              • Part of subcall function 0067F76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 0067F79C
                                                              • Part of subcall function 00673335: lstrcatW.KERNEL32(00000000,75A901C0,?,?,00683589,?,00681515,00683589,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673365
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 0067362D: lstrcpyW.KERNEL32(00000000,75A901C0,?,?,?,0068150A,006835B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00683589,00000000,75A901C0,00000000), ref: 00673657
                                                              • Part of subcall function 0067351D: PathFindExtensionW.SHLWAPI(?,?,0067282E,?,?,00000000,00684684), ref: 00673527
                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 00672860
                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 0067288A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Path$DownloadExecuteExtensionFileFindFolderFreeShellSpecialVirtuallstrcatlstrcpy
                                                            • String ID: open
                                                            • API String ID: 4166385161-2758837156
                                                            • Opcode ID: b786caab362cccf4b49822f26fed944ac14ce2404c4028df6c398e098c060f9c
                                                            • Instruction ID: 1324d106b3aec60799116d82ca6514aa5ba9e7bbbf3a187b9363dadb7b152c97
                                                            • Opcode Fuzzy Hash: b786caab362cccf4b49822f26fed944ac14ce2404c4028df6c398e098c060f9c
                                                            • Instruction Fuzzy Hash: 9E218972A00218BBDB54AFA0C895EEE7B7AAF81310F01C19EF41A67281DF705B49CB54
                                                            APIs
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 0067FCFC
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00680FC3: RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,00683589,?,?,?,006815B2,?,?,80000001), ref: 00680FE6
                                                              • Part of subcall function 00680FC3: RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,006815B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 0068100A
                                                              • Part of subcall function 00680FAE: RegCloseKey.ADVAPI32(?,?,0068112D,?,?,006836B9), ref: 00680FB8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValuelstrlen$CloseFreeOpenVirtuallstrcpy
                                                            • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                            • API String ID: 1903904756-1211650757
                                                            • Opcode ID: 792d98864d86efefdb642ae43c38d5ddfe52b9222701d4b01ee73994ca8fca2a
                                                            • Instruction ID: e8f539752ea99eb09e91c0446851461b259e3fdeb353be205c229f4b34b85ab1
                                                            • Opcode Fuzzy Hash: 792d98864d86efefdb642ae43c38d5ddfe52b9222701d4b01ee73994ca8fca2a
                                                            • Instruction Fuzzy Hash: 5711B470D00129ABCB64FBA4CD52CEDB77AAF50700B10856EB40A73291EFB01F05CB95
                                                            APIs
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,?,007BE020,?,?,0067E451,?,?), ref: 0067DE51
                                                              • Part of subcall function 00680FC3: RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,00000000,00683589,?,?,?,006815B2,?,?,80000001), ref: 00680FE6
                                                              • Part of subcall function 00680FC3: RegQueryValueExW.KERNEL32(?,75A901C0,00000000,75A901C0,00000000,00000000,?,006815B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 0068100A
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00680FAE: RegCloseKey.ADVAPI32(?,?,0068112D,?,?,006836B9), ref: 00680FB8
                                                            Strings
                                                            • ServiceDll, xrefs: 0067DE5F
                                                            • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 0067DE2C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValuelstrlen$CloseFreeOpenVirtuallstrcpy
                                                            • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll
                                                            • API String ID: 1903904756-387424650
                                                            • Opcode ID: 583a0b9bdb5ae6e5e2085581aa01ce86551e735732bcdf1d4b8eb641deab1a77
                                                            • Instruction ID: b32872f0a4922da9ac0cd856602940fa32c24edecdd953b10efcf6b18a8e5f64
                                                            • Opcode Fuzzy Hash: 583a0b9bdb5ae6e5e2085581aa01ce86551e735732bcdf1d4b8eb641deab1a77
                                                            • Instruction Fuzzy Hash: E4118271D00218ABDB61FBA0C956CFEBB7AAF90700B10859DB90677281EF705F04DB50
                                                            APIs
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,00000000,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 006735EE
                                                              • Part of subcall function 006735E5: lstrlenW.KERNEL32(00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673605
                                                              • Part of subcall function 006735E5: lstrcpyW.KERNEL32(?,00681E02,?,00681E02,00000000,00000000,h\Hh,00000000), ref: 00673620
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000102,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters), ref: 0067D9EA
                                                              • Part of subcall function 00681039: RegSetValueExW.ADVAPI32(?,75A901C0,00000000,?,?,?,?,?,00681432,00000000,00000000,?,00000001,?,?,?), ref: 00681058
                                                              • Part of subcall function 00675EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00675C2A,00000000,?,006810EE,?,?,006836B9), ref: 00675EAD
                                                              • Part of subcall function 00680FAE: RegCloseKey.ADVAPI32(?,?,0068112D,?,?,006836B9), ref: 00680FB8
                                                            Strings
                                                            • ServiceDll, xrefs: 0067DA03
                                                            • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 0067D9C2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$CloseFreeOpenValueVirtuallstrcpy
                                                            • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll
                                                            • API String ID: 2854241163-387424650
                                                            • Opcode ID: 3eab7c516cc63ca84e2499e10c100de3c87fae6bb7457bb20530ad5fba9776c4
                                                            • Instruction ID: ba462b12383050432b8d2097c214a4c980fad2912f179d0feaed35020ab4d4b8
                                                            • Opcode Fuzzy Hash: 3eab7c516cc63ca84e2499e10c100de3c87fae6bb7457bb20530ad5fba9776c4
                                                            • Instruction Fuzzy Hash: 39111F75900218ABDB54EBA1CC96CFEBB7AEF94700F40855DE90672281DB705B45CB64
                                                            APIs
                                                              • Part of subcall function 00671085: GetProcessHeap.KERNEL32(00000000,?,00681E36,00400000,?,?,00000000,?,?,0068349D), ref: 0067108B
                                                              • Part of subcall function 00671085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,0068349D), ref: 00671092
                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000100,?,?,?,?,?,?,?,00000000,75A901C0,00000000,00683628), ref: 00683008
                                                            • WinExec.KERNEL32(00000000,00000000), ref: 0068304E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateExecFileModuleNameProcess
                                                            • String ID: powershell Add-MpPreference -ExclusionPath
                                                            • API String ID: 1183730998-2194938034
                                                            • Opcode ID: 1457e9d272e5c6d6467992e1f30ba1e497c600221250ba9b630e76bf775a39a4
                                                            • Instruction ID: 979315397b2c702c3b96eec3d6edbc6e19b2c1870d17bee5d4a45b40e05851f7
                                                            • Opcode Fuzzy Hash: 1457e9d272e5c6d6467992e1f30ba1e497c600221250ba9b630e76bf775a39a4
                                                            • Instruction Fuzzy Hash: B9F0F6B155021076E26073785CCBFBF5A9ECF8BB51F00402BF60CED182EE689D8142B9
                                                            APIs
                                                            • send.WS2_32(00683CC7,IOg,?,00000000), ref: 00675608
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2923038427.0000000000671000.00000020.00000001.01000000.00000005.sdmp, Offset: 00670000, based on PE: true
                                                            • Associated: 00000001.00000002.2923014214.0000000000670000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923060782.0000000000684000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.0000000000689000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923077213.00000000007BD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000001.00000002.2923138503.00000000007BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_670000_images.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: send
                                                            • String ID: IOg$warzone160
                                                            • API String ID: 2809346765-1861354328
                                                            • Opcode ID: f4027f4669a57158f80fe3a2cfc647404f4a022c4ed1da06ee46d7d2c6b69326
                                                            • Instruction ID: 0f1880948af25721fe46c39e60f3a498405349c542084f584b332f3281cb625d
                                                            • Opcode Fuzzy Hash: f4027f4669a57158f80fe3a2cfc647404f4a022c4ed1da06ee46d7d2c6b69326
                                                            • Instruction Fuzzy Hash: 4801D271900019BBCB04FBA4DC42CEEB73AEF10320B10836DF02A622D1EF60AF0496A4