Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hb21QzBgft.exe

Overview

General Information

Sample name:hb21QzBgft.exe
renamed because original name is a hash value
Original sample name:3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab.exe
Analysis ID:1547536
MD5:e94753e8a792b65ce7765c83e7d901e9
SHA1:b007cc3dde9c3eb45a2da18fac939d51c80e641b
SHA256:3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab
Tags:AveMariaRATcdt2023-ddns-netexeuser-JAMESWT_MHT
Infos:

Detection

AveMaria, UACMe
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AveMaria stealer
Yara detected UACMe UAC Bypass tool
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Machine Learning detection for sample
Contains functionality to create new users
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • hb21QzBgft.exe (PID: 1440 cmdline: "C:\Users\user\Desktop\hb21QzBgft.exe" MD5: E94753E8A792B65CE7765C83E7D901E9)
  • hb21QzBgft.exe (PID: 6004 cmdline: "C:\Users\user\Desktop\hb21QzBgft.exe" MD5: E94753E8A792B65CE7765C83E7D901E9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Ave Maria, AveMariaRAT, avemariaInformation stealer which uses AutoIT for wrapping.
  • Anunak
https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria
NameDescriptionAttributionBlogpost URLsLink
UACMeA toolkit maintained by hfiref0x which incorporates numerous UAC bypass techniques for Windows 7 - Windows 10. Typically, components of this tool are stripped out and reused by malicious actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.uacme
{"C2 url": "chromedata.accesscam.org", "port": 5222, "Proxy Port": 67}
SourceRuleDescriptionAuthorStrings
hb21QzBgft.exeJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
    hb21QzBgft.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      hb21QzBgft.exeJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
        hb21QzBgft.exeWindows_Trojan_AveMaria_31d2bce9unknownunknown
        • 0x16630:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
        • 0x14e78:$a2: SMTP Password
        • 0x140b8:$a3: select signon_realm, origin_url, username_value, password_value from logins
        • 0x191f0:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        • 0x16538:$a5: for /F "usebackq tokens=*" %%A in ("
        • 0x148a8:$a6: \Torch\User Data\Default\Login Data
        • 0x19310:$a7: /n:%temp%\ellocnak.xml
        • 0x15414:$a8: "os_crypt":{"encrypted_key":"
        • 0x19340:$a9: Hey I'm Admin
        • 0x14d40:$a10: \logins.json
        • 0x1538c:$a11: Accounts\Account.rec0
        • 0x13c50:$a12: warzone160
        • 0x162e0:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
        hb21QzBgft.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x144e8:$a1: \Opera Software\Opera Stable\Login Data
        • 0x14810:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x14158:$a3: \Google\Chrome\User Data\Default\Login Data
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        00000002.00000000.2153744904.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
          00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
            00000002.00000002.2164545039.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
              00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
                  Click to see the 32 entries
                  SourceRuleDescriptionAuthorStrings
                  0.3.hb21QzBgft.exe.1086838.3.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                    0.3.hb21QzBgft.exe.1086838.3.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
                    • 0xb18:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
                    0.2.hb21QzBgft.exe.30fb490.2.raw.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                      0.2.hb21QzBgft.exe.30fb490.2.raw.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
                      • 0xd80:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
                      0.3.hb21QzBgft.exe.1086838.0.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
                        Click to see the 55 entries

                        System Summary

                        barindex
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Desktop\hb21QzBgft.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\hb21QzBgft.exe, ProcessId: 1440, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CClean
                        Source: Registry Key setAuthor: frack113: Data: Details: 10, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\hb21QzBgft.exe, ProcessId: 1440, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\MaxConnectionsPer1_0Server
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-02T16:56:45.252171+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549707TCP
                        2024-11-02T16:57:24.185503+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549905TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: hb21QzBgft.exeAvira: detected
                        Source: hb21QzBgft.exeMalware Configuration Extractor: AveMaria {"C2 url": "chromedata.accesscam.org", "port": 5222, "Proxy Port": 67}
                        Source: hb21QzBgft.exeReversingLabs: Detection: 89%
                        Source: Yara matchFile source: hb21QzBgft.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: hb21QzBgft.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDB15E lstrlenA,CryptStringToBinaryA,lstrcpyA,0_2_00DDB15E
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDCAFC CryptUnprotectData,LocalAlloc,LocalFree,0_2_00DDCAFC
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDCCB4 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,0_2_00DDCCB4
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDCC54 CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,0_2_00DDCC54
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDA632 RegQueryValueExW,GlobalAlloc,CryptUnprotectData,lstrcpyW,0_2_00DDA632
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDCF58 LocalAlloc,BCryptDecrypt,LocalFree,0_2_00DDCF58

                        Exploits

                        barindex
                        Source: Yara matchFile source: hb21QzBgft.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1086838.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.30fb490.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1086838.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1084fc8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1087dd0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1086838.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1086838.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.2c21490.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1087dd0.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1086838.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1087dd0.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.hb21QzBgft.exe.1086838.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2153744904.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164545039.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062030837.0000000001085000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2045348214.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2061962654.000000000107C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062078035.0000000001085000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: hb21QzBgft.exe PID: 1440, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: hb21QzBgft.exe PID: 6004, type: MEMORYSTR
                        Source: hb21QzBgft.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
                        Source: hb21QzBgft.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD9DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,0_2_00DD9DF6
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDFF27 FindFirstFileW,FindNextFileW,0_2_00DDFF27
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE002B GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,0_2_00DE002B

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: chromedata.accesscam.org
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD27D3 URLDownloadToFileW,ShellExecuteW,0_2_00DD27D3
                        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 128.90.129.125:5222
                        Source: Joe Sandbox ViewIP Address: 128.90.129.125 128.90.129.125
                        Source: Joe Sandbox ViewASN Name: PHMGMT-AS1US PHMGMT-AS1US
                        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49707
                        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49905
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD562F setsockopt,recv,recv,0_2_00DD562F
                        Source: global trafficDNS traffic detected: DNS query: chromedata.accesscam.org
                        Source: hb21QzBgft.exeString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeper
                        Source: hb21QzBgft.exeString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD89D5 GetAsyncKeyState,wsprintfW,GetAsyncKeyState,wsprintfW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyNameTextW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,CallNextHookEx,0_2_00DD89D5
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD902E DefWindowProcA,GetRawInputData,GetRawInputData,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrcpyW,CreateFileW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,CloseHandle,PostQuitMessage,RegisterRawInputDevices,0_2_00DD902E

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: hb21QzBgft.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

                        System Summary

                        barindex
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: AveMaria_WarZone Author: unknown
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                        Source: 0.3.hb21QzBgft.exe.1086838.3.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.2.hb21QzBgft.exe.30fb490.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1086838.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1084fc8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1087dd0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1086838.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1086838.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                        Source: 2.2.hb21QzBgft.exe.2c21490.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1087dd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1086838.8.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1087dd0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.3.hb21QzBgft.exe.1086838.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
                        Source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE1BF80_2_00DE1BF8
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: String function: 00DD35E5 appears 40 times
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: String function: 00DE0969 appears 47 times
                        Source: hb21QzBgft.exeStatic PE information: Resource name: WM_DSP type: PE32 executable (GUI) Intel 80386, for MS Windows
                        Source: hb21QzBgft.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                        Source: hb21QzBgft.exe, type: SAMPLEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                        Source: 0.3.hb21QzBgft.exe.1086838.3.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.2.hb21QzBgft.exe.30fb490.2.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1086838.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1084fc8.1.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1087dd0.4.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1086838.3.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1086838.0.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                        Source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                        Source: 2.2.hb21QzBgft.exe.2c21490.2.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1087dd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1086838.8.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1087dd0.7.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.3.hb21QzBgft.exe.1086838.8.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                        Source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                        Source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                        Source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
                        Source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winEXE@2/0@2/1
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDF619 OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_00DDF619
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE20B8 RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_00DE20B8
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE290F CoInitialize,CoCreateInstance,VariantInit,CoUninitialize,0_2_00DE290F
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE30B3 LoadResource,SizeofResource,LockResource,GetTempPathA,GetTempPathA,lstrcatA,lstrcatA,GetTempPathA,lstrcatA,CreateFileA,WriteFile,CloseHandle,wsprintfA,ShellExecuteExA,0_2_00DE30B3
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDD49C OpenSCManagerW,OpenServiceW,CloseServiceHandle,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00DDD49C
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeFile created: C:\Program Files\Microsoft DN1Jump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeFile created: C:\Users\user\AppData\Local\Microsoft Vision\Jump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeMutant created: NULL
                        Source: hb21QzBgft.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: hb21QzBgft.exeReversingLabs: Detection: 89%
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeFile read: C:\Users\user\Desktop\hb21QzBgft.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\hb21QzBgft.exe "C:\Users\user\Desktop\hb21QzBgft.exe"
                        Source: unknownProcess created: C:\Users\user\Desktop\hb21QzBgft.exe "C:\Users\user\Desktop\hb21QzBgft.exe"
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: samcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: devenum.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: devobj.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: msdmo.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: avicap32.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: msvfw32.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: samcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: devenum.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: devobj.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: msdmo.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: avicap32.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeSection loaded: msvfw32.dllJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
                        Source: hb21QzBgft.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: hb21QzBgft.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDFA42 LoadLibraryA,GetProcAddress,0_2_00DDFA42
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD1190 push eax; ret 0_2_00DD11A4
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD1190 push eax; ret 0_2_00DD11CC
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDD418 NetUserAdd,NetLocalGroupAddMembers,0_2_00DDD418
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD27D3 URLDownloadToFileW,ShellExecuteW,0_2_00DD27D3
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDAC0A lstrcatW,GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,0_2_00DDAC0A
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDA6C8 GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,0_2_00DDA6C8
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDD508 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,GetLastError,Sleep,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00DDD508
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CCleanJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CCleanJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: hb21QzBgft.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exe, 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exe, 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: hb21QzBgft.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: hb21QzBgft.exeString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeFile opened: C:\Users\user\Desktop\hb21QzBgft.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: OpenSCManagerW,EnumServicesStatusExW,EnumServicesStatusExW,GetLastError,CloseServiceHandle,OpenSCManagerW,lstrcmpW,0_2_00DDDA5B
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-12832
                        Source: C:\Users\user\Desktop\hb21QzBgft.exe TID: 3176Thread sleep count: 60 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exe TID: 3176Thread sleep time: -100000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exe TID: 5972Thread sleep count: 60 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD9DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,0_2_00DD9DF6
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDFF27 FindFirstFileW,FindNextFileW,0_2_00DDFF27
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE002B GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,0_2_00DE002B
                        Source: hb21QzBgft.exe, 00000000.00000002.3314715175.000000000107C000.00000004.00000020.00020000.00000000.sdmp, hb21QzBgft.exe, 00000000.00000003.2062112969.000000000107C000.00000004.00000020.00020000.00000000.sdmp, hb21QzBgft.exe, 00000000.00000003.2061962654.000000000107C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllm
                        Source: hb21QzBgft.exe, 00000002.00000003.2163912789.0000000000AB4000.00000004.00000020.00020000.00000000.sdmp, hb21QzBgft.exe, 00000002.00000003.2164083077.0000000000AB5000.00000004.00000020.00020000.00000000.sdmp, hb21QzBgft.exe, 00000002.00000003.2164038364.0000000000AB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeAPI call chain: ExitProcess graph end nodegraph_0-8613
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeAPI call chain: ExitProcess graph end nodegraph_0-11767
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDFA42 LoadLibraryA,GetProcAddress,0_2_00DDFA42
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE094E mov eax, dword ptr fs:[00000030h]0_2_00DE094E
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE0619 mov eax, dword ptr fs:[00000030h]0_2_00DE0619
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE0620 mov eax, dword ptr fs:[00000030h]0_2_00DE0620
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD1085 GetProcessHeap,RtlAllocateHeap,0_2_00DD1085

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD79E8 OpenProcess,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,0_2_00DD79E8
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE1FD8 RegSetValueExA,OpenProcess,GetCurrentProcessId,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,0_2_00DE1FD8
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, explorer.exe0_2_00DE20B8
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DE18BA InitializeSecurityDescriptor,SetSecurityDescriptorDacl,RegCreateKeyExA,RegCloseKey,SetLastError,0_2_00DE18BA
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDF56D AllocateAndInitializeSid,LookupAccountSidW,GetLastError,FreeSid,0_2_00DDF56D
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DDF93F cpuid 0_2_00DDF93F
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: 0_2_00DD882F GetModuleHandleA,SHGetFolderPathW,lstrcatW,lstrcatW,GetLocalTime,wsprintfW,lstrcatW,CreateFileW,CloseHandle,GetMessageA,TranslateMessage,DispatchMessageA,GetMessageA,0_2_00DD882F

                        Lowering of HIPS / PFW / Operating System Security Settings

                        barindex
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings MaxConnectionsPerServer 10Jump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: hb21QzBgft.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: \Google\Chrome\User Data\Default\Login Data0_2_00DDC1B2
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: \Chromium\User Data\Default\Login Data0_2_00DDC1B2
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: POP3 Password0_2_00DDA29A
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: SMTP Password0_2_00DDA29A
                        Source: C:\Users\user\Desktop\hb21QzBgft.exeCode function: IMAP Password0_2_00DDA29A
                        Source: Yara matchFile source: hb21QzBgft.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: hb21QzBgft.exe PID: 1440, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: hb21QzBgft.exe PID: 6004, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: hb21QzBgft.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.hb21QzBgft.exe.dd0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        2
                        OS Credential Dumping
                        1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        21
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        Endpoint Denial of Service
                        CredentialsDomainsDefault Accounts2
                        Service Execution
                        1
                        Create Account
                        1
                        Access Token Manipulation
                        2
                        Obfuscated Files or Information
                        21
                        Input Capture
                        1
                        System Service Discovery
                        Remote Desktop Protocol21
                        Input Capture
                        2
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAt1
                        Windows Service
                        1
                        Windows Service
                        1
                        DLL Side-Loading
                        1
                        Credentials In Files
                        2
                        File and Directory Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCron1
                        Registry Run Keys / Startup Folder
                        111
                        Process Injection
                        3
                        Masquerading
                        NTDS12
                        System Information Discovery
                        Distributed Component Object ModelInput Capture1
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                        Registry Run Keys / Startup Folder
                        1
                        Virtualization/Sandbox Evasion
                        LSA Secrets11
                        Security Software Discovery
                        SSHKeylogging11
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Access Token Manipulation
                        Cached Domain Credentials1
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                        Process Injection
                        DCSync1
                        Process Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Hidden Files and Directories
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        Hidden Users
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        hb21QzBgft.exe89%ReversingLabsWin32.Backdoor.Remcos
                        hb21QzBgft.exe100%AviraTR/Redcap.ghjpt
                        hb21QzBgft.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        chromedata.accesscam.org
                        128.90.129.125
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          chromedata.accesscam.orgtrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://github.com/syohex/java-simple-mine-sweeperC:hb21QzBgft.exefalse
                              unknown
                              https://github.com/syohex/java-simple-mine-sweeperhb21QzBgft.exefalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                128.90.129.125
                                chromedata.accesscam.orgUnited States
                                22363PHMGMT-AS1UStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1547536
                                Start date and time:2024-11-02 16:55:36 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 4m 10s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:hb21QzBgft.exe
                                renamed because original name is a hash value
                                Original Sample Name:3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab.exe
                                Detection:MAL
                                Classification:mal100.phis.troj.spyw.expl.evad.winEXE@2/0@2/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 35
                                • Number of non-executed functions: 89
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • VT rate limit hit for: hb21QzBgft.exe
                                TimeTypeDescription
                                16:56:29AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run CClean C:\Users\user\Desktop\hb21QzBgft.exe
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                128.90.129.125uVyl5BbR2M.exeGet hashmaliciousAsyncRATBrowse
                                  ahMvIr4vjN.exeGet hashmaliciousAsyncRATBrowse
                                    WlewaiA251.exeGet hashmaliciousAsyncRATBrowse
                                      meORoynQKS.exeGet hashmaliciousArrowRATBrowse
                                        OeyoNPTUuj.exeGet hashmaliciousAsyncRATBrowse
                                          NUO7hWbWCz.exeGet hashmaliciousAsyncRATBrowse
                                            nRfBYvq4io.exeGet hashmaliciousAsyncRATBrowse
                                              uqBq7FwS83.exeGet hashmaliciousAsyncRATBrowse
                                                YTrJ5NViJC.exeGet hashmaliciousNjratBrowse
                                                  XprhPg52TO.exeGet hashmaliciousAsyncRATBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    chromedata.accesscam.orguVyl5BbR2M.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    ahMvIr4vjN.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    WlewaiA251.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    meORoynQKS.exeGet hashmaliciousArrowRATBrowse
                                                    • 128.90.129.125
                                                    OeyoNPTUuj.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    NUO7hWbWCz.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    nRfBYvq4io.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    uqBq7FwS83.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    YTrJ5NViJC.exeGet hashmaliciousNjratBrowse
                                                    • 128.90.129.125
                                                    XprhPg52TO.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    PHMGMT-AS1USuVyl5BbR2M.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    ahMvIr4vjN.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    WlewaiA251.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    meORoynQKS.exeGet hashmaliciousArrowRATBrowse
                                                    • 128.90.129.125
                                                    OeyoNPTUuj.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    NUO7hWbWCz.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    nRfBYvq4io.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    uqBq7FwS83.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    YTrJ5NViJC.exeGet hashmaliciousNjratBrowse
                                                    • 128.90.129.125
                                                    XprhPg52TO.exeGet hashmaliciousAsyncRATBrowse
                                                    • 128.90.129.125
                                                    No context
                                                    No context
                                                    No created / dropped files found
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.375556012562547
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:hb21QzBgft.exe
                                                    File size:115'712 bytes
                                                    MD5:e94753e8a792b65ce7765c83e7d901e9
                                                    SHA1:b007cc3dde9c3eb45a2da18fac939d51c80e641b
                                                    SHA256:3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab
                                                    SHA512:1a572de1861f2e6487ee60ea9102ea8443d057ae9c00b53242719e1835f56d22e3eed3ac6999408b7b2a6902cf432ed23074968ad5d0f2907ffc70645812af6a
                                                    SSDEEP:1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0
                                                    TLSH:7BB39E13F7E54835F3B201B01ABD7E7ACBEDF9700628C49FA394858A2D31946E925397
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z]..><..><..><...3..?<..7D..?<...3..<<......?<......=<..;0..?<..7D..:<..7D..!<..><...<...U..N<...Um.?<...U..?<..Rich><.........
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x405ce2
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x5F49FB9C [Sat Aug 29 06:54:20 2020 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:51a1d638436da72d7fa5fb524e02d427
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    sub esp, 44h
                                                    push esi
                                                    call dword ptr [004141E8h]
                                                    mov ecx, eax
                                                    mov al, byte ptr [ecx]
                                                    cmp al, 22h
                                                    jne 00007F62A4DDD12Ah
                                                    inc ecx
                                                    mov dl, byte ptr [ecx]
                                                    test dl, dl
                                                    je 00007F62A4DDD113h
                                                    mov al, dl
                                                    mov dl, al
                                                    cmp al, 22h
                                                    je 00007F62A4DDD10Bh
                                                    inc ecx
                                                    mov dl, byte ptr [ecx]
                                                    mov al, dl
                                                    test dl, dl
                                                    jne 00007F62A4DDD0F3h
                                                    lea eax, dword ptr [ecx+01h]
                                                    cmp dl, 00000022h
                                                    cmovne eax, ecx
                                                    mov ecx, eax
                                                    jmp 00007F62A4DDD110h
                                                    inc ecx
                                                    mov al, byte ptr [ecx]
                                                    cmp al, 20h
                                                    jnle 00007F62A4DDD0FBh
                                                    jmp 00007F62A4DDD109h
                                                    cmp al, 20h
                                                    jnle 00007F62A4DDD109h
                                                    inc ecx
                                                    mov al, byte ptr [ecx]
                                                    test al, al
                                                    jne 00007F62A4DDD0F7h
                                                    and dword ptr [ebp-18h], 00000000h
                                                    lea eax, dword ptr [ebp-44h]
                                                    push eax
                                                    call dword ptr [00414140h]
                                                    call 00007F62A4DDD132h
                                                    mov edx, 0041902Ch
                                                    mov ecx, 00419000h
                                                    call 00007F62A4DDD150h
                                                    push 00000000h
                                                    call dword ptr [004141ECh]
                                                    push ecx
                                                    push ecx
                                                    call 00007F62A4DEA7D9h
                                                    mov esi, eax
                                                    call 00007F62A4DDD122h
                                                    push esi
                                                    call dword ptr [004141F0h]
                                                    int3
                                                    mov dword ptr [0054DB64h], 00000020h
                                                    call 00007F62A4DDD014h
                                                    mov dword ptr [0054D0E4h], eax
                                                    ret
                                                    mov eax, dword ptr [0054E01Ch]
                                                    test eax, eax
                                                    je 00007F62A4DDD110h
                                                    mov ecx, dword ptr [0054D0E4h]
                                                    lea edx, dword ptr [ecx+eax*4]
                                                    jmp 00007F62A4DDD106h
                                                    ret
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    mov edi, ecx
                                                    mov esi, edx
                                                    sub esi, edi
                                                    xor eax, eax
                                                    add esi, 00000000h
                                                    Programming Language:
                                                    • [C++] VS2008 SP1 build 30729
                                                    • [ C ] VS2005 build 50727
                                                    • [C++] VS2005 build 50727
                                                    • [ASM] VS2003 (.NET) build 3077
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1771c0x118.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x14f0000x2c70.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1520000xfa8.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x175a00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x140000x370.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x12eab0x130006dbe7c9f7981297db465fd69821e1c4bFalse0.5748226768092105data6.494947391542317IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x140000x49ce0x4a001271925bf242f5dd778122d822dac6d9False0.40466638513513514data5.281541653463336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x190000x1350d80x6000e383bc5047fd3f1a7a5e78591f96b14False0.5709635416666666data4.992963293914077IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x14f0000x2c700x2e00cdd112e1df434d31179f9eee936b7ff7False0.32778532608695654data3.9587156670856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x1520000xfa80x1000d7f0f9f1a21533bcdc70c4c071cede21False0.83251953125data6.690653232264333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    .bss0x1530000x10000x2006bf023baf38d049837478ef4940a09e0False0.37109375data3.1246956947790547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    WM_DSP0x14f0700x2c00PE32 executable (GUI) Intel 80386, for MS WindowsEnglishIndia0.3400213068181818
                                                    DLLImport
                                                    bcrypt.dllBCryptSetProperty, BCryptGenerateSymmetricKey, BCryptOpenAlgorithmProvider, BCryptDecrypt
                                                    KERNEL32.dllHeapFree, VirtualAlloc, HeapReAlloc, VirtualQuery, TerminateThread, CreateThread, WriteProcessMemory, GetCurrentProcess, OpenProcess, GetWindowsDirectoryA, VirtualProtectEx, VirtualAllocEx, CreateRemoteThread, CreateProcessA, GetModuleHandleW, IsWow64Process, WriteFile, CreateFileW, LoadLibraryW, GetLocalTime, GetCurrentThreadId, GetCurrentProcessId, ReadFile, FindFirstFileA, GetBinaryTypeW, FindNextFileA, GetFullPathNameA, GetTempPathW, GetPrivateProfileStringW, CreateFileA, GlobalAlloc, GetCurrentDirectoryW, SetCurrentDirectoryW, GetFileSize, FreeLibrary, SetDllDirectoryW, GetFileSizeEx, LoadLibraryA, LocalFree, WaitForSingleObject, WaitForMultipleObjects, CreatePipe, PeekNamedPipe, DuplicateHandle, SetEvent, GetStartupInfoA, CreateEventA, GetModuleFileNameW, LoadResource, FindResourceW, GetComputerNameW, GlobalMemoryStatusEx, LoadLibraryExW, FindFirstFileW, FindNextFileW, SetFilePointer, GetLogicalDriveStringsW, DeleteFileW, CopyFileW, GetDriveTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, GetProcessHeap, ReleaseMutex, TerminateProcess, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, SizeofResource, VirtualProtect, GetSystemDirectoryW, LockResource, GetWindowsDirectoryW, Process32First, Process32Next, WinExec, GetTempPathA, HeapAlloc, lstrcmpW, GetTickCount, lstrcpyW, WideCharToMultiByte, lstrcpyA, Sleep, MultiByteToWideChar, GetCommandLineA, GetModuleHandleA, ExitProcess, CreateProcessW, lstrcatA, lstrcmpA, lstrlenA, ExpandEnvironmentStringsW, lstrlenW, CloseHandle, lstrcatW, GetLastError, VirtualFree, GetProcAddress, SetLastError, GetModuleFileNameA, CreateDirectoryW, LocalAlloc, CreateMutexA
                                                    USER32.dllGetKeyState, GetMessageA, DispatchMessageA, CreateWindowExW, CallNextHookEx, GetAsyncKeyState, RegisterClassW, GetRawInputData, MapVirtualKeyA, DefWindowProcA, RegisterRawInputDevices, TranslateMessage, GetForegroundWindow, GetKeyNameTextW, PostQuitMessage, MessageBoxA, GetLastInputInfo, wsprintfW, GetWindowTextW, wsprintfA, ToUnicode
                                                    ADVAPI32.dllRegDeleteKeyW, RegCreateKeyExW, RegSetValueExA, RegDeleteValueW, LookupPrivilegeValueW, AdjustTokenPrivileges, AllocateAndInitializeSid, OpenProcessToken, InitializeSecurityDescriptor, RegDeleteKeyA, SetSecurityDescriptorDacl, RegOpenKeyExW, RegOpenKeyExA, RegEnumKeyExW, RegQueryValueExA, RegQueryInfoKeyW, RegCloseKey, OpenServiceW, ChangeServiceConfigW, QueryServiceConfigW, EnumServicesStatusExW, StartServiceW, RegSetValueExW, RegCreateKeyExA, OpenSCManagerW, CloseServiceHandle, GetTokenInformation, LookupAccountSidW, FreeSid, RegQueryValueExW
                                                    SHELL32.dllShellExecuteExA, ShellExecuteExW, SHGetSpecialFolderPathW, SHCreateDirectoryExW, ShellExecuteW, SHGetFolderPathW, SHGetKnownFolderPath
                                                    urlmon.dllURLDownloadToFileW
                                                    WS2_32.dllhtons, recv, connect, socket, send, WSAStartup, shutdown, closesocket, WSACleanup, InetNtopW, gethostbyname, inet_addr, getaddrinfo, setsockopt, freeaddrinfo
                                                    ole32.dllCoInitializeSecurity, CoCreateInstance, CoInitialize, CoUninitialize, CoTaskMemFree
                                                    SHLWAPI.dllStrStrW, PathRemoveFileSpecA, StrStrA, PathCombineA, PathFindFileNameW, PathFileExistsW, PathFindExtensionW
                                                    NETAPI32.dllNetLocalGroupAddMembers, NetUserAdd
                                                    OLEAUT32.dllVariantInit
                                                    CRYPT32.dllCryptUnprotectData, CryptStringToBinaryA, CryptStringToBinaryW
                                                    PSAPI.DLLGetModuleFileNameExW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishIndia
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-11-02T16:56:45.252171+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549707TCP
                                                    2024-11-02T16:57:24.185503+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549905TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 2, 2024 16:56:30.299602032 CET497045222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:30.304557085 CET522249704128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:30.304692030 CET497045222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:31.148051023 CET522249704128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:31.148220062 CET497045222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:36.150094032 CET497055222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:36.155019045 CET522249705128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:36.155127048 CET497055222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:36.990180969 CET522249705128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:36.990356922 CET497055222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:41.993783951 CET497065222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:41.999008894 CET522249706128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:41.999166012 CET497065222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:42.846821070 CET522249706128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:42.846885920 CET497065222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:47.853573084 CET497185222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:47.858778000 CET522249718128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:47.861443996 CET497185222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:48.791198969 CET522249718128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:48.791331053 CET497185222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:53.807893991 CET497495222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:53.812752008 CET522249749128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:53.812956095 CET497495222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:54.653049946 CET522249749128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:54.653153896 CET497495222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:59.668231964 CET497795222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:56:59.673396111 CET522249779128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:56:59.673978090 CET497795222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:00.507580042 CET522249779128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:00.507819891 CET497795222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:05.519788980 CET498105222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:05.524853945 CET522249810128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:05.524928093 CET498105222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:06.373466969 CET522249810128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:06.373635054 CET498105222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:11.384190083 CET498425222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:11.389272928 CET522249842128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:11.389347076 CET498425222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:12.237132072 CET522249842128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:12.237323999 CET498425222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:17.243484974 CET498745222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:17.248413086 CET522249874128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:17.248524904 CET498745222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:18.085475922 CET522249874128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:18.085669041 CET498745222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:23.087205887 CET499085222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:23.092097044 CET522249908128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:23.092161894 CET499085222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:23.934256077 CET522249908128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:23.934360027 CET499085222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:28.946639061 CET499415222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:28.953725100 CET522249941128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:28.953850031 CET499415222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:29.806833029 CET522249941128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:29.806987047 CET499415222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:34.821686029 CET499705222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:34.826622963 CET522249970128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:34.826716900 CET499705222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:35.651884079 CET522249970128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:35.651958942 CET499705222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:40.665509939 CET499875222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:40.671502113 CET522249987128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:40.671631098 CET499875222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:41.522726059 CET522249987128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:41.522882938 CET499875222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:46.524759054 CET499885222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:47.005861998 CET522249988128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:47.005940914 CET499885222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:47.875472069 CET522249988128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:47.875633001 CET499885222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:52.884236097 CET499895222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:52.889365911 CET522249989128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:52.889473915 CET499895222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:53.734366894 CET522249989128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:53.734451056 CET499895222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:58.743829966 CET499905222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:58.748621941 CET522249990128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:58.748703957 CET499905222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:57:59.594101906 CET522249990128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:57:59.594170094 CET499905222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:04.602926970 CET499915222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:04.607868910 CET522249991128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:04.608074903 CET499915222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:05.467264891 CET522249991128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:05.467360020 CET499915222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:10.477943897 CET499925222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:10.483726978 CET522249992128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:10.483814955 CET499925222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:11.333164930 CET522249992128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:11.333267927 CET499925222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:16.337829113 CET499935222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:16.342709064 CET522249993128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:16.342809916 CET499935222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:17.199736118 CET522249993128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:17.205605984 CET499935222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:22.213025093 CET499945222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:22.218453884 CET522249994128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:22.218528032 CET499945222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:23.074675083 CET522249994128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:23.074778080 CET499945222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:28.087347031 CET499955222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:28.092451096 CET522249995128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:28.092582941 CET499955222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:28.953320980 CET522249995128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:28.953440905 CET499955222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:34.123712063 CET499965222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:34.129797935 CET522249996128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:34.129971027 CET499965222192.168.2.5128.90.129.125
                                                    Nov 2, 2024 16:58:34.977895021 CET522249996128.90.129.125192.168.2.5
                                                    Nov 2, 2024 16:58:34.978034019 CET499965222192.168.2.5128.90.129.125
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 2, 2024 16:56:30.149367094 CET5233153192.168.2.51.1.1.1
                                                    Nov 2, 2024 16:56:30.296305895 CET53523311.1.1.1192.168.2.5
                                                    Nov 2, 2024 16:58:33.994203091 CET6276853192.168.2.51.1.1.1
                                                    Nov 2, 2024 16:58:34.122656107 CET53627681.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Nov 2, 2024 16:56:30.149367094 CET192.168.2.51.1.1.10xe8ccStandard query (0)chromedata.accesscam.orgA (IP address)IN (0x0001)false
                                                    Nov 2, 2024 16:58:33.994203091 CET192.168.2.51.1.1.10x6c9eStandard query (0)chromedata.accesscam.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Nov 2, 2024 16:56:30.296305895 CET1.1.1.1192.168.2.50xe8ccNo error (0)chromedata.accesscam.org128.90.129.125A (IP address)IN (0x0001)false
                                                    Nov 2, 2024 16:58:34.122656107 CET1.1.1.1192.168.2.50x6c9eNo error (0)chromedata.accesscam.org128.90.129.125A (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:11:56:26
                                                    Start date:02/11/2024
                                                    Path:C:\Users\user\Desktop\hb21QzBgft.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\hb21QzBgft.exe"
                                                    Imagebase:0xdd0000
                                                    File size:115'712 bytes
                                                    MD5 hash:E94753E8A792B65CE7765C83E7D901E9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.2062030837.0000000001085000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000000.2045348214.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.2061962654.000000000107C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000003.2062078035.0000000001085000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.2061962654.0000000001074000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000000.2045107278.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000002.3314934510.00000000030E3000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000003.2062112969.000000000106F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:2
                                                    Start time:11:56:37
                                                    Start date:02/11/2024
                                                    Path:C:\Users\user\Desktop\hb21QzBgft.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\hb21QzBgft.exe"
                                                    Imagebase:0xdd0000
                                                    File size:115'712 bytes
                                                    MD5 hash:E94753E8A792B65CE7765C83E7D901E9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000002.00000000.2153744904.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000002.00000002.2164545039.0000000000F1F000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000002.00000000.2153677162.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000002.00000002.2164573446.0000000002C09000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000002.00000002.2164475001.0000000000DE4000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:10.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:6%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:70
                                                      execution_graph 13046 dd37d7 13047 de1dc0 11 API calls 13046->13047 13048 dd37ef 13047->13048 13049 dd3437 3 API calls 13048->13049 13050 dd37f9 13049->13050 13053 dd5ea5 VirtualFree 13050->13053 13052 dd3801 13053->13052 8615 dd9fce 8616 dd9fd9 8615->8616 8617 dd5ea5 VirtualFree 8615->8617 8618 dd11fe 8621 de3b3c 8618->8621 8694 dd2550 8621->8694 8624 dd2550 VirtualAlloc 8625 de3b59 8624->8625 8626 dd2550 VirtualAlloc 8625->8626 8627 de3b63 8626->8627 8628 dd2550 VirtualAlloc 8627->8628 8629 de3b6d 8628->8629 8630 dd2550 VirtualAlloc 8629->8630 8631 de3b77 8630->8631 8632 dd2550 VirtualAlloc 8631->8632 8633 de3b81 8632->8633 8697 dd1085 GetProcessHeap RtlAllocateHeap 8633->8697 8635 de3ba8 8698 dd1085 GetProcessHeap RtlAllocateHeap 8635->8698 8637 de3bb1 8699 dd1085 GetProcessHeap RtlAllocateHeap 8637->8699 8639 de3bba 8700 dd1085 GetProcessHeap RtlAllocateHeap 8639->8700 8641 de3bc3 8701 dd1085 GetProcessHeap RtlAllocateHeap 8641->8701 8643 de3bcd 8702 dd1085 GetProcessHeap RtlAllocateHeap 8643->8702 8645 de3bd7 8703 de1ce2 8645->8703 8648 de1ce2 2 API calls 8649 de3be8 8648->8649 8650 de1ce2 2 API calls 8649->8650 8651 de3bef 8650->8651 8652 de1ce2 2 API calls 8651->8652 8653 de3bf7 8652->8653 8654 de1ce2 2 API calls 8653->8654 8655 de3bff 8654->8655 8656 de1ce2 2 API calls 8655->8656 8657 de3c07 8656->8657 8707 dd33bf lstrlenA 8657->8707 8661 de3c1e 8715 dd5ea5 VirtualFree 8661->8715 8663 de3c26 8664 dd33bf 4 API calls 8663->8664 8665 de3c30 8664->8665 8666 ddfda5 5 API calls 8665->8666 8667 de3c3b 8666->8667 8716 dd5ea5 VirtualFree 8667->8716 8669 de3c43 8670 dd33bf 4 API calls 8669->8670 8671 de3c4d 8670->8671 8672 ddfda5 5 API calls 8671->8672 8673 de3c58 8672->8673 8717 dd5ea5 VirtualFree 8673->8717 8675 de3c60 8676 dd33bf 4 API calls 8675->8676 8677 de3c6c 8676->8677 8678 ddfda5 5 API calls 8677->8678 8679 de3c77 8678->8679 8718 dd5ea5 VirtualFree 8679->8718 8681 de3c7f 8682 dd33bf 4 API calls 8681->8682 8683 de3c8b 8682->8683 8684 ddfda5 5 API calls 8683->8684 8685 de3c96 8684->8685 8719 dd5ea5 VirtualFree 8685->8719 8687 de3c9e 8688 dd33bf 4 API calls 8687->8688 8689 de3caa 8688->8689 8690 ddfda5 5 API calls 8689->8690 8691 de3cb5 8690->8691 8720 dd5ea5 VirtualFree 8691->8720 8693 dd1203 8721 ddfdd1 8694->8721 8697->8635 8698->8637 8699->8639 8700->8641 8701->8643 8702->8645 8704 de1ce8 8703->8704 8706 de1d05 8704->8706 8729 de1d0c Sleep GetTickCount 8704->8729 8706->8648 8708 dd33ee 8707->8708 8709 dd33d2 lstrlenA 8707->8709 8712 ddfda5 8708->8712 8710 dd5e22 VirtualAlloc 8709->8710 8711 dd33e2 lstrcpyA 8710->8711 8711->8708 8730 dd3125 8712->8730 8715->8663 8716->8669 8717->8675 8718->8681 8719->8687 8720->8693 8724 dd31c3 8721->8724 8727 dd5e22 VirtualAlloc 8724->8727 8726 dd2563 8726->8624 8728 dd5e40 8727->8728 8728->8726 8729->8704 8738 dd5ea5 VirtualFree 8730->8738 8732 dd3133 8733 dd3157 CreateEventA 8732->8733 8739 dd3372 8732->8739 8733->8661 8735 dd3145 8736 dd5e22 VirtualAlloc 8735->8736 8737 dd314c lstrcatA 8736->8737 8737->8733 8738->8732 8740 dd3377 lstrlenA 8739->8740 8741 dd3381 8739->8741 8740->8735 8741->8735 8531 dd11ef 8534 de2408 8531->8534 8541 de0298 CreateMutexA 8534->8541 8536 de241d 8542 dd5f53 GetProcessHeap HeapAlloc 8536->8542 8538 de2425 8539 dd11f4 8538->8539 8543 de2ed4 8538->8543 8541->8536 8542->8538 8555 dd5f53 GetProcessHeap HeapAlloc 8543->8555 8545 de2ef4 8556 dd5f53 GetProcessHeap HeapAlloc 8545->8556 8547 de2f1e 8548 de2f2a 8547->8548 8566 de266a 8547->8566 8557 de290f CoInitialize CoCreateInstance 8548->8557 8552 de2f3c 8553 de2f4a 8552->8553 8569 de273a CoInitialize CoCreateInstance 8552->8569 8553->8539 8555->8545 8556->8547 8558 de2a66 8557->8558 8565 de294f 8557->8565 8558->8552 8558->8553 8559 de2a40 CoUninitialize 8559->8558 8561 de2996 VariantInit 8561->8565 8565->8558 8565->8559 8565->8561 8580 dd5f53 GetProcessHeap HeapAlloc 8565->8580 8581 de2bc7 8565->8581 8586 dd2481 8565->8586 8567 de2bc7 2 API calls 8566->8567 8568 de267b 8567->8568 8568->8548 8570 de2786 8569->8570 8571 de28aa CoUninitialize 8569->8571 8570->8571 8593 de2a6b 8570->8593 8571->8552 8574 de27b0 8574->8571 8575 de27b9 CoCreateInstance 8574->8575 8575->8571 8576 de27d7 8575->8576 8576->8571 8597 de24eb 8576->8597 8580->8565 8590 dd5df1 GetProcessHeap HeapAlloc 8581->8590 8583 de2bd2 8591 dd5df1 GetProcessHeap HeapAlloc 8583->8591 8585 de2bde 8585->8565 8587 dd2490 8586->8587 8589 dd24ad 8586->8589 8592 dd5f53 GetProcessHeap HeapAlloc 8587->8592 8589->8565 8590->8583 8591->8585 8592->8589 8607 de2447 CoInitialize CoCreateInstance 8593->8607 8595 de2a7d CoCreateInstance 8596 de2aa6 8595->8596 8596->8574 8598 de24f6 CoTaskMemFree 8597->8598 8599 de2505 8597->8599 8598->8599 8600 de2b2a 8599->8600 8610 dd5ca3 LoadLibraryA GetProcAddress 8600->8610 8603 dd5ca3 3 API calls 8604 de2b57 8603->8604 8605 dd5ca3 3 API calls 8604->8605 8606 de2b90 8605->8606 8606->8571 8608 de24df CoUninitialize 8607->8608 8609 de247b 8607->8609 8608->8595 8609->8608 8611 dd5ce1 8610->8611 8612 dd5cc2 8610->8612 8611->8603 8613 dd5cd9 ExitProcess 8612->8613 8614 dd5cc6 8612->8614 8614->8613 10730 de36e0 10731 dd1052 10730->10731 10732 de3701 SHGetFolderPathW lstrcatW 10731->10732 10733 dd346a 9 API calls 10732->10733 10734 de3737 10733->10734 10735 dd3761 7 API calls 10734->10735 10736 de3757 10735->10736 10737 dd3679 8 API calls 10736->10737 10738 de375e 10737->10738 10739 dd3665 2 API calls 10738->10739 10740 de3766 10739->10740 10743 dd5ea5 VirtualFree 10740->10743 10742 de376e 10743->10742 8875 dd5ce2 GetCommandLineA 8876 dd5cf7 GetStartupInfoA 8875->8876 8884 dd5d70 8876->8884 8879 dd5d43 8880 dd5d52 GetModuleHandleA 8879->8880 8887 de3435 8880->8887 8946 dd5c8e GetProcessHeap HeapAlloc 8884->8946 8886 dd5d7f 8886->8879 8888 de345b 8887->8888 8889 de3467 GetTickCount 8888->8889 8947 dd10ad 8889->8947 8891 de3473 GetModuleFileNameA 8948 de1e21 8891->8948 8893 de36ad 9313 de10d7 8893->9313 8895 de349d 8895->8893 8955 dd1085 GetProcessHeap RtlAllocateHeap 8895->8955 8900 de34c7 8901 de34e3 CreateEventA GetLastError 8900->8901 8901->8893 8902 de3506 8901->8902 8902->8893 8903 de3512 RegCreateKeyExA RegSetValueExA RegSetValueExA RegCloseKey 8902->8903 8956 dd5a10 Sleep 8903->8956 8946->8886 8947->8891 9331 dd1085 GetProcessHeap RtlAllocateHeap 8948->9331 8950 de1e36 CreateFileA 8951 de1e5e GetFileSize ReadFile 8950->8951 8952 de1e5b 8950->8952 8953 de1e7e CloseHandle 8951->8953 8954 de1e7c 8951->8954 8952->8951 8953->8895 8954->8953 8955->8900 9332 de044f 8956->9332 8958 dd5a34 9337 de0346 8958->9337 8961 dd33bf 4 API calls 8962 dd5a4f 8961->8962 9350 de02b9 8962->9350 8966 dd5a67 9362 dd304c 8966->9362 8968 dd5a73 9365 dd2e93 8968->9365 8970 dd5a7f 9369 dd3036 8970->9369 8977 dd3437 3 API calls 8978 dd5aad 8977->8978 9396 dd5ea5 VirtualFree 8978->9396 8980 dd5ab5 8981 de1dc0 11 API calls 8980->8981 8982 dd5ad4 8981->8982 8983 dd3437 3 API calls 8982->8983 8984 dd5ae1 8983->8984 9397 dd5ea5 VirtualFree 8984->9397 8986 dd5ae9 8987 de1dc0 11 API calls 8986->8987 8988 dd5b08 8987->8988 8989 dd3437 3 API calls 8988->8989 8990 dd5b15 8989->8990 9398 dd5ea5 VirtualFree 8990->9398 8992 dd5b1d 8993 de1dc0 11 API calls 8992->8993 8994 dd5b3c 8993->8994 8995 dd3437 3 API calls 8994->8995 8996 dd5b49 8995->8996 9399 dd5ea5 VirtualFree 8996->9399 8998 dd5b51 9314 de10e6 9313->9314 9315 de10e1 9313->9315 9317 dd5c16 3 API calls 9314->9317 9316 de0fae RegCloseKey 9315->9316 9316->9314 9318 de10ee 9317->9318 9972 dd5ea5 VirtualFree 9318->9972 9320 de10f6 9973 dd5ea5 VirtualFree 9320->9973 9322 de1101 9974 dd5ea5 VirtualFree 9322->9974 9324 de110c 9975 dd5ea5 VirtualFree 9324->9975 9326 de1117 9976 dd5ea5 VirtualFree 9326->9976 9328 de1122 9329 de0fae RegCloseKey 9328->9329 9330 de112d 9329->9330 9331->8950 9333 ddfece CreateMutexA 9332->9333 9334 de0459 9333->9334 9412 dd5f53 GetProcessHeap HeapAlloc 9334->9412 9336 de0477 9336->8958 9338 de0362 9337->9338 9349 dd5a42 9337->9349 9339 de03df 9338->9339 9340 de0381 9338->9340 9338->9349 9342 dd2f91 6 API calls 9339->9342 9339->9349 9413 dd2f91 9340->9413 9347 de03fd 9342->9347 9344 de0397 9344->9349 9416 de0ac3 9344->9416 9420 dd2296 9344->9420 9345 de0ac3 6 API calls 9345->9347 9347->9345 9348 dd2296 6 API calls 9347->9348 9347->9349 9348->9347 9349->8961 9351 dd5a5f 9350->9351 9357 de02cb 9350->9357 9361 dd5ea5 VirtualFree 9351->9361 9352 dd5ca3 3 API calls 9352->9357 9354 dd33bf 4 API calls 9354->9357 9357->9351 9357->9352 9357->9354 9358 dd3036 2 API calls 9357->9358 9359 de0330 9357->9359 9442 de0af9 9357->9442 9445 dd33a3 lstrcmpA 9357->9445 9446 dd5ea5 VirtualFree 9357->9446 9358->9357 9447 dd239e 9359->9447 9361->8966 9452 dd5eff GetProcessHeap RtlAllocateHeap 9362->9452 9364 dd305e 9364->8968 9366 dd2eab 9365->9366 9368 dd2eb0 9365->9368 9453 dd5eff GetProcessHeap RtlAllocateHeap 9366->9453 9368->8970 9370 dd303f 9369->9370 9371 dd3044 9369->9371 9454 dd5eee GetProcessHeap RtlFreeHeap 9370->9454 9373 dd595e 9371->9373 9455 dd2e4c 9373->9455 9376 dd304c 2 API calls 9377 dd5991 9376->9377 9462 dd5911 9377->9462 9382 dd3036 2 API calls 9383 dd59ae 9382->9383 9384 de1dc0 9383->9384 9385 de1dd4 9384->9385 9395 dd5aa3 9384->9395 9485 dd1085 GetProcessHeap RtlAllocateHeap 9385->9485 9387 de1ddf 9388 dd35e5 4 API calls 9387->9388 9389 de1e02 9388->9389 9390 dd3437 3 API calls 9389->9390 9391 de1e0a 9390->9391 9486 dd5ea5 VirtualFree 9391->9486 9393 de1e12 9487 dd1099 GetProcessHeap HeapFree 9393->9487 9395->8977 9396->8980 9397->8986 9398->8992 9399->8998 9412->9336 9432 dd5ec5 9413->9432 9415 dd2fa7 9415->9344 9417 de0adc 9416->9417 9418 dd2f91 6 API calls 9417->9418 9419 de0af1 9418->9419 9419->9344 9421 dd22b0 9420->9421 9428 dd2364 9420->9428 9441 dd5f53 GetProcessHeap HeapAlloc 9421->9441 9423 dd2e93 2 API calls 9424 dd238c 9423->9424 9425 dd3036 2 API calls 9424->9425 9427 dd2397 9425->9427 9426 dd22d9 9426->9426 9429 dd2e93 2 API calls 9426->9429 9431 dd2355 9426->9431 9427->9344 9428->9423 9429->9426 9430 dd1e71 2 API calls 9430->9428 9431->9428 9431->9430 9433 dd5ec9 GetProcessHeap RtlAllocateHeap 9432->9433 9434 dd5ed0 9432->9434 9433->9415 9436 dd5edc GetProcessHeap HeapReAlloc 9434->9436 9437 dd5ed4 9434->9437 9436->9415 9440 dd5eee GetProcessHeap RtlFreeHeap 9437->9440 9439 dd5ed9 9439->9415 9440->9439 9441->9426 9443 dd2e93 2 API calls 9442->9443 9444 de0b21 9443->9444 9444->9357 9445->9357 9446->9357 9448 dd5ca3 3 API calls 9447->9448 9449 dd23b3 9448->9449 9450 de0af9 2 API calls 9449->9450 9451 dd23c1 9450->9451 9451->9351 9452->9364 9453->9368 9454->9371 9483 dd5eff GetProcessHeap RtlAllocateHeap 9455->9483 9457 dd2e5b 9458 dd2f91 6 API calls 9457->9458 9459 dd2e84 9458->9459 9484 dd5eee GetProcessHeap RtlFreeHeap 9459->9484 9461 dd2e8b 9461->9376 9463 dd5945 9462->9463 9464 dd5923 9462->9464 9466 dd304c 2 API calls 9463->9466 9465 dd2e4c 8 API calls 9464->9465 9467 dd5935 9465->9467 9468 dd5955 9466->9468 9469 dd2e93 2 API calls 9467->9469 9472 dd60aa 9468->9472 9470 dd593d 9469->9470 9471 dd3036 2 API calls 9470->9471 9471->9463 9473 dd304c 2 API calls 9472->9473 9474 dd60c2 9473->9474 9475 dd304c 2 API calls 9474->9475 9476 dd6102 9475->9476 9477 dd3036 2 API calls 9476->9477 9478 dd610a 9477->9478 9479 dd3036 2 API calls 9478->9479 9480 dd6112 9479->9480 9481 dd3036 2 API calls 9480->9481 9482 dd59a3 9481->9482 9482->9382 9483->9457 9484->9461 9485->9387 9486->9393 9487->9395 9972->9320 9973->9322 9974->9324 9975->9326 9976->9328 10814 ddd29a 10817 ddd17d EnterCriticalSection 10814->10817 10818 ddd1ba 10817->10818 10819 ddd1a0 10817->10819 10821 ddd1eb 10818->10821 10824 dd33f5 3 API calls 10818->10824 10833 ddd1dc LeaveCriticalSection 10818->10833 10847 dd33f5 10819->10847 10854 dd2190 10821->10854 10827 ddd1d0 10824->10827 10826 dd57fb 11 API calls 10826->10818 10828 dd57fb 11 API calls 10827->10828 10830 ddd1d8 10828->10830 10829 ddd205 10832 dd2190 WaitForSingleObject 10829->10832 10830->10821 10830->10833 10834 ddd212 10832->10834 10846 ddd291 10833->10846 10835 ddd221 10834->10835 10836 dd1f76 2 API calls 10834->10836 10860 dd1f4b CreateThread 10835->10860 10836->10835 10838 ddd240 10861 dd1f4b CreateThread 10838->10861 10840 ddd254 LeaveCriticalSection 10841 dd2190 WaitForSingleObject 10840->10841 10842 ddd270 10841->10842 10843 dd2190 WaitForSingleObject 10842->10843 10844 ddd27d EnterCriticalSection LeaveCriticalSection 10843->10844 10862 ddd328 EnterCriticalSection 10844->10862 10848 dd3407 10847->10848 10849 dd3420 10847->10849 10850 dd3372 lstrlenA 10848->10850 10849->10826 10851 dd340e 10850->10851 10871 dd5eb4 VirtualAlloc 10851->10871 10853 dd3415 lstrcpyA 10853->10849 10855 dd21a0 WaitForSingleObject 10854->10855 10856 dd219b 10854->10856 10855->10856 10856->10829 10857 dd1f76 10856->10857 10858 dd1f7e TerminateThread CloseHandle 10857->10858 10859 dd1f90 10857->10859 10858->10859 10859->10829 10860->10838 10861->10840 10863 dd1f76 2 API calls 10862->10863 10864 ddd344 10863->10864 10865 dd1f76 2 API calls 10864->10865 10866 ddd34f 10865->10866 10872 dd5584 shutdown closesocket 10866->10872 10868 ddd357 10873 dd5584 shutdown closesocket 10868->10873 10870 ddd362 LeaveCriticalSection 10870->10846 10871->10853 10872->10868 10873->10870 10877 dd3c8f 10878 de1dc0 11 API calls 10877->10878 10879 dd3ca8 10878->10879 10880 dd3554 11 API calls 10879->10880 10881 dd3cb5 10880->10881 10882 dd3125 4 API calls 10881->10882 10883 dd3cbe 10882->10883 10888 dd5ea5 VirtualFree 10883->10888 10885 dd3cc6 10889 dd5ea5 VirtualFree 10885->10889 10887 dd3cce 10888->10885 10889->10887 10890 dd1c8f 10893 dd3de2 10890->10893 10894 dd3036 2 API calls 10893->10894 10895 dd3df3 10894->10895 10898 dd5ea5 VirtualFree 10895->10898 10897 dd1c97 10898->10897 10899 dd7e82 10906 dd1085 GetProcessHeap RtlAllocateHeap 10899->10906 10901 dd7e96 10905 dd7f94 10901->10905 10907 dd1085 GetProcessHeap RtlAllocateHeap 10901->10907 10903 dd7ed0 10908 dd1f2c 10903->10908 10906->10901 10907->10903 10909 dd1f43 10908->10909 10910 dd1f36 10908->10910 10909->10905 10910->10909 10912 dd1099 GetProcessHeap HeapFree 10910->10912 10912->10909 10913 dd28be 10916 ddc938 10913->10916 10917 ddc94b 10916->10917 10918 ddc945 10916->10918 10924 dd5eff GetProcessHeap RtlAllocateHeap 10917->10924 10919 dd1a7e VirtualFree 10918->10919 10919->10917 10921 ddc964 10925 dd1f4b CreateThread 10921->10925 10923 dd28c5 10924->10921 10925->10923 10970 dd9aa8 10977 dd5f53 GetProcessHeap HeapAlloc 10970->10977 10972 dd9ab7 10973 dd9ad1 10972->10973 10974 dd362d 3 API calls 10972->10974 10975 dd9aca 10974->10975 10976 de0203 5 API calls 10975->10976 10976->10973 10977->10972 14178 dded5b 14179 dd33f5 3 API calls 14178->14179 14180 dded71 14179->14180 14189 dd4a75 14180->14189 14183 dd4f2b 15 API calls 14184 dded82 14183->14184 14185 dd4a17 VirtualFree 14184->14185 14186 dded8a 14185->14186 14198 dd5ea5 VirtualFree 14186->14198 14188 dded92 14190 dd309d 10 API calls 14189->14190 14191 dd4a93 14190->14191 14192 dd3437 3 API calls 14191->14192 14193 dd4a9c 14192->14193 14199 dd5ea5 VirtualFree 14193->14199 14195 dd4aa4 14200 dd5ea5 VirtualFree 14195->14200 14197 dd4ab0 14197->14183 14198->14188 14199->14195 14200->14197 11040 de3251 11041 dd1052 11040->11041 11042 de3272 GetTempPathW lstrcatW 11041->11042 11043 dd35e5 4 API calls 11042->11043 11044 de32a7 11043->11044 11045 dd3437 3 API calls 11044->11045 11046 de32af 11045->11046 11055 dd5ea5 VirtualFree 11046->11055 11048 de32b7 11049 dd3761 7 API calls 11048->11049 11050 de32d5 11049->11050 11051 dd3679 8 API calls 11050->11051 11052 de32dc 11051->11052 11053 dd3665 2 API calls 11052->11053 11054 de32e4 11053->11054 11055->11048 14247 dd1d78 14252 dd5ea5 VirtualFree 14247->14252 14249 dd1d83 14253 dd5ea5 VirtualFree 14249->14253 14251 dd1d8e 14252->14249 14253->14251 11107 dd2473 11110 de2217 11107->11110 11115 de2c91 11110->11115 11112 de2235 11113 de2229 11113->11112 11118 de2bf3 11113->11118 11116 de2c9c 11115->11116 11117 de2cfc CoUninitialize 11116->11117 11117->11113 11119 de2c91 CoUninitialize 11118->11119 11120 de2bfe 11119->11120 11121 de2c27 11120->11121 11122 dd5ca3 3 API calls 11120->11122 11124 de2f63 11120->11124 11121->11112 11122->11120 11127 dd5ea5 VirtualFree 11124->11127 11126 de2f6d 11127->11126 14286 dd3d6c 14287 de1dc0 11 API calls 14286->14287 14288 dd3d91 14287->14288 14289 dd3437 3 API calls 14288->14289 14290 dd3d9b 14289->14290 14299 dd5ea5 VirtualFree 14290->14299 14292 dd3da3 14293 dd2e4c 8 API calls 14292->14293 14294 dd3dca 14293->14294 14295 dd2e93 2 API calls 14294->14295 14296 dd3dd3 14295->14296 14297 dd3036 2 API calls 14296->14297 14298 dd3ddb 14297->14298 14299->14292 8505 dd121c 8508 dd99a8 8505->8508 8519 dd1875 8508->8519 8510 dd99ce InitializeCriticalSection 8522 ddfece 8510->8522 8515 de0969 lstrcmpA 8516 dd9a24 8515->8516 8517 de0969 lstrcmpA 8516->8517 8518 dd1221 8517->8518 8529 dd5f53 GetProcessHeap HeapAlloc 8519->8529 8521 dd189e 8521->8510 8521->8521 8530 de0298 CreateMutexA 8522->8530 8524 dd99e3 LoadLibraryW 8525 de0969 8524->8525 8528 de0983 8525->8528 8526 dd9a13 8526->8515 8527 de0999 lstrcmpA 8527->8526 8527->8528 8528->8526 8528->8527 8529->8521 8530->8524 14338 dded1f 14339 dd33f5 3 API calls 14338->14339 14340 dded35 14339->14340 14341 dd4a75 10 API calls 14340->14341 14342 dded3d 14341->14342 14343 dd4f2b 15 API calls 14342->14343 14344 dded46 14343->14344 14345 dd4a17 VirtualFree 14344->14345 14346 dded4e 14345->14346 14349 dd5ea5 VirtualFree 14346->14349 14348 dded56 14349->14348 11158 de3417 11161 dd2093 11158->11161 11167 dd2110 11161->11167 11163 dd20d1 11165 dd20ae 11165->11163 11170 dd2164 11165->11170 11175 dd1fcb 11165->11175 11187 dd5f53 GetProcessHeap HeapAlloc 11167->11187 11169 dd2139 11169->11165 11169->11169 11171 dd5ca3 3 API calls 11170->11171 11172 dd2179 11171->11172 11188 dd1f95 11172->11188 11176 dd2064 11175->11176 11177 dd1fe1 11175->11177 11179 dd20da 3 API calls 11176->11179 11195 dd5f53 GetProcessHeap HeapAlloc 11177->11195 11180 dd2081 11179->11180 11181 dd13ef VirtualFree 11180->11181 11182 dd208c 11181->11182 11182->11165 11183 dd2058 11183->11176 11185 dd1a7e VirtualFree 11183->11185 11184 dd200a 11184->11183 11196 dd20da 11184->11196 11185->11176 11187->11169 11189 dd362d 3 API calls 11188->11189 11190 dd1fa5 11189->11190 11191 dd362d 3 API calls 11190->11191 11192 dd1fb1 11191->11192 11193 dd362d 3 API calls 11192->11193 11194 dd1fbd 11193->11194 11194->11165 11195->11184 11197 dd3437 3 API calls 11196->11197 11198 dd20ea 11197->11198 11199 dd3437 3 API calls 11198->11199 11200 dd20f6 11199->11200 11201 dd3437 3 API calls 11200->11201 11202 dd2102 11201->11202 11202->11184 11217 dd4c0a 11218 dd4c1d 11217->11218 11274 dd4c64 11217->11274 11219 dd4c29 11218->11219 11220 dd4d56 11218->11220 11221 dd4c2f 11219->11221 11222 dd4d4a 11219->11222 11223 dd4ddf 11220->11223 11227 dd4dce 11220->11227 11232 dd4dc8 11220->11232 11233 dd4d66 11220->11233 11225 dd4cdf 11221->11225 11226 dd4c38 11221->11226 11224 ddc938 4 API calls 11222->11224 11231 dd4e35 11223->11231 11241 dd4e29 11223->11241 11242 dd4df3 11223->11242 11223->11274 11224->11274 11234 dd4ce4 11225->11234 11235 dd4d40 11225->11235 11229 dd4c3e 11226->11229 11230 dd4cd3 11226->11230 11681 dd26c4 11227->11681 11238 dd4c9b 11229->11238 11239 dd4c43 11229->11239 11454 dd29fb 11230->11454 11744 dd2968 11231->11744 11650 dd27d3 11232->11650 11243 dd4d6d 11233->11243 11244 dd4dbe 11233->11244 11245 dd4ceb 11234->11245 11246 dd4d32 11234->11246 11501 dd29b3 11235->11501 11257 dd4cc7 11238->11257 11258 dd4ca0 11238->11258 11248 dd4c8f 11239->11248 11249 dd4c45 11239->11249 11733 dd2686 11241->11733 11250 dd4dfa 11242->11250 11251 dd4e20 11242->11251 11252 dd4d71 11243->11252 11253 dd4db3 11243->11253 11641 dd990a InitializeCriticalSection DeleteCriticalSection EnterCriticalSection GetModuleHandleA 11244->11641 11254 dd4cef 11245->11254 11255 dd4d28 11245->11255 11492 de239e 11246->11492 11386 dd2be5 11248->11386 11262 dd4c7d 11249->11262 11263 dd4c4a 11249->11263 11264 dd4dfe 11250->11264 11265 dd4e19 11250->11265 11727 dd2650 11251->11727 11279 dd4d79 11252->11279 11280 dd4d90 11252->11280 11301 dd4d9c 11252->11301 11635 dd98c4 EnterCriticalSection 11253->11635 11266 dd4d1e 11254->11266 11267 dd4cf3 11254->11267 11486 de2367 11255->11486 11429 dd2af6 SetLastError 11257->11429 11272 dd4cbb 11258->11272 11287 dd4ca7 11258->11287 11346 dd2cec 11262->11346 11275 dd4c51 11263->11275 11276 dd4c73 11263->11276 11277 dd4e10 11264->11277 11278 dd4e03 11264->11278 11724 dd2639 11265->11724 11483 dd298b 11266->11483 11281 dd4e4e 11267->11281 11282 dd4cfb 11267->11282 11414 dd2aa1 11272->11414 11290 dd4c69 11275->11290 11291 dd4c55 11275->11291 11333 dd2c8e 11276->11333 11711 dd25cb 11277->11711 11278->11274 11694 dd2b80 11278->11694 11279->11274 11299 ddd328 6 API calls 11279->11299 11514 dd275a 11280->11514 11749 dd2961 11281->11749 11292 dd4cff 11282->11292 11293 dd4d12 11282->11293 11287->11274 11391 dd2a10 11287->11391 11320 dd2c47 11290->11320 11291->11274 11305 dd2bf4 11291->11305 11292->11274 11304 de3936 9 API calls 11292->11304 11459 dd28cf 11293->11459 11299->11274 11527 dde3fa InitializeCriticalSection DeleteCriticalSection EnterCriticalSection 11301->11527 11304->11274 11306 dd362d 3 API calls 11305->11306 11307 dd2c09 11306->11307 11768 ddff27 11307->11768 11314 dd4f2b 15 API calls 11315 dd2c2f 11314->11315 11797 dd442d 11315->11797 11318 dd2c44 11318->11274 11319 dd1ad5 VirtualFree 11319->11318 11823 de002b 11320->11823 11322 dd2c58 11845 dd13a8 11322->11845 11327 dd4f2b 15 API calls 11328 dd2c76 11327->11328 11856 dd451b 11328->11856 11331 dd2c8b 11331->11274 11892 de0d24 11333->11892 11335 dd2ca0 11920 dd131a 11335->11920 11340 dd4f2b 15 API calls 11341 dd2cbe 11340->11341 11931 dd4624 11341->11931 11343 dd2cc6 11344 dd2ce8 11343->11344 11935 dd1416 11343->11935 11344->11274 11968 ddf93f 11346->11968 11351 de1e21 6 API calls 11352 dd2d32 11351->11352 11353 dd35e5 4 API calls 11352->11353 11354 dd2d58 11353->11354 11355 dd35e5 4 API calls 11354->11355 11356 dd2d61 11355->11356 11987 ddfa1f GlobalMemoryStatusEx 11356->11987 11358 dd2d66 11359 dd35e5 4 API calls 11358->11359 11360 dd2d77 11359->11360 11988 ddfc7e GetComputerNameW 11360->11988 11363 ddfc58 3 API calls 11364 dd2d84 11363->11364 11365 ddfbfc 4 API calls 11364->11365 11366 dd2d8a 11365->11366 11367 ddfa42 2 API calls 11366->11367 11368 dd2d90 11367->11368 11991 ddfcb8 11368->11991 11373 dd4f2b 15 API calls 11374 dd2daf 11373->11374 12038 dd41ff 11374->12038 12064 dd12ad 11386->12064 11390 dd2bf3 11390->11274 11392 dd33bf 4 API calls 11391->11392 11393 dd2a29 11392->11393 12228 dd33a3 lstrcmpA 11393->12228 11395 dd2a31 12229 dd5ea5 VirtualFree 11395->12229 11397 dd2a4c 11398 dd2a58 11397->11398 11399 dd2a50 11397->11399 11401 dd33bf 4 API calls 11398->11401 12230 ddedb5 11399->12230 11402 dd2a65 11401->11402 12241 dd33a3 lstrcmpA 11402->12241 11403 dd2a56 11403->11274 11405 dd2a6d 12242 dd5ea5 VirtualFree 11405->12242 11407 dd2a77 11408 dd2a8e 11407->11408 11409 dd2a7b 11407->11409 11411 dd33f5 3 API calls 11408->11411 12243 ddea89 11409->12243 11412 dd2a97 11411->11412 12259 ddecd0 11412->12259 11415 de0cf6 3 API calls 11414->11415 11416 dd2ab6 11415->11416 11417 dd2aba 11416->11417 11418 dd2ac5 GetLastError 11416->11418 11419 dd2c8e 38 API calls 11417->11419 11420 dd2ac1 11418->11420 11419->11420 12369 de0c79 CreateToolhelp32Snapshot 11420->12369 11422 dd2ad8 12377 dd4346 11422->12377 11425 dd4f2b 15 API calls 11426 dd2ae9 11425->11426 12382 dd432f 11426->12382 11430 dd362d 3 API calls 11429->11430 11431 dd2b18 11430->11431 12387 ddff0b DeleteFileW 11431->12387 11433 dd2b1d 11434 dd2b51 GetLastError 11433->11434 11435 dd2b22 11433->11435 11437 dd2b4f 11434->11437 11436 dd362d 3 API calls 11435->11436 11438 dd2b2b 11436->11438 11439 dd362d 3 API calls 11437->11439 11440 dd362d 3 API calls 11438->11440 11441 dd2b62 11439->11441 11442 dd2b37 11440->11442 12399 dd3fcb 11441->12399 12390 dd39b5 11442->12390 11446 dd4f2b 15 API calls 11448 dd2b73 11446->11448 11450 dd3fb4 VirtualFree 11448->11450 11452 dd2b7b 11450->11452 11451 dd2b47 12396 dd399e 11451->12396 11452->11274 11455 dd12ad 3 API calls 11454->11455 11456 dd2a07 11455->11456 11457 dd7574 24 API calls 11456->11457 11458 dd2a0e 11457->11458 11458->11274 11460 dd362d 3 API calls 11459->11460 11461 dd28e7 11460->11461 11462 de0203 5 API calls 11461->11462 11463 dd28ef 11462->11463 11464 dd362d 3 API calls 11463->11464 11465 dd28f8 PathFileExistsW 11464->11465 12408 dd5ea5 VirtualFree 11465->12408 11467 dd290b 11468 dd291b 11467->11468 11469 dd2910 11467->11469 11471 de0192 2 API calls 11468->11471 12409 de01d1 CreateFileW 11469->12409 11472 dd2919 11471->11472 11473 dd2955 11472->11473 11474 dd304c 2 API calls 11472->11474 11475 ddfeed 4 API calls 11473->11475 11476 dd2938 11474->11476 11477 dd295d 11475->11477 11478 de013d 4 API calls 11476->11478 11477->11274 11479 dd2945 11478->11479 11480 dd3036 2 API calls 11479->11480 11481 dd294d 11480->11481 11482 de0125 CloseHandle 11481->11482 11482->11473 11484 dd4f2b 15 API calls 11483->11484 11485 dd29a0 11484->11485 11485->11274 12411 de026f WaitForSingleObject 11486->12411 11488 de2371 11489 de2391 ReleaseMutex 11488->11489 11490 de2c91 CoUninitialize 11488->11490 11489->11274 11491 de238a 11490->11491 11491->11489 12412 de026f WaitForSingleObject 11492->12412 11494 de23f8 ReleaseMutex 11494->11274 11495 de23ab 11495->11494 11499 de23d2 11495->11499 12413 dd5f53 GetProcessHeap HeapAlloc 11495->12413 11498 de23c6 11498->11499 11500 de2ed4 20 API calls 11498->11500 12414 de2d0a CoInitialize CoCreateInstance 11499->12414 11500->11499 12431 de223e 11501->12431 11508 dd4f2b 15 API calls 11509 dd29e3 11508->11509 12459 dd479b 11509->12459 11512 dd29f8 11512->11274 11515 ddd328 6 API calls 11514->11515 11516 dd2770 11515->11516 11517 dd33bf 4 API calls 11516->11517 11518 dd278e 11517->11518 12499 dd5c6d 11518->12499 11520 dd279c 11521 dd3554 11 API calls 11520->11521 11522 dd27a3 11521->11522 12502 ddd36c 11522->12502 11524 dd27a9 12517 dd5ea5 VirtualFree 11524->12517 11526 dd27b1 11526->11301 12522 ddde1f 11527->12522 11530 dde459 11532 dd35e5 4 API calls 11530->11532 11531 dde554 11533 ddf51d 2 API calls 11531->11533 11534 dde466 11532->11534 11535 dde559 11533->11535 12547 de168e 11534->12547 11537 dde6cf 11535->11537 12571 ddf4ce LoadLibraryA 11535->12571 11540 dd4b91 3 API calls 11537->11540 11541 dde6e3 11540->11541 11544 dd4f2b 15 API calls 11541->11544 11542 dd3437 3 API calls 11545 dde47d 11542->11545 11543 dde567 11543->11537 11546 dde56f 11543->11546 11549 dde6eb 11544->11549 12565 dd5ea5 VirtualFree 11545->12565 11548 ddfbfc 4 API calls 11546->11548 11551 dde574 11548->11551 11552 dd4b6e VirtualFree 11549->11552 11550 dde485 12566 dd5ea5 VirtualFree 11550->12566 11554 dde579 11551->11554 11555 dde5a4 11551->11555 11556 dde6f3 LeaveCriticalSection 11552->11556 11558 dd4b91 3 API calls 11554->11558 11560 dd34a7 21 API calls 11555->11560 11559 dde6fc 11556->11559 11557 dde492 11561 dd35e5 4 API calls 11557->11561 11562 dde58d 11558->11562 11559->11274 11563 dde5af 11560->11563 11564 dde49f 11561->11564 11565 dd4f2b 15 API calls 11562->11565 11566 dd3437 3 API calls 11563->11566 11567 de168e 22 API calls 11564->11567 11568 dde595 11565->11568 11569 dde5ba 11566->11569 11570 dde4ab 11567->11570 11571 dd4b6e VirtualFree 11568->11571 12574 dd5ea5 VirtualFree 11569->12574 11573 dd3437 3 API calls 11570->11573 11614 dde52a 11571->11614 11576 dde4b8 11573->11576 11574 dde5c2 11575 dd34a7 21 API calls 11574->11575 11578 dde5cd 11575->11578 12567 dd5ea5 VirtualFree 11576->12567 11577 dde658 LeaveCriticalSection 11577->11559 11580 dd3437 3 API calls 11578->11580 11582 dde5da 11580->11582 11581 dde4c0 12568 dd5ea5 VirtualFree 11581->12568 12575 dd5ea5 VirtualFree 11582->12575 11585 dde4cb 11587 dd3261 lstrlenW 11585->11587 11586 dde5e2 RegCreateKeyExA RegSetValueExW RegCloseKey 12576 ddd418 NetUserAdd 11586->12576 11589 dde4d5 11587->11589 11590 dde52c 11589->11590 11592 dd3261 lstrlenW 11589->11592 11593 dd4b91 3 API calls 11590->11593 11597 dde4e0 11592->11597 11598 dde53c 11593->11598 11594 dde638 11599 dd4b91 3 API calls 11594->11599 11595 dde66b 11596 dd35e5 4 API calls 11595->11596 11600 dde67d 11596->11600 11597->11590 11601 dde4e4 11597->11601 11602 dd4f2b 15 API calls 11598->11602 11603 dde648 11599->11603 12582 de165b 11600->12582 11605 dd35e5 4 API calls 11601->11605 11606 dde544 11602->11606 11607 dd4f2b 15 API calls 11603->11607 11609 dde4f2 11605->11609 11610 dd4b6e VirtualFree 11606->11610 11611 dde650 11607->11611 11613 dd35e5 4 API calls 11609->11613 11610->11614 11615 dd4b6e VirtualFree 11611->11615 11617 dde4fc 11613->11617 11614->11577 11615->11577 11616 dde690 11618 dd35e5 4 API calls 11616->11618 11619 dd4b91 3 API calls 11617->11619 11620 dde69e 11618->11620 11621 dde507 11619->11621 11622 de165b 8 API calls 11620->11622 11623 dd4f2b 15 API calls 11621->11623 11624 dde6a6 11622->11624 11625 dde50f 11623->11625 12591 dd5ea5 VirtualFree 11624->12591 11627 dd4b6e VirtualFree 11625->11627 11629 dde517 11627->11629 11628 dde6ae 12592 dd1f4b CreateThread 11628->12592 12569 dd5ea5 VirtualFree 11629->12569 11632 dde6c3 LeaveCriticalSection 11632->11559 11633 dde51f 12570 dd5ea5 VirtualFree 11633->12570 11636 dd98ff LeaveCriticalSection 11635->11636 11637 dd98da 11635->11637 11636->11274 11638 dd1f76 2 API calls 11637->11638 11639 dd98e4 11638->11639 12610 dd1f4b CreateThread 11639->12610 11642 dd997c 11641->11642 11643 dd9965 11641->11643 11645 dd1f76 2 API calls 11642->11645 12611 dd1f4b CreateThread 11643->12611 11647 dd9981 11645->11647 11646 dd9970 11648 dd999b LeaveCriticalSection 11646->11648 12612 dd1f4b CreateThread 11647->12612 11648->11274 11651 ddf76b 5 API calls 11650->11651 11652 dd27e9 11651->11652 11653 dd34a7 21 API calls 11652->11653 11654 dd27f4 11653->11654 11655 dd346a 9 API calls 11654->11655 11656 dd2803 11655->11656 11657 dd3335 5 API calls 11656->11657 11658 dd280b 11657->11658 12613 dd5ea5 VirtualFree 11658->12613 11660 dd2813 11661 dd362d 3 API calls 11660->11661 11662 dd2822 11661->11662 12614 dd351d 11662->12614 11665 dd3335 5 API calls 11666 dd2837 11665->11666 12619 dd5ea5 VirtualFree 11666->12619 11668 dd283f 12620 dd5ea5 VirtualFree 11668->12620 11670 dd284b 11671 dd362d 3 API calls 11670->11671 11672 dd2857 URLDownloadToFileW 11671->11672 12621 dd5ea5 VirtualFree 11672->12621 11674 dd2870 11675 dd287d ShellExecuteW 11674->11675 11676 dd2874 11674->11676 11675->11676 11677 dd4f2b 15 API calls 11676->11677 11678 dd28b1 11677->11678 12622 dd5ea5 VirtualFree 11678->12622 11680 dd28b9 11680->11227 11682 dd5c6d 3 API calls 11681->11682 11683 dd26e4 11682->11683 11684 dd3554 11 API calls 11683->11684 11685 dd26eb 11684->11685 12623 dd5ea5 VirtualFree 11685->12623 11687 dd26f3 inet_addr 11688 dd2739 11687->11688 11689 dd2701 getaddrinfo 11687->11689 12624 de3de9 11688->12624 11689->11688 11693 dd274a 11693->11223 11695 dd362d 3 API calls 11694->11695 11696 dd2b99 11695->11696 11697 ddff27 17 API calls 11696->11697 11698 dd2ba1 11697->11698 11699 dd1361 12 API calls 11698->11699 11700 dd2baf 11699->11700 11701 dd362d 3 API calls 11700->11701 11702 dd2bb8 11701->11702 12632 dd3bbb 11702->12632 11705 dd4f2b 15 API calls 11706 dd2bcb 11705->11706 12643 dd3b8b 11706->12643 11709 dd2be0 11709->11274 11710 dd1ad5 VirtualFree 11710->11709 11712 dd304c 2 API calls 11711->11712 11713 dd25e9 11712->11713 12657 de1e8c VirtualAlloc 11713->12657 11715 dd25f6 11716 dd2619 11715->11716 11717 dd2612 11715->11717 12679 dd79e8 11716->12679 12660 dd7af1 11717->12660 11721 dd261e VirtualFree 11722 dd3036 2 API calls 11721->11722 11723 dd2634 11722->11723 11723->11274 11725 dd4f2b 15 API calls 11724->11725 11726 dd264e 11725->11726 11726->11274 11728 dd265c 11727->11728 11729 dd2683 11727->11729 11730 dd362d 3 API calls 11728->11730 11729->11274 11731 dd2668 ShellExecuteW 11730->11731 12759 dd5ea5 VirtualFree 11731->12759 11734 dd5c6d 3 API calls 11733->11734 11735 dd26a1 11734->11735 11736 dd3554 11 API calls 11735->11736 11737 dd26a8 11736->11737 12760 ddee22 11737->12760 11741 dd26b8 12764 dd5ea5 VirtualFree 11741->12764 11743 dd26c0 11743->11231 11745 dd4f2b 15 API calls 11744->11745 11746 dd2981 11745->11746 12854 de32ed 11746->12854 11750 de171c 11749->11750 12858 de0f31 RegDeleteKeyW 11750->12858 11752 de1732 11753 de1739 TerminateThread 11752->11753 11754 de1746 11752->11754 11753->11754 11755 de1788 11754->11755 11756 de106c 5 API calls 11754->11756 11757 de1794 GetModuleFileNameA 11755->11757 11758 de1762 11756->11758 11766 de17c6 11757->11766 11759 dd362d 3 API calls 11758->11759 11760 de176e 11759->11760 12859 de0f4c 11760->12859 11764 de1781 11765 de0fae RegCloseKey 11764->11765 11765->11755 11767 de181a CreateProcessA CloseHandle CloseHandle ExitProcess 11766->11767 11769 dd1875 2 API calls 11768->11769 11770 ddff4a FindFirstFileW 11769->11770 11782 ddff64 11770->11782 11771 de0004 11772 dd1361 12 API calls 11771->11772 11773 de000f 11772->11773 11775 de001c 11773->11775 11776 dd1ad5 VirtualFree 11773->11776 11774 dd35e5 4 API calls 11774->11782 11815 dd5ea5 VirtualFree 11775->11815 11776->11775 11778 dd3437 3 API calls 11778->11782 11779 dd2c11 11786 dd1361 11779->11786 11781 dd362d 3 API calls 11781->11782 11782->11771 11782->11774 11782->11778 11782->11781 11801 dd5ea5 VirtualFree 11782->11801 11802 dd1776 11782->11802 11814 dd5ea5 VirtualFree 11782->11814 11785 ddffee FindNextFileW 11785->11782 11787 dd1875 2 API calls 11786->11787 11790 dd137c 11787->11790 11788 dd139f 11792 dd4450 11788->11792 11790->11788 11791 dd1776 6 API calls 11790->11791 11818 dd18c2 11790->11818 11791->11790 11793 dd1361 12 API calls 11792->11793 11794 dd4468 11793->11794 11795 dd2c27 11794->11795 11796 dd1ad5 VirtualFree 11794->11796 11795->11314 11796->11795 11798 dd443d 11797->11798 11799 dd2c37 11797->11799 11800 dd1ad5 VirtualFree 11798->11800 11799->11318 11799->11319 11800->11799 11801->11782 11803 dd178d 11802->11803 11810 dd1837 11802->11810 11816 dd5f53 GetProcessHeap HeapAlloc 11803->11816 11805 dd3437 3 API calls 11806 dd1851 11805->11806 11817 dd5ea5 VirtualFree 11806->11817 11808 dd186e 11808->11782 11809 dd1825 11809->11810 11812 dd1ad5 VirtualFree 11809->11812 11810->11805 11811 dd3437 3 API calls 11813 dd17b6 11811->11813 11812->11810 11813->11809 11813->11811 11814->11785 11815->11779 11816->11813 11817->11808 11819 dd5ca3 3 API calls 11818->11819 11820 dd18d8 11819->11820 11821 dd362d 3 API calls 11820->11821 11822 dd18e8 11821->11822 11822->11790 11864 dd5f53 GetProcessHeap HeapAlloc 11823->11864 11825 de0043 11865 dd19f6 11825->11865 11828 de0070 11868 dd5f53 GetProcessHeap HeapAlloc 11828->11868 11830 de0083 GetLogicalDriveStringsW 11834 de008d 11830->11834 11831 dd13a8 12 API calls 11833 de0111 11831->11833 11832 dd35e5 4 API calls 11832->11834 11835 de011e 11833->11835 11837 dd1b00 VirtualFree 11833->11837 11834->11832 11836 dd3437 3 API calls 11834->11836 11842 dd3261 lstrlenW 11834->11842 11844 de0103 11834->11844 11869 dd5ea5 VirtualFree 11834->11869 11870 dd1903 11834->11870 11882 dd5ea5 VirtualFree 11834->11882 11835->11322 11836->11834 11837->11835 11839 de00b1 GetDriveTypeW 11840 dd362d 3 API calls 11839->11840 11840->11834 11842->11834 11844->11831 11846 dd19f6 2 API calls 11845->11846 11849 dd13c3 11846->11849 11847 dd13e6 11851 dd453e 11847->11851 11849->11847 11850 dd1903 6 API calls 11849->11850 11886 dd1a43 11849->11886 11850->11849 11852 dd13a8 12 API calls 11851->11852 11853 dd4556 11852->11853 11854 dd2c6e 11853->11854 11855 dd1b00 VirtualFree 11853->11855 11854->11327 11855->11854 11857 dd452b 11856->11857 11858 dd2c7e 11856->11858 11859 dd1b00 VirtualFree 11857->11859 11858->11331 11860 dd1b00 11858->11860 11859->11858 11861 dd1b11 11860->11861 11862 dd1b23 11860->11862 11861->11862 11891 dd5ea5 VirtualFree 11861->11891 11862->11331 11864->11825 11883 dd5f53 GetProcessHeap HeapAlloc 11865->11883 11867 dd1a1f GetLogicalDriveStringsW 11867->11828 11867->11834 11868->11830 11869->11839 11871 dd191a 11870->11871 11878 dd19be 11870->11878 11884 dd5f53 GetProcessHeap HeapAlloc 11871->11884 11873 dd3437 3 API calls 11874 dd19d8 11873->11874 11885 dd5ea5 VirtualFree 11874->11885 11876 dd19ef 11876->11834 11877 dd19ac 11877->11878 11879 dd1b00 VirtualFree 11877->11879 11878->11873 11879->11878 11880 dd3437 3 API calls 11881 dd1943 11880->11881 11881->11877 11881->11880 11882->11834 11883->11867 11884->11881 11885->11876 11887 dd5ca3 3 API calls 11886->11887 11888 dd1a59 11887->11888 11889 dd362d 3 API calls 11888->11889 11890 dd1a69 11889->11890 11890->11849 11891->11861 11893 de0d46 11892->11893 11940 dd16e3 11893->11940 11895 de0d67 CreateToolhelp32Snapshot 11896 de0efd 11895->11896 11897 de0d7b Process32FirstW 11895->11897 11898 dd131a 12 API calls 11896->11898 11899 de0dce 11897->11899 11900 de0d8d CloseHandle 11897->11900 11902 de0f08 11898->11902 11901 dd32ff 9 API calls 11899->11901 11903 dd131a 12 API calls 11900->11903 11904 de0dec OpenProcess 11901->11904 11905 de0dc9 11902->11905 11908 dd1416 VirtualFree 11902->11908 11906 de0d9f 11903->11906 11913 de0e09 11904->11913 11905->11335 11906->11905 11910 dd1416 VirtualFree 11906->11910 11907 dd35e5 lstrlenW lstrlenW lstrcpyW VirtualAlloc 11907->11913 11908->11902 11909 de0e1c GetModuleFileNameExW 11909->11913 11910->11906 11911 dd5ea5 VirtualFree 11911->11913 11912 dd3437 lstrlenW lstrcpyW VirtualAlloc 11912->11913 11913->11907 11913->11909 11913->11911 11913->11912 11914 de0e80 CloseHandle 11913->11914 11915 dd362d lstrlenW lstrcpyW VirtualAlloc 11913->11915 11917 dd1416 VirtualFree 11913->11917 11943 dd15c0 11913->11943 11914->11913 11915->11913 11918 de0edd Process32NextW 11917->11918 11918->11899 11919 de0ef6 CloseHandle 11918->11919 11919->11896 11921 dd16e3 2 API calls 11920->11921 11924 dd1335 11921->11924 11922 dd1358 11926 dd4660 11922->11926 11924->11922 11925 dd15c0 6 API calls 11924->11925 11959 dd1735 11924->11959 11925->11924 11927 dd131a 12 API calls 11926->11927 11928 dd4678 11927->11928 11929 dd2cb6 11928->11929 11930 dd1416 VirtualFree 11928->11930 11929->11340 11930->11928 11932 dd4651 11931->11932 11934 dd4634 11931->11934 11932->11343 11933 dd1416 VirtualFree 11933->11934 11934->11932 11934->11933 11966 dd5ea5 VirtualFree 11935->11966 11937 dd1421 11967 dd5ea5 VirtualFree 11937->11967 11939 dd142d 11939->11343 11957 dd5f53 GetProcessHeap HeapAlloc 11940->11957 11942 dd170c 11942->11895 11942->11942 11944 dd15d7 11943->11944 11956 dd169c 11943->11956 11958 dd5f53 GetProcessHeap HeapAlloc 11944->11958 11946 dd3437 3 API calls 11947 dd16c3 11946->11947 11948 dd3437 3 API calls 11947->11948 11949 dd16d1 11948->11949 11951 dd1416 VirtualFree 11949->11951 11950 dd1600 11952 dd3437 lstrlenW lstrcpyW VirtualAlloc 11950->11952 11954 dd1676 11950->11954 11953 dd16dc 11951->11953 11952->11950 11953->11913 11955 dd1416 VirtualFree 11954->11955 11954->11956 11955->11954 11956->11946 11957->11942 11958->11950 11960 dd5ca3 3 API calls 11959->11960 11961 dd174a 11960->11961 11962 dd362d 3 API calls 11961->11962 11963 dd1762 11962->11963 11964 dd362d 3 API calls 11963->11964 11965 dd176e 11964->11965 11965->11924 11966->11937 11967->11939 11971 ddf97d 11968->11971 11970 ddf9e4 11972 dd33bf 4 API calls 11970->11972 12047 dd1085 GetProcessHeap RtlAllocateHeap 11971->12047 11973 ddfa02 11972->11973 11974 dd309d 10 API calls 11973->11974 11975 ddfa09 11974->11975 12048 dd5ea5 VirtualFree 11975->12048 11977 ddfa11 12049 dd1099 GetProcessHeap HeapFree 11977->12049 11979 dd2d04 11980 ddf80e CoInitializeSecurity CoInitialize 11979->11980 11981 ddf836 CoCreateInstance 11980->11981 11985 ddf877 11980->11985 11982 ddf854 11981->11982 11981->11985 11984 ddf8ca VariantInit 11982->11984 11982->11985 11986 dd2d0c GetModuleFileNameA 11982->11986 11983 dd35e5 4 API calls 11983->11986 11984->11982 11985->11983 11986->11351 11987->11358 11989 dd35e5 4 API calls 11988->11989 11990 dd2d7f 11989->11990 11990->11363 11992 ddfcde 11991->11992 12014 ddfd58 11991->12014 11993 dd35e5 4 API calls 11992->11993 11994 ddfceb RegOpenKeyExW 11993->11994 12050 dd5ea5 VirtualFree 11994->12050 11995 dd2e93 2 API calls 11997 ddfd6c 11995->11997 11999 dd3036 2 API calls 11997->11999 11998 ddfd0e 12000 ddfd3d 11998->12000 12003 dd35e5 4 API calls 11998->12003 12001 ddfd74 11999->12001 12052 dd607a 12000->12052 12004 de0fae RegCloseKey 12001->12004 12006 ddfd24 12003->12006 12007 dd2d9f 12004->12007 12009 de0fc3 12 API calls 12006->12009 12017 dd4241 12007->12017 12008 dd2e93 2 API calls 12010 ddfd50 12008->12010 12011 ddfd2d 12009->12011 12012 dd3036 2 API calls 12010->12012 12051 dd5ea5 VirtualFree 12011->12051 12012->12014 12014->11995 12015 ddfd35 12016 de0fae RegCloseKey 12015->12016 12016->12000 12018 dd304c 2 API calls 12017->12018 12019 dd4259 12018->12019 12020 dd362d 3 API calls 12019->12020 12021 dd427d 12020->12021 12022 dd362d 3 API calls 12021->12022 12023 dd4289 12022->12023 12024 dd362d 3 API calls 12023->12024 12025 dd42a1 12024->12025 12026 dd362d 3 API calls 12025->12026 12027 dd42ad 12026->12027 12028 dd3036 2 API calls 12027->12028 12029 dd42b5 12028->12029 12056 dd5ea5 VirtualFree 12029->12056 12031 dd42bd 12057 dd5ea5 VirtualFree 12031->12057 12033 dd42c9 12058 dd5ea5 VirtualFree 12033->12058 12035 dd42d5 12059 dd5ea5 VirtualFree 12035->12059 12037 dd2da7 12037->11373 12060 dd5ea5 VirtualFree 12038->12060 12040 dd4211 12061 dd5ea5 VirtualFree 12040->12061 12042 dd421e 12062 dd5ea5 VirtualFree 12042->12062 12044 dd4229 12063 dd5ea5 VirtualFree 12044->12063 12046 dd4234 12047->11970 12048->11977 12049->11979 12050->11998 12051->12015 12053 dd6097 12052->12053 12054 dd2f91 6 API calls 12053->12054 12055 dd60a5 12054->12055 12055->12008 12056->12031 12057->12033 12058->12035 12059->12037 12060->12040 12061->12042 12062->12044 12063->12046 12065 dd12b6 12064->12065 12068 dd12c9 12064->12068 12091 dd5f53 GetProcessHeap HeapAlloc 12065->12091 12067 dd12be 12067->12068 12092 dd77ae 12067->12092 12070 dd76c0 12068->12070 12099 dd1085 GetProcessHeap RtlAllocateHeap 12070->12099 12072 dd76d7 12073 dd3437 3 API calls 12072->12073 12074 dd76fb 12073->12074 12100 dd1085 GetProcessHeap RtlAllocateHeap 12074->12100 12076 dd7719 12077 dd362d 3 API calls 12076->12077 12078 dd7725 12077->12078 12079 dd362d 3 API calls 12078->12079 12080 dd772e 12079->12080 12081 dd3261 lstrlenW 12080->12081 12082 dd7736 12081->12082 12101 dd5ea5 VirtualFree 12082->12101 12084 dd7752 12102 dd5ea5 VirtualFree 12084->12102 12086 dd775a 12103 de026f WaitForSingleObject 12086->12103 12088 dd7774 CreateThread 12104 dd1e9c 12088->12104 12109 dd73bb 12088->12109 12091->12067 12097 dd5f53 GetProcessHeap HeapAlloc 12092->12097 12094 dd77c9 12098 de0298 CreateMutexA 12094->12098 12096 dd77dd 12096->12068 12097->12094 12098->12096 12099->12072 12100->12076 12101->12084 12102->12086 12103->12088 12105 dd1edc ReleaseMutex 12104->12105 12106 dd1eb0 12104->12106 12105->11390 12108 dd5f53 GetProcessHeap HeapAlloc 12106->12108 12108->12105 12110 dd35e5 4 API calls 12109->12110 12111 dd73e0 12110->12111 12143 dd78b0 12111->12143 12114 dd74e3 PathFindFileNameW 12116 dd35e5 4 API calls 12114->12116 12115 dd73f3 12125 dd7476 PathFindFileNameW 12115->12125 12126 dd7426 PathFindFileNameW 12115->12126 12136 dd40ea lstrlenW lstrcpyW VirtualFree VirtualAlloc 12115->12136 12139 dd4f2b 15 API calls 12115->12139 12140 dd74e1 12115->12140 12141 dd4050 VirtualFree 12115->12141 12142 dd3036 GetProcessHeap RtlFreeHeap 12115->12142 12154 dd783b 12115->12154 12118 dd7510 12116->12118 12117 dd7549 12175 dd7574 12117->12175 12167 dd40ea 12118->12167 12120 de0125 CloseHandle 12120->12117 12123 dd7557 12197 dd77e3 12123->12197 12131 dd35e5 4 API calls 12125->12131 12129 dd35e5 4 API calls 12126->12129 12128 dd4f2b 15 API calls 12132 dd7525 12128->12132 12129->12115 12131->12115 12172 dd4050 12132->12172 12134 dd3036 2 API calls 12137 dd7569 12134->12137 12136->12115 12138 dd3036 2 API calls 12138->12140 12139->12115 12140->12117 12140->12120 12141->12115 12142->12115 12205 dd5f53 GetProcessHeap HeapAlloc 12143->12205 12145 dd78ce 12146 ddfece CreateMutexA 12145->12146 12147 dd78f5 12146->12147 12148 dd3437 3 API calls 12147->12148 12149 dd7909 12148->12149 12150 de0192 2 API calls 12149->12150 12151 dd7917 12150->12151 12206 dd5ea5 VirtualFree 12151->12206 12153 dd73e9 12153->12114 12153->12115 12155 dd7893 12154->12155 12156 dd7846 12154->12156 12155->12115 12156->12155 12157 dd789a 12156->12157 12158 dd7862 12156->12158 12159 ddfe3d 12 API calls 12157->12159 12207 ddfe3d 12158->12207 12159->12155 12163 dd787b 12164 dd2f91 6 API calls 12163->12164 12165 dd788d 12164->12165 12220 dd1099 GetProcessHeap HeapFree 12165->12220 12168 dd362d 3 API calls 12167->12168 12169 dd4108 12168->12169 12224 dd5ea5 VirtualFree 12169->12224 12171 dd4134 12171->12128 12225 dd5ea5 VirtualFree 12172->12225 12174 dd4061 12174->12138 12226 de026f WaitForSingleObject 12175->12226 12177 dd75da ReleaseMutex 12177->12123 12178 dd5ca3 3 API calls 12179 dd758f 12178->12179 12179->12178 12180 dd75ee 12179->12180 12196 dd75d8 12179->12196 12181 dd5ca3 3 API calls 12180->12181 12182 dd75f8 12181->12182 12227 dd5ea5 VirtualFree 12182->12227 12184 dd7610 12185 dd5ca3 3 API calls 12184->12185 12186 dd7621 TerminateThread 12185->12186 12187 dd5ca3 3 API calls 12186->12187 12188 dd764d 12187->12188 12188->12177 12189 dd40ea 4 API calls 12188->12189 12190 dd76a2 12189->12190 12191 dd4f2b 15 API calls 12190->12191 12192 dd76ab 12191->12192 12193 dd4050 VirtualFree 12192->12193 12194 dd76b3 12193->12194 12195 dd3036 2 API calls 12194->12195 12195->12196 12196->12177 12198 dd77ec 12197->12198 12199 dd77f4 12197->12199 12200 de0125 CloseHandle 12198->12200 12201 ddfeed 4 API calls 12199->12201 12200->12199 12204 dd77fc 12201->12204 12202 dd7560 12202->12134 12203 dd3036 2 API calls 12203->12204 12204->12202 12204->12203 12205->12145 12206->12153 12208 ddfe4b 12207->12208 12209 ddfe53 12207->12209 12221 de026f WaitForSingleObject 12208->12221 12222 dd5eff GetProcessHeap RtlAllocateHeap 12209->12222 12212 ddfe5f SetFilePointer ReadFile 12213 dd2f91 6 API calls 12212->12213 12214 ddfe8f 12213->12214 12223 dd5eee GetProcessHeap RtlFreeHeap 12214->12223 12216 ddfe96 12217 ddfe9c ReleaseMutex 12216->12217 12218 dd786d 12216->12218 12217->12218 12219 dd1085 GetProcessHeap RtlAllocateHeap 12218->12219 12219->12163 12220->12155 12221->12209 12222->12212 12223->12216 12224->12171 12225->12174 12226->12179 12227->12184 12228->11395 12229->11397 12231 ddf76b 5 API calls 12230->12231 12232 ddedcb 12231->12232 12233 dd346a 9 API calls 12232->12233 12234 ddedd8 12233->12234 12235 dd362d 3 API calls 12234->12235 12236 ddede4 12235->12236 12268 ddeafb 12236->12268 12238 ddede9 12305 dd5ea5 VirtualFree 12238->12305 12240 ddedfb 12240->11403 12241->11405 12242->11407 12244 ddea95 GetCurrentThreadId 12243->12244 12245 ddead4 12243->12245 12246 ddeacd 12244->12246 12247 ddeaa0 12244->12247 12248 ddec8c CloseHandle 12245->12248 12250 ddec8c CloseHandle 12246->12250 12249 ddeaa6 SetEvent WaitForSingleObject 12247->12249 12258 ddeaf4 12247->12258 12251 ddeadc 12248->12251 12249->12246 12253 ddeac3 TerminateThread 12249->12253 12250->12245 12252 ddec8c CloseHandle 12251->12252 12254 ddeae4 12252->12254 12253->12246 12255 ddec8c CloseHandle 12254->12255 12256 ddeaec 12255->12256 12257 ddec8c CloseHandle 12256->12257 12257->12258 12258->11403 12260 ddecde 12259->12260 12261 ddece2 12259->12261 12360 dd5ea5 VirtualFree 12260->12360 12353 dd315f 12261->12353 12265 dd308c lstrlenA 12267 dded00 WriteFile 12265->12267 12266 dded18 12266->11403 12267->12260 12269 ddea89 5 API calls 12268->12269 12270 ddeb0e CreatePipe 12269->12270 12271 ddeb4f GetCurrentProcess GetCurrentProcess DuplicateHandle 12270->12271 12272 ddec47 12270->12272 12271->12272 12273 ddeb77 CreatePipe 12271->12273 12274 ddec8c CloseHandle 12272->12274 12273->12272 12275 ddeb93 GetCurrentProcess GetCurrentProcess DuplicateHandle 12273->12275 12276 ddec4f 12274->12276 12275->12272 12277 ddebb1 GetCurrentProcess GetCurrentProcess DuplicateHandle 12275->12277 12278 ddec8c CloseHandle 12276->12278 12277->12272 12279 ddebcb 12277->12279 12280 ddec57 12278->12280 12306 ddec8c 12279->12306 12282 ddec8c CloseHandle 12280->12282 12284 ddec5f 12282->12284 12286 ddec8c CloseHandle 12284->12286 12285 ddec8c CloseHandle 12287 ddebdb 12285->12287 12288 ddec67 12286->12288 12289 dd362d 3 API calls 12287->12289 12290 ddec8c CloseHandle 12288->12290 12291 ddebf0 12289->12291 12292 ddec6f 12290->12292 12309 dde891 12291->12309 12293 ddea89 5 API calls 12292->12293 12295 ddec79 12293->12295 12315 dd5ea5 VirtualFree 12295->12315 12298 ddec8c CloseHandle 12299 ddec01 12298->12299 12301 ddec8c CloseHandle 12299->12301 12300 ddec83 12300->12238 12302 ddec09 12301->12302 12303 ddec8c CloseHandle 12302->12303 12304 ddec11 CreateEventA CreateThread 12303->12304 12304->12272 12304->12295 12317 dde92a 12304->12317 12305->12240 12307 ddebd3 12306->12307 12308 ddec94 CloseHandle 12306->12308 12307->12285 12308->12307 12310 dd1052 12309->12310 12311 dde8a6 CreateProcessW 12310->12311 12312 dde8ed 12311->12312 12316 dd5ea5 VirtualFree 12312->12316 12314 dde8fe 12314->12272 12314->12298 12315->12300 12316->12314 12318 dde95d 12317->12318 12320 dde947 WaitForMultipleObjects 12318->12320 12325 dde96f 12318->12325 12326 dde996 12318->12326 12320->12318 12321 dde976 12320->12321 12322 dde996 25 API calls 12321->12322 12322->12325 12323 ddea89 5 API calls 12324 dde98c 12323->12324 12325->12323 12327 ddea49 PeekNamedPipe 12326->12327 12328 dde9a5 12327->12328 12329 ddea67 GetLastError 12327->12329 12330 ddea72 12328->12330 12342 dd1085 GetProcessHeap RtlAllocateHeap 12328->12342 12329->12330 12330->12318 12332 dde9b7 ReadFile 12332->12329 12339 dde9d9 12332->12339 12333 dd2f91 6 API calls 12333->12339 12335 dd2ecf 8 API calls 12335->12339 12337 dd308c lstrlenA 12337->12339 12338 dd33f5 3 API calls 12338->12339 12339->12333 12339->12335 12339->12337 12339->12338 12340 dd5ea5 VirtualFree 12339->12340 12341 dd3036 2 API calls 12339->12341 12343 dd1099 GetProcessHeap HeapFree 12339->12343 12344 dd2f22 12339->12344 12340->12339 12341->12327 12342->12332 12343->12339 12351 dd1085 GetProcessHeap RtlAllocateHeap 12344->12351 12346 dd2f33 12347 dd33bf 4 API calls 12346->12347 12348 dd2f59 12347->12348 12349 dd2f63 12348->12349 12352 dd1099 GetProcessHeap HeapFree 12348->12352 12349->12339 12351->12346 12352->12349 12354 dd33bf 4 API calls 12353->12354 12355 dd3173 12354->12355 12361 dd318a 12355->12361 12357 dd317b 12368 dd5ea5 VirtualFree 12357->12368 12359 dd3183 12359->12265 12360->12266 12362 dd308c lstrlenA 12361->12362 12363 dd319c 12362->12363 12364 dd308c lstrlenA 12363->12364 12365 dd31a5 12364->12365 12366 dd5e46 3 API calls 12365->12366 12367 dd31b1 lstrcatA 12366->12367 12367->12357 12368->12359 12370 de0ca4 Process32FirstW 12369->12370 12371 de0cd5 12369->12371 12372 de0cb4 12370->12372 12371->11422 12373 de0cce CloseHandle 12372->12373 12374 de0cdf CloseHandle 12372->12374 12375 de0cbc Process32NextW 12372->12375 12373->12371 12376 dd35e5 4 API calls 12374->12376 12375->12372 12376->12371 12378 dd362d 3 API calls 12377->12378 12379 dd4364 12378->12379 12385 dd5ea5 VirtualFree 12379->12385 12381 dd2ae1 12381->11425 12386 dd5ea5 VirtualFree 12382->12386 12384 dd2af1 12384->11274 12385->12381 12386->12384 12404 dd5ea5 VirtualFree 12387->12404 12389 ddff22 12389->11433 12391 dd362d 3 API calls 12390->12391 12392 dd39cd 12391->12392 12405 dd5ea5 VirtualFree 12392->12405 12394 dd2b3f 12395 dd5ea5 VirtualFree 12394->12395 12395->11451 12406 dd5ea5 VirtualFree 12396->12406 12398 dd39af 12398->11437 12400 dd362d 3 API calls 12399->12400 12401 dd3fe9 12400->12401 12407 dd5ea5 VirtualFree 12401->12407 12403 dd2b6b 12403->11446 12404->12389 12405->12394 12406->12398 12407->12403 12408->11467 12410 de01f4 12409->12410 12410->11472 12411->11488 12412->11495 12413->11498 12415 de2d42 12414->12415 12427 de2e94 12414->12427 12416 de2d71 12415->12416 12417 de2a6b 4 API calls 12415->12417 12415->12427 12418 de2d7a CoCreateInstance 12416->12418 12416->12427 12417->12416 12419 de2d9c 12418->12419 12418->12427 12420 de24eb CoTaskMemFree 12419->12420 12419->12427 12421 de2e5e 12420->12421 12422 de2b2a 3 API calls 12421->12422 12423 de2e72 12422->12423 12424 dd5ca3 3 API calls 12423->12424 12425 de2e7d 12424->12425 12428 de25d8 12425->12428 12427->11494 12429 de2f63 VirtualFree 12428->12429 12430 de25f0 12429->12430 12430->12427 12467 dd1534 12431->12467 12433 de225e 12438 de227b 12433->12438 12470 dd5f53 GetProcessHeap HeapAlloc 12433->12470 12436 de226f 12436->12438 12439 de2ed4 20 API calls 12436->12439 12437 dd29c5 12448 dd12d3 12437->12448 12471 de2c3f 12438->12471 12439->12438 12440 dd33bf 4 API calls 12446 de228f 12440->12446 12441 dd309d 10 API calls 12441->12446 12442 dd3437 3 API calls 12442->12446 12443 dd5ea5 VirtualFree 12443->12446 12444 dd5ca3 LoadLibraryA GetProcAddress ExitProcess 12444->12446 12445 dd362d 3 API calls 12445->12446 12446->12437 12446->12440 12446->12441 12446->12442 12446->12443 12446->12444 12446->12445 12477 dd1433 12446->12477 12449 dd1534 2 API calls 12448->12449 12452 dd12ee 12449->12452 12450 dd1311 12454 dd47be 12450->12454 12452->12450 12453 dd1433 6 API calls 12452->12453 12493 dd1581 12452->12493 12453->12452 12455 dd12d3 12 API calls 12454->12455 12456 dd47d6 12455->12456 12457 dd29db 12456->12457 12458 dd1aa8 VirtualFree 12456->12458 12457->11508 12458->12457 12460 dd47ab 12459->12460 12461 dd29eb 12459->12461 12462 dd1aa8 VirtualFree 12460->12462 12461->11512 12463 dd1aa8 12461->12463 12462->12461 12464 dd1acd 12463->12464 12466 dd1abb 12463->12466 12464->11512 12466->12464 12498 dd5ea5 VirtualFree 12466->12498 12489 dd5f53 GetProcessHeap HeapAlloc 12467->12489 12469 dd155d 12469->12433 12469->12469 12470->12436 12490 dd5f53 GetProcessHeap HeapAlloc 12471->12490 12473 de2c88 12473->12446 12474 dd5ca3 3 API calls 12476 de2c60 12474->12476 12475 dd2481 2 API calls 12475->12476 12476->12473 12476->12474 12476->12475 12478 dd14f4 12477->12478 12479 dd144a 12477->12479 12481 dd3437 3 API calls 12478->12481 12491 dd5f53 GetProcessHeap HeapAlloc 12479->12491 12482 dd1510 12481->12482 12492 dd5ea5 VirtualFree 12482->12492 12484 dd152d 12484->12446 12485 dd14e2 12485->12478 12488 dd1aa8 VirtualFree 12485->12488 12486 dd1473 12486->12485 12487 dd3437 3 API calls 12486->12487 12487->12486 12488->12478 12489->12469 12490->12476 12491->12486 12492->12484 12494 dd5ca3 3 API calls 12493->12494 12495 dd1596 12494->12495 12496 dd362d 3 API calls 12495->12496 12497 dd15a6 12496->12497 12497->12452 12498->12466 12500 dd362d 3 API calls 12499->12500 12501 dd5c80 12500->12501 12501->11520 12518 dd5eff GetProcessHeap RtlAllocateHeap 12502->12518 12504 ddd382 12505 dd3125 4 API calls 12504->12505 12506 ddd397 12505->12506 12507 dd3125 4 API calls 12506->12507 12508 ddd3aa 12507->12508 12519 dd1f4b CreateThread 12508->12519 12510 ddd3c5 12511 ddd3cc CloseHandle 12510->12511 12512 ddd3d5 12510->12512 12511->12512 12520 dd5ea5 VirtualFree 12512->12520 12514 ddd3dd 12521 dd5ea5 VirtualFree 12514->12521 12516 ddd3e5 12516->11524 12517->11526 12518->12504 12519->12510 12520->12514 12521->12516 12523 dd35e5 4 API calls 12522->12523 12524 ddde39 RegOpenKeyExW 12523->12524 12525 ddde5b 12524->12525 12546 ddde8b 12524->12546 12526 dd35e5 4 API calls 12525->12526 12528 ddde6c 12526->12528 12527 dd3036 2 API calls 12529 ddde95 12527->12529 12530 de0fc3 12 API calls 12528->12530 12594 dd5ea5 VirtualFree 12529->12594 12532 ddde75 12530->12532 12593 dd5ea5 VirtualFree 12532->12593 12533 ddde9d 12535 de0fae RegCloseKey 12533->12535 12537 dddea5 12535->12537 12536 ddde7f 12538 dddeab 12536->12538 12539 ddde83 12536->12539 12537->11530 12537->11531 12540 dd2ecf 8 API calls 12538->12540 12541 de0fae RegCloseKey 12539->12541 12542 dddebc 12540->12542 12541->12546 12595 dd3248 lstrcmpW 12542->12595 12544 dddec3 12596 dd5ea5 VirtualFree 12544->12596 12546->12527 12548 de16b4 12547->12548 12549 de16a4 12547->12549 12550 de0fc3 12 API calls 12548->12550 12551 dd362d 3 API calls 12549->12551 12553 de16c0 12550->12553 12552 de16b0 12551->12552 12598 dd5ea5 VirtualFree 12552->12598 12554 dd2ecf 8 API calls 12553->12554 12564 de16e1 12553->12564 12558 de16d0 12554->12558 12555 dd362d 3 API calls 12555->12552 12557 de16f7 12559 dd3036 2 API calls 12557->12559 12560 dd3437 3 API calls 12558->12560 12561 dde472 12559->12561 12562 de16d9 12560->12562 12561->11542 12597 dd5ea5 VirtualFree 12562->12597 12564->12555 12565->11550 12566->11557 12567->11581 12568->11585 12569->11633 12570->11614 12572 ddf4f0 GetProcAddress 12571->12572 12573 ddf500 12571->12573 12572->12573 12573->11543 12574->11574 12575->11586 12577 ddd464 12576->12577 12578 ddd48b 12576->12578 12599 ddf56d 12577->12599 12578->11594 12578->11595 12583 de1668 12582->12583 12584 dde688 12582->12584 12585 dd3221 7 API calls 12583->12585 12590 dd5ea5 VirtualFree 12584->12590 12586 de1676 12585->12586 12587 de1039 RegSetValueExW 12586->12587 12588 de1681 12587->12588 12589 dd3036 2 API calls 12588->12589 12589->12584 12590->11616 12591->11628 12592->11632 12593->12536 12594->12533 12595->12544 12596->12546 12597->12564 12598->12557 12600 dd1052 12599->12600 12601 ddf5a1 AllocateAndInitializeSid 12600->12601 12602 ddf5cc LookupAccountSidW 12601->12602 12603 ddf5f1 GetLastError 12601->12603 12602->12603 12604 ddf5f7 12602->12604 12603->12604 12605 ddf5fc FreeSid 12604->12605 12606 ddf605 12604->12606 12605->12606 12607 dd35e5 4 API calls 12606->12607 12608 ddd471 NetLocalGroupAddMembers 12607->12608 12609 dd5ea5 VirtualFree 12608->12609 12609->12578 12610->11636 12611->11646 12612->11648 12613->11660 12615 dd3525 PathFindExtensionW 12614->12615 12616 dd3530 12614->12616 12615->12616 12617 dd35e5 4 API calls 12616->12617 12618 dd282e 12617->12618 12618->11665 12619->11668 12620->11670 12621->11674 12622->11680 12623->11687 12630 dd5eff GetProcessHeap RtlAllocateHeap 12624->12630 12626 de3df4 12631 dd1f4b CreateThread 12626->12631 12628 dd2742 12629 dd5ea5 VirtualFree 12628->12629 12629->11693 12630->12626 12631->12628 12633 dd1875 2 API calls 12632->12633 12634 dd3be2 12633->12634 12635 dd3437 3 API calls 12634->12635 12636 dd3bee 12635->12636 12649 dd1bed 12636->12649 12640 dd3c08 12641 dd2bc3 12640->12641 12642 dd1ad5 VirtualFree 12640->12642 12641->11705 12642->12641 12644 dd3b9c 12643->12644 12645 dd3ba2 12643->12645 12646 dd1ad5 VirtualFree 12644->12646 12656 dd5ea5 VirtualFree 12645->12656 12646->12645 12648 dd2bd3 12648->11709 12648->11710 12650 dd1875 2 API calls 12649->12650 12654 dd1bfa 12650->12654 12651 dd1c1f 12655 dd5ea5 VirtualFree 12651->12655 12652 dd18c2 6 API calls 12652->12654 12653 dd1776 6 API calls 12653->12654 12654->12651 12654->12652 12654->12653 12655->12640 12656->12648 12658 de1eb6 12657->12658 12658->12658 12659 de1ec3 VirtualProtect 12658->12659 12659->11715 12661 dd7b09 12660->12661 12662 dd7b0e 12660->12662 12693 dd8617 GetCurrentProcess IsWow64Process GetProcessHeap 12661->12693 12664 dd7b23 OpenProcess 12662->12664 12694 dd7948 12662->12694 12666 dd7b40 12664->12666 12667 dd2617 12664->12667 12703 dd8633 12666->12703 12667->11721 12672 dd8633 7 API calls 12673 dd7b86 12672->12673 12673->12667 12719 dd8568 12673->12719 12675 dd7bc5 12675->12667 12676 dd8568 7 API calls 12675->12676 12677 dd7bf3 12676->12677 12677->12667 12727 dd86e1 12677->12727 12680 dd7a0c OpenProcess 12679->12680 12681 dd79fe 12679->12681 12683 dd7a2a VirtualAllocEx 12680->12683 12685 dd7a22 12680->12685 12758 dd8617 GetCurrentProcess IsWow64Process GetProcessHeap 12681->12758 12683->12685 12686 dd7a4a VirtualProtectEx VirtualAllocEx 12683->12686 12684 dd7a03 12684->12680 12685->11721 12686->12685 12687 dd7a80 12686->12687 12688 dd7a92 WriteProcessMemory 12687->12688 12688->12685 12689 dd7aa7 12688->12689 12689->12685 12690 dd7ab7 WriteProcessMemory 12689->12690 12690->12685 12691 dd7acf 12690->12691 12691->12685 12692 dd7ad4 CreateRemoteThread 12691->12692 12692->12685 12693->12662 12695 ddf7e0 2 API calls 12694->12695 12696 dd795e VirtualAlloc GetWindowsDirectoryA lstrlenA 12695->12696 12697 dd7995 12696->12697 12698 dd79a1 CreateProcessA 12697->12698 12699 dd79db 12698->12699 12700 dd79cb Sleep 12698->12700 12702 ddf7b9 2 API calls 12699->12702 12701 dd79e3 12700->12701 12701->12664 12702->12701 12704 dd8653 12703->12704 12706 dd8668 12703->12706 12704->12706 12735 dd7fc0 12704->12735 12709 dd7b50 12706->12709 12743 dd7cb7 12706->12743 12709->12667 12711 dd878c 12709->12711 12712 dd87a7 12711->12712 12715 dd87bc 12711->12715 12713 dd7fc0 4 API calls 12712->12713 12712->12715 12714 dd87b0 12713->12714 12716 dd7c1d 4 API calls 12714->12716 12717 dd7cb7 3 API calls 12715->12717 12718 dd7b71 12715->12718 12716->12715 12717->12718 12718->12672 12720 dd8586 12719->12720 12724 dd859b 12719->12724 12721 dd7fc0 4 API calls 12720->12721 12720->12724 12722 dd858f 12721->12722 12723 dd7c1d 4 API calls 12722->12723 12723->12724 12725 dd7cb7 3 API calls 12724->12725 12726 dd85f9 12724->12726 12725->12726 12726->12675 12728 dd870c 12727->12728 12730 dd8721 12727->12730 12729 dd7fc0 4 API calls 12728->12729 12728->12730 12731 dd8715 12729->12731 12733 dd8773 12730->12733 12734 dd7cb7 3 API calls 12730->12734 12732 dd7c1d 4 API calls 12731->12732 12732->12730 12733->12667 12734->12733 12736 dd7fd9 12735->12736 12737 dd7fd0 12735->12737 12739 dd7c1d 12736->12739 12737->12736 12747 dd7fe6 12737->12747 12740 dd7c31 12739->12740 12742 dd7c3e 12739->12742 12740->12742 12755 dd7d1c 12740->12755 12742->12706 12744 dd7ccd GetModuleHandleW GetProcAddress GetProcAddress 12743->12744 12745 dd7cc3 12743->12745 12746 dd7d06 12744->12746 12745->12744 12745->12746 12746->12709 12748 dd7fff 12747->12748 12749 dd817d 12747->12749 12748->12749 12751 dd8246 12748->12751 12752 dd1f2c 2 API calls 12748->12752 12754 dd1085 GetProcessHeap RtlAllocateHeap 12748->12754 12749->12736 12753 dd1f2c 2 API calls 12751->12753 12752->12748 12753->12749 12754->12748 12756 dd7fc0 4 API calls 12755->12756 12757 dd7d2d 12756->12757 12757->12742 12758->12684 12759->11729 12765 ddf432 12760->12765 12762 dd26b0 12763 dd5ea5 VirtualFree 12762->12763 12763->11741 12764->11743 12772 dd1085 GetProcessHeap RtlAllocateHeap 12765->12772 12767 ddf443 12768 ddf473 12767->12768 12769 ddf44e lstrcpyA CreateThread 12767->12769 12773 dd1099 GetProcessHeap HeapFree 12768->12773 12771 ddf479 12769->12771 12774 ddee44 WSAStartup 12769->12774 12771->12762 12772->12767 12773->12771 12781 ddee9a socket gethostbyname 12774->12781 12777 ddee7a 12789 ddef4f 12777->12789 12778 ddee74 WSACleanup 12778->12777 12805 dd102c 12781->12805 12784 dd1052 12785 ddeeff InetNtopW 12784->12785 12786 ddee6d 12785->12786 12787 ddef21 12785->12787 12786->12777 12786->12778 12788 ddef24 connect 12787->12788 12788->12786 12788->12788 12791 ddef66 12789->12791 12792 ddee95 12791->12792 12795 ddf131 send 12791->12795 12797 ddf006 InetNtopW 12791->12797 12798 ddf0bc InetNtopW 12791->12798 12800 ddf1da 5 API calls 12791->12800 12804 ddf089 getaddrinfo 12791->12804 12807 dd5f53 GetProcessHeap HeapAlloc 12791->12807 12808 ddf1da 12791->12808 12814 ddf3bd socket connect 12791->12814 12818 dd1085 GetProcessHeap RtlAllocateHeap 12791->12818 12825 dd1099 GetProcessHeap HeapFree 12791->12825 12826 ddf23d 12791->12826 12795->12791 12797->12791 12819 ddf33c socket 12798->12819 12802 ddf0fa CreateThread 12800->12802 12802->12791 12842 ddf16e 12802->12842 12804->12791 12806 dd103b htons 12805->12806 12806->12784 12807->12791 12837 dd1085 GetProcessHeap RtlAllocateHeap 12808->12837 12810 ddf1f3 12811 ddf21d send 12810->12811 12838 dd1099 GetProcessHeap HeapFree 12811->12838 12813 ddf237 12813->12791 12815 ddf42b 12814->12815 12816 ddf401 12814->12816 12815->12791 12817 ddf415 InetNtopW 12816->12817 12817->12815 12818->12791 12820 dd102c 12819->12820 12821 ddf370 connect 12820->12821 12822 ddf389 12821->12822 12823 ddf3b6 12821->12823 12824 ddf39d InetNtopW 12822->12824 12823->12791 12824->12823 12825->12791 12839 dd1085 GetProcessHeap RtlAllocateHeap 12826->12839 12828 ddf259 12840 dd1085 GetProcessHeap RtlAllocateHeap 12828->12840 12830 ddf27a recv 12831 ddf32b 12830->12831 12832 ddf262 12830->12832 12831->12791 12832->12830 12832->12831 12836 ddf2b8 12832->12836 12833 ddf317 12841 dd1099 GetProcessHeap HeapFree 12833->12841 12834 ddf2e2 recv 12834->12831 12834->12836 12836->12831 12836->12833 12836->12834 12837->12810 12838->12813 12839->12828 12840->12832 12841->12831 12846 ddf184 12842->12846 12848 ddf1c5 12842->12848 12844 ddf18f recv 12845 ddf1c7 closesocket 12844->12845 12844->12846 12853 dd1099 GetProcessHeap HeapFree 12845->12853 12846->12845 12846->12848 12849 ddf1da 5 API calls 12846->12849 12851 dd1085 GetProcessHeap RtlAllocateHeap 12846->12851 12852 dd1099 GetProcessHeap HeapFree 12846->12852 12849->12846 12851->12844 12852->12846 12853->12848 12857 dd5ea5 VirtualFree 12854->12857 12856 dd2989 12856->11274 12857->12856 12858->11752 12860 de0f65 12859->12860 12861 de0f54 RegDeleteValueW 12859->12861 12862 dd5ea5 VirtualFree 12860->12862 12861->12860 12862->11764 14406 dd813c 14409 dd8148 14406->14409 14407 dd817d 14409->14407 14410 dd8246 14409->14410 14411 dd1f2c 2 API calls 14409->14411 14413 dd1085 GetProcessHeap RtlAllocateHeap 14409->14413 14412 dd1f2c 2 API calls 14410->14412 14411->14409 14412->14407 14413->14409 12870 dd1c36 12873 dd5ea5 VirtualFree 12870->12873 12872 dd1c47 12873->12872 8742 dd122b 8745 dde703 InitializeCriticalSection 8742->8745 8797 dd5f53 GetProcessHeap HeapAlloc 8745->8797 8747 dde752 8798 dd32ff 8747->8798 8750 dd32ff 9 API calls 8751 dde79b 8750->8751 8808 dd35e5 lstrlenW 8751->8808 8753 dde7a8 8813 dd31d4 8753->8813 8759 dde7c5 8826 dd5ea5 VirtualFree 8759->8826 8761 dde7d0 8827 ddfc58 GetCurrentProcess 8761->8827 8764 dde80f 8766 dd31d4 5 API calls 8764->8766 8765 dde7da 8767 dd32ff 9 API calls 8765->8767 8768 dde819 8766->8768 8769 dde7e6 8767->8769 8770 dd3437 3 API calls 8768->8770 8771 dd31d4 5 API calls 8769->8771 8772 dde826 8770->8772 8773 dde7f0 8771->8773 8839 dd5ea5 VirtualFree 8772->8839 8775 dd3437 3 API calls 8773->8775 8776 dde7fd 8775->8776 8830 dd5ea5 VirtualFree 8776->8830 8777 dde80d 8831 dd346a 8777->8831 8780 dde805 8782 dd32ff 9 API calls 8780->8782 8782->8777 8783 dd346a 9 API calls 8784 dde843 8783->8784 8785 dd346a 9 API calls 8784->8785 8786 dde852 8785->8786 8838 ddf71f SHCreateDirectoryExW 8786->8838 8788 dde859 8789 dd3437 3 API calls 8788->8789 8790 dde866 8789->8790 8791 dd346a 9 API calls 8790->8791 8792 dde872 8791->8792 8793 dd346a 9 API calls 8792->8793 8794 dde87f 8793->8794 8795 dd346a 9 API calls 8794->8795 8796 dd1230 8795->8796 8797->8747 8799 dd330b 8798->8799 8800 dd3310 8798->8800 8848 dd5ea5 VirtualFree 8799->8848 8802 dd35e5 4 API calls 8800->8802 8803 dd331e 8802->8803 8840 dd3335 8803->8840 8805 dd3326 8847 dd5ea5 VirtualFree 8805->8847 8807 dd332e 8807->8750 8809 dd5e22 VirtualAlloc 8808->8809 8810 dd3600 lstrlenW 8809->8810 8865 dd5f31 8810->8865 8812 dd361a lstrcpyW 8812->8753 8867 dd1052 8813->8867 8816 dd35e5 4 API calls 8817 dd321b 8816->8817 8818 dd3437 8817->8818 8819 dd3449 8818->8819 8820 dd3462 8818->8820 8869 dd3384 8819->8869 8825 dd5ea5 VirtualFree 8820->8825 8822 dd3450 8823 dd5e22 VirtualAlloc 8822->8823 8824 dd3457 lstrcpyW 8823->8824 8824->8820 8825->8759 8826->8761 8872 de0c36 GetModuleHandleA GetProcAddress 8827->8872 8830->8780 8832 dd35e5 4 API calls 8831->8832 8833 dd347b 8832->8833 8834 dd3335 5 API calls 8833->8834 8835 dd3483 8834->8835 8874 dd5ea5 VirtualFree 8835->8874 8837 dd348b 8837->8783 8838->8788 8839->8777 8849 dd3261 8840->8849 8842 dd3347 8843 dd3261 lstrlenW 8842->8843 8844 dd3350 8843->8844 8852 dd5e46 8844->8852 8847->8807 8848->8800 8850 dd326f 8849->8850 8851 dd3266 lstrlenW 8849->8851 8850->8842 8851->8842 8853 dd5e5c 8852->8853 8854 dd5e61 8852->8854 8860 dd5e02 8853->8860 8856 dd5e71 8854->8856 8863 dd5eb4 VirtualAlloc 8854->8863 8858 dd3360 lstrcatW 8856->8858 8864 dd5ea5 VirtualFree 8856->8864 8858->8805 8861 dd5e0c 8860->8861 8862 dd5e10 VirtualQuery 8860->8862 8861->8854 8862->8854 8863->8856 8864->8858 8866 dd5f3d 8865->8866 8866->8812 8868 dd105a ExpandEnvironmentStringsW 8867->8868 8868->8816 8870 dd338c lstrlenW 8869->8870 8871 dd3389 8869->8871 8870->8822 8871->8822 8873 dde7d5 8872->8873 8873->8764 8873->8765 8874->8837 14467 dd1b2b 14470 dd37c0 14467->14470 14473 dd5ea5 VirtualFree 14470->14473 14472 dd1b33 14473->14472

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 272 de290f-de2949 CoInitialize CoCreateInstance 273 de294f-de295b 272->273 274 de2a66-de2a6a 272->274 275 de295f-de2964 273->275 275->274 276 de296a-de2972 275->276 278 de2a22-de2a3a 276->278 280 de2977-de2990 278->280 281 de2a40-de2a45 278->281 280->281 287 de2996-de29b5 VariantInit 280->287 282 de2a47-de2a4d 281->282 283 de2a50-de2a55 281->283 282->283 285 de2a57-de2a5d 283->285 286 de2a60 CoUninitialize 283->286 285->286 286->274 291 de29ce-de29d8 call dd5f53 287->291 292 de29b7-de29cc 287->292 296 de29da-de29e3 call de2bc7 291->296 297 de29e5 291->297 292->281 292->291 299 de29e7-de29f0 296->299 297->299 301 de29f2 299->301 302 de2a10-de2a20 call dd2481 299->302 303 de29f4-de2a0e 301->303 302->278 303->302 303->303
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00DE291E
                                                      • CoCreateInstance.OLE32(00DE45E0,00000000,00000001,00DE73F0,?,?,?,?,00DE2F37,?,?,?,00DE227B), ref: 00DE293E
                                                      • VariantInit.OLEAUT32(?), ref: 00DE299A
                                                      • CoUninitialize.OLE32(?,?,?,00DE2F37,?,?,?,00DE227B), ref: 00DE2A60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateInitInitializeInstanceUninitializeVariant
                                                      • String ID: Description$FriendlyName
                                                      • API String ID: 4142528535-3192352273
                                                      • Opcode ID: fbe65f4bef5a284350e7e4a2249faeb057d84453cdfb5cf0dcfc8629da567a6c
                                                      • Instruction ID: f2323e66abe6f2d2f8083a63bf530ac5061973ac35bc34e687c288d917438ce1
                                                      • Opcode Fuzzy Hash: fbe65f4bef5a284350e7e4a2249faeb057d84453cdfb5cf0dcfc8629da567a6c
                                                      • Instruction Fuzzy Hash: AA413F74A00285AFCB24EFA6C884DBEBBBDEF84704B14445DE446EB251DB70DA41CB70

                                                      Control-flow Graph

                                                      APIs
                                                      • setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 00DD5666
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,750901C0,?,00DD5A4F,.bss,00000000), ref: 00DD33C8
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,?,00DD5A4F,.bss,00000000), ref: 00DD33D5
                                                        • Part of subcall function 00DD33BF: lstrcpyA.KERNEL32(00000000,?,?,00DD5A4F,.bss,00000000), ref: 00DD33E8
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      • recv.WS2_32(000000FF,?,0000000C,00000000), ref: 00DD56B6
                                                      • recv.WS2_32(000000FF,?,000000FF,00000000), ref: 00DD5726
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlenrecv$FreeVirtuallstrcpysetsockopt
                                                      • String ID: `$warzone160
                                                      • API String ID: 3973575906-811885577
                                                      • Opcode ID: 1c9cdcd6e126b6b4d128daf0540d82b0da8712c76cba157f5c57645044755bf2
                                                      • Instruction ID: 76bc66724b655bce1e89c6941b1f9166570d769b6fcbdc01e544883d3a733c4e
                                                      • Opcode Fuzzy Hash: 1c9cdcd6e126b6b4d128daf0540d82b0da8712c76cba157f5c57645044755bf2
                                                      • Instruction Fuzzy Hash: A9515E71900118EBCB29EFA1DC96DFEBB78EF54350F14012AF415A6291EB309B48CBB1
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateProcess
                                                      • String ID:
                                                      • API String ID: 1357844191-0
                                                      • Opcode ID: aa86f1d7152a93d591e0e6b15c10028d2c1a5d3efff506dfa5f8e0d8a308ba4d
                                                      • Instruction ID: 02d25699d5d0bbde7871555b727ebfd4d8707283bdadf93f4c34196a72492eb1
                                                      • Opcode Fuzzy Hash: aa86f1d7152a93d591e0e6b15c10028d2c1a5d3efff506dfa5f8e0d8a308ba4d
                                                      • Instruction Fuzzy Hash: 5BB00275944340FBDF457BE09E8DF097B69AB59703F014544F245C9160D6754490DB31

                                                      Control-flow Graph

                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00DE3467
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00DE3483
                                                        • Part of subcall function 00DE1E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E4E
                                                        • Part of subcall function 00DE1E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E61
                                                        • Part of subcall function 00DE1E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E72
                                                        • Part of subcall function 00DE1E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E7F
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00DE34EA
                                                      • GetLastError.KERNEL32 ref: 00DE34F5
                                                      • RegCreateKeyExA.KERNEL32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00DE352F
                                                      • RegSetValueExA.KERNEL32(?,MaxConnectionsPer1_0Server,00000000,00000004,?,00000004), ref: 00DE354E
                                                      • RegSetValueExA.KERNEL32(?,MaxConnectionsPerServer,00000000,00000004,?,00000004), ref: 00DE3563
                                                      • RegCloseKey.ADVAPI32(?), ref: 00DE3569
                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 00DE35C5
                                                      • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 00DE35D8
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00DE35E7
                                                        • Part of subcall function 00DE1A3C: GetModuleFileNameW.KERNEL32(00000000,00F1CBF0,00000208,00000000,00000000,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A58
                                                        • Part of subcall function 00DE1A3C: IsUserAnAdmin.SHELL32 ref: 00DE1A5E
                                                        • Part of subcall function 00DE1A3C: FindResourceW.KERNEL32(00000000,00000066,WM_DSP,?,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A87
                                                        • Part of subcall function 00DE1A3C: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,00DD57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00DE1A91
                                                        • Part of subcall function 00DE1A3C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,00DD57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00DE1A9B
                                                        • Part of subcall function 00DE1A3C: LockResource.KERNEL32(00000000,?,?,?,?,00DD57B9,?,00000000,00000000,?,?,?,?,?,?,00000000), ref: 00DE1AA2
                                                        • Part of subcall function 00DE1136: CopyFileW.KERNEL32(?,?,00000000,?,00DE4684,?,00000000,?,?,?,?,00000000,750901C0,00000000), ref: 00DE11D7
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DE0BD9: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,750901C0,00000000), ref: 00DE0C14
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      • MaxConnectionsPerServer, xrefs: 00DE355A
                                                      • \Microsoft Vision\, xrefs: 00DE35CB
                                                      • MaxConnectionsPer1_0Server, xrefs: 00DE3545
                                                      • Software\Microsoft\Windows\CurrentVersion\Internet Settings, xrefs: 00DE3525
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Create$Resource$CloseHeapModuleNameProcessValue$AdminAllocateCopyCountDirectoryErrorEventFindFolderFreeHandleLastLoadLockPathReadSizeSizeofTickUserVirtuallstrcatlstrcpy
                                                      • String ID: MaxConnectionsPer1_0Server$MaxConnectionsPerServer$Software\Microsoft\Windows\CurrentVersion\Internet Settings$\Microsoft Vision\
                                                      • API String ID: 3138263686-2552559493
                                                      • Opcode ID: 69f798988ad970e571474df05d95205d076d1c2015d743b9ab2fd75ef56441f4
                                                      • Instruction ID: b7c98dfed1e82c0595d517e346286018de46eb617d3ba8611fd6c5c4ad2745aa
                                                      • Opcode Fuzzy Hash: 69f798988ad970e571474df05d95205d076d1c2015d743b9ab2fd75ef56441f4
                                                      • Instruction Fuzzy Hash: F0611DB5508384AFD720FB61DC85EAFB7ACEF94704F04092EF68596251DA709A48CB72

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00DDF481: GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,00DE3589,?,00DE1618,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\,00000000,InitWindows), ref: 00DDF4A2
                                                        • Part of subcall function 00DE0F6E: RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,750901C0,?,?,00DE1165,?,?), ref: 00DE0F8E
                                                        • Part of subcall function 00DE0FAE: RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,00DE4684,?,00000000,?,?,?,?,00000000,750901C0,00000000), ref: 00DE11D7
                                                        • Part of subcall function 00DE106C: RegCreateKeyExW.ADVAPI32(750901C0,00000000,00000000,00000000,00000000,00DE3589,00000000,?,?,?,?,00DE3589,?,00DE158B,80000001,?), ref: 00DE10A0
                                                        • Part of subcall function 00DE106C: RegOpenKeyExW.KERNEL32(750901C0,00000000,00000000,00DE3589,?,?,?,00DE3589,?,00DE158B,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 00DE10BB
                                                        • Part of subcall function 00DE1039: RegSetValueExW.KERNEL32(?,750901C0,00000000,?,?,?,?,?,00DE1432,00000000,00000000,?,00000001,?,?,?), ref: 00DE1058
                                                      • SHGetKnownFolderPath.SHELL32(00DE4550,00000000,00000000,?,?,?,?,?,00000000,750901C0,00000000), ref: 00DE1264
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,:start,?,00DE7204,wmic process call create '",00000000,?,?,?,:start,") do %%A,for /F "usebackq tokens=*" %%A in ("), ref: 00DE1382
                                                        • Part of subcall function 00DDF76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 00DDF79C
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DDF71F: SHCreateDirectoryExW.SHELL32(00000000,?,00000000,00DE11A6,00000000,?,?,?,?,00000000,750901C0,00000000), ref: 00DDF725
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DD3335: lstrcatW.KERNEL32(00000000,750901C0,?,?,00DE3589,?,00DE1515,00DE3589,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3365
                                                      • DeleteFileW.KERNEL32(?,00000000,:Zone.Identifier,?,?,?,?,?,00000000,750901C0,00000000), ref: 00DE147C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Create$CopyFolderPathlstrcpy$CloseDeleteDirectoryFreeKnownModuleNameOpenSpecialValueVirtuallstrcat
                                                      • String ID: ") do %%A$:Zone.Identifier$:start$\programs.bat$for /F "usebackq tokens=*" %%A in ("$wmic process call create '"
                                                      • API String ID: 2154703971-2016382161
                                                      • Opcode ID: c10cadbee545d826504292b6f95bdba030e4ca20a9bfa994fa58b5f35b04e081
                                                      • Instruction ID: 408db59da57da3d4fafbcc613fb27176d25dbd18bcb189a73034472607e37cf9
                                                      • Opcode Fuzzy Hash: c10cadbee545d826504292b6f95bdba030e4ca20a9bfa994fa58b5f35b04e081
                                                      • Instruction Fuzzy Hash: 0BA10EB1A00249ABDF15FFA1DC92CEE7779EF94300B40446AF41267296DF34AA49CB71

                                                      Control-flow Graph

                                                      APIs
                                                      • InitializeCriticalSection.KERNEL32(00F1E020), ref: 00DDE710
                                                        • Part of subcall function 00DD5F53: GetProcessHeap.KERNEL32(00000000,000000F4,00DE0477,?,750901C0,00000000,00DD5A34), ref: 00DD5F56
                                                        • Part of subcall function 00DD5F53: HeapAlloc.KERNEL32(00000000), ref: 00DD5F5D
                                                        • Part of subcall function 00DD31D4: ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 00DD3207
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocCriticalEnvironmentExpandFreeInitializeProcessSectionStringsVirtuallstrcpy
                                                      • String ID: %ProgramFiles%$%ProgramW6432%$%windir%\System32$TermService$\Microsoft DN1$\rdpwrap.ini$\rfxvmt.dll$\sqlmap.dll
                                                      • API String ID: 2811233055-3289620323
                                                      • Opcode ID: cadc3947268518139e1be0100de67a771532267d375f0a8f0ff2d31939a7e7ca
                                                      • Instruction ID: abe630f7d19e721d59b6235bd32f9ccdac80b5dd55a713959074bdd30c8bdaa9
                                                      • Opcode Fuzzy Hash: cadc3947268518139e1be0100de67a771532267d375f0a8f0ff2d31939a7e7ca
                                                      • Instruction Fuzzy Hash: 7D31C471B006446B9B19BF699C929AD7B6ADFE8700701442FF8025B392CEB48F49D772

                                                      Control-flow Graph

                                                      APIs
                                                      • InitializeCriticalSection.KERNEL32(00F1DB10,?,00DD1221), ref: 00DD99D3
                                                      • LoadLibraryW.KERNEL32(User32.dll,?,00DD1221), ref: 00DD99FE
                                                        • Part of subcall function 00DE0969: lstrcmpA.KERNEL32(?,00DE1BD0,?,open,00DE1BD0), ref: 00DE09A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalInitializeLibraryLoadSectionlstrcmp
                                                      • String ID: GetRawInputData$MapVirtualKeyA$ToUnicode$User32.dll
                                                      • API String ID: 4274177235-2474467583
                                                      • Opcode ID: dd0fffdb092c4332b01c41aa8bddd6538a1e4755eb0fd4022659fdee31939912
                                                      • Instruction ID: a90ebdbaeb812bf856bc2d1e18db891d938edd54a735b2a0fc15cad93c627f42
                                                      • Opcode Fuzzy Hash: dd0fffdb092c4332b01c41aa8bddd6538a1e4755eb0fd4022659fdee31939912
                                                      • Instruction Fuzzy Hash: 0F014F75A582649B8344FF667C501893BB5D7C8710713812AF006D7352DB740981EB69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 317 dd57fb-dd5850 call dd3125 call de026f getaddrinfo 322 dd58af 317->322 323 dd5852-dd586b socket 317->323 325 dd58b1-dd58bf call dd5ea5 322->325 323->322 324 dd586d-dd58aa htons freeaddrinfo connect 323->324 326 dd58ac 324->326 327 dd58c2-dd58d1 ReleaseMutex 324->327 326->322 327->325
                                                      APIs
                                                        • Part of subcall function 00DD3125: lstrcatA.KERNEL32(00000000,750901C0,?,00000000,?,00DD35C4,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD3151
                                                        • Part of subcall function 00DE026F: WaitForSingleObject.KERNEL32(?,000000FF,00DD5824,750901C0,?,?,00000000,00DD4EA0,?,?,?,?,?,00000000,750901C0), ref: 00DE0273
                                                      • getaddrinfo.WS2_32(750901C0,00000000,00DD4EA0,00000000), ref: 00DD5848
                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00DD585F
                                                      • htons.WS2_32(00000000), ref: 00DD5885
                                                      • freeaddrinfo.WS2_32(00000000), ref: 00DD5895
                                                      • connect.WS2_32(?,?,00000010), ref: 00DD58A1
                                                      • ReleaseMutex.KERNEL32(?), ref: 00DD58CB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleWaitconnectfreeaddrinfogetaddrinfohtonslstrcatsocket
                                                      • String ID:
                                                      • API String ID: 2516106447-0
                                                      • Opcode ID: 2f47c544cf52895e2880b86a06dae7515456a46a4046974da23d9e9fa659c15a
                                                      • Instruction ID: eee5626270554576a534569885062095bafb5fe9c7c5d1fc267bfd1dad56b5db
                                                      • Opcode Fuzzy Hash: 2f47c544cf52895e2880b86a06dae7515456a46a4046974da23d9e9fa659c15a
                                                      • Instruction Fuzzy Hash: FB216D71900204EBDF10AF61D889BDABBB9FF44320F148066FA09EF295D7719A44DB74

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 394 dd5ce2-dd5cf5 GetCommandLineA 395 dd5d1f-dd5d21 394->395 396 dd5cf7-dd5cfc 394->396 397 dd5d1c-dd5d1d 395->397 398 dd5d23 395->398 399 dd5d0f-dd5d1a 396->399 400 dd5cfe 396->400 397->395 401 dd5d2c-dd5d2e 398->401 403 dd5d2a 399->403 402 dd5d00-dd5d04 400->402 404 dd5d25-dd5d27 401->404 405 dd5d30-dd5d5c GetStartupInfoA call dd5d70 call dd5d9d GetModuleHandleA call de3435 401->405 402->399 406 dd5d06-dd5d0d 402->406 403->401 404->405 407 dd5d29 404->407 413 dd5d61-dd5d69 call dd5d85 ExitProcess 405->413 406->399 406->402 407->403
                                                      APIs
                                                      • GetCommandLineA.KERNEL32 ref: 00DD5CE9
                                                      • GetStartupInfoA.KERNEL32(?), ref: 00DD5D38
                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00DD5D54
                                                      • ExitProcess.KERNEL32 ref: 00DD5D69
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                      • String ID:
                                                      • API String ID: 2164999147-0
                                                      • Opcode ID: 5b997371f7f857d372a46bb576934473f7dff400434339e0dedbc6797236284f
                                                      • Instruction ID: f728a0cc0b146c326721b375af6546f6f358dc8ac2466d2c880556c93ae2746b
                                                      • Opcode Fuzzy Hash: 5b997371f7f857d372a46bb576934473f7dff400434339e0dedbc6797236284f
                                                      • Instruction Fuzzy Hash: 40012D28004B841EDB243F78B48EAED3FA79F17305BA81049E4C2CB35BD6124C47C675

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 416 de1e21-de1e59 call dd1085 CreateFileA 419 de1e5e-de1e7a GetFileSize ReadFile 416->419 420 de1e5b 416->420 421 de1e7e-de1e8b CloseHandle 419->421 422 de1e7c 419->422 420->419 422->421
                                                      APIs
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E4E
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E61
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E72
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E7F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                                      • String ID:
                                                      • API String ID: 2517252058-0
                                                      • Opcode ID: d2d0a3c06f7fd11c18bc7918f7ddc60cf406e6fddf51d73c6530cadbb4037ddc
                                                      • Instruction ID: bb502a31a91357e062fd9c23eefc6e207682a3089efb02c32630abad788c24b7
                                                      • Opcode Fuzzy Hash: d2d0a3c06f7fd11c18bc7918f7ddc60cf406e6fddf51d73c6530cadbb4037ddc
                                                      • Instruction Fuzzy Hash: 15F062B6B11350BFF7206B65AC49FBB77ACEB55765F200229FA11E62C0E7B05D0086B4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 423 ddfbfc-ddfc1d GetCurrentProcess OpenProcessToken 424 ddfc3f-ddfc43 423->424 425 ddfc1f-ddfc3b GetTokenInformation 423->425 426 ddfc4e-ddfc57 424->426 427 ddfc45-ddfc48 CloseHandle 424->427 425->424 427->426
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,750901C0,00000000,750901C0,00000000,?,?,?,?,00DE3589,?), ref: 00DDFC0E
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00DE3589,?), ref: 00DDFC15
                                                      • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00DE3589,?), ref: 00DDFC33
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DDFC48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                      • String ID:
                                                      • API String ID: 215268677-0
                                                      • Opcode ID: 288bb259c728f3e922c17319522faa17555ee255e7c1239a261125546edb58f5
                                                      • Instruction ID: 28ec49762b77c2ae8be9e8580daf0bd99f642b6b2c1de216c38a8b38a58bd301
                                                      • Opcode Fuzzy Hash: 288bb259c728f3e922c17319522faa17555ee255e7c1239a261125546edb58f5
                                                      • Instruction Fuzzy Hash: D2F04972D00218FBDB10ABA0DD49BDEBBBCEF04701F114065EA02EA290D7309E44EAA0

                                                      Control-flow Graph

                                                      APIs
                                                      • Sleep.KERNEL32(000001F4,00000000,750901C0,00000000), ref: 00DD5A26
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,750901C0,?,00DD5A4F,.bss,00000000), ref: 00DD33C8
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,?,00DD5A4F,.bss,00000000), ref: 00DD33D5
                                                        • Part of subcall function 00DD33BF: lstrcpyA.KERNEL32(00000000,?,?,00DD5A4F,.bss,00000000), ref: 00DD33E8
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpylstrlen$FreeSleepVirtual
                                                      • String ID: .bss
                                                      • API String ID: 277671435-3890483948
                                                      • Opcode ID: 774a2e92e4290cc6f6166db6bfd4dea0ef43da7f1e6361c453c4f2c93a0625f7
                                                      • Instruction ID: 5f4712d5aeadc70939c568461888a2037bc7f3bc2f9ed5344494011f0990a8d4
                                                      • Opcode Fuzzy Hash: 774a2e92e4290cc6f6166db6bfd4dea0ef43da7f1e6361c453c4f2c93a0625f7
                                                      • Instruction Fuzzy Hash: C7515175900549AFCB14EFA0D9D18EEBBB5FF44304B1045AAE416AB256EF30AB05CFB0

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00DD3261: lstrlenW.KERNEL32(750901C0,00DD3646,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3268
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00DD4E98,?), ref: 00DD3581
                                                        • Part of subcall function 00DD5EB4: VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00DD3652,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD5EBE
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD35AC
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,750901C0,?,00DD5A4F,.bss,00000000), ref: 00DD33C8
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,?,00DD5A4F,.bss,00000000), ref: 00DD33D5
                                                        • Part of subcall function 00DD33BF: lstrcpyA.KERNEL32(00000000,?,?,00DD5A4F,.bss,00000000), ref: 00DD33E8
                                                        • Part of subcall function 00DD3125: lstrcatA.KERNEL32(00000000,750901C0,?,00000000,?,00DD35C4,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD3151
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$ByteCharMultiVirtualWide$AllocFreelstrcatlstrcpy
                                                      • String ID:
                                                      • API String ID: 346377423-0
                                                      • Opcode ID: 0afa2432ddd539b09ccac807b43b3cd182696207f91e0b1a3a56829f1bb156bf
                                                      • Instruction ID: b024f9934c10b0685f4b7a9d7ef111e9dbd4321321604cd23055b62c151757f6
                                                      • Opcode Fuzzy Hash: 0afa2432ddd539b09ccac807b43b3cd182696207f91e0b1a3a56829f1bb156bf
                                                      • Instruction Fuzzy Hash: 25015271601220BBDF15BBA4DC86EAE7B6DDF49750F100026B506AB381CA706F0087B5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 578 de106c-de107c 579 de107e-de108a call ddf731 578->579 580 de10b1-de10c3 RegOpenKeyExW 578->580 579->580 586 de108c-de10a8 RegCreateKeyExW 579->586 582 de10c8 580->582 583 de10c5-de10c6 580->583 584 de10ca-de10ce 582->584 583->584 586->582 587 de10aa-de10ac call de0fae 586->587 587->580
                                                      APIs
                                                      • RegOpenKeyExW.KERNEL32(750901C0,00000000,00000000,00DE3589,?,?,?,00DE3589,?,00DE158B,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 00DE10BB
                                                        • Part of subcall function 00DDF731: RegOpenKeyExW.ADVAPI32(750901C0,00000000,00000000,00020019,00000000,750901C0,?,00DE1088,?,?,00DE3589,?,00DE158B,80000001,?,000F003F), ref: 00DDF747
                                                      • RegCreateKeyExW.ADVAPI32(750901C0,00000000,00000000,00000000,00000000,00DE3589,00000000,?,?,?,?,00DE3589,?,00DE158B,80000001,?), ref: 00DE10A0
                                                        • Part of subcall function 00DE0FAE: RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Open$CloseCreate
                                                      • String ID:
                                                      • API String ID: 1752019758-0
                                                      • Opcode ID: b4612d02fe0ef098c02ce6ca62f5a366e01253d84f852ab768332323a768bf07
                                                      • Instruction ID: fd59b07b47ec998168d26149cb1b9ef062e631cb2ee97ac2dab112405b63ec53
                                                      • Opcode Fuzzy Hash: b4612d02fe0ef098c02ce6ca62f5a366e01253d84f852ab768332323a768bf07
                                                      • Instruction Fuzzy Hash: 27011D7520018DBFAB11AE52DC80CBB7BAEEF44398714402AF90586210E771DDA19AB1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 589 de1d0c-de1d34 Sleep GetTickCount
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountSleepTick
                                                      • String ID:
                                                      • API String ID: 2804873075-0
                                                      • Opcode ID: 24518f7327d708c4e5d7eec46118632f25ad0591849c5e7af73920e4a538eed8
                                                      • Instruction ID: 820106df0b8f45eb31c4a7cf0f5984bc56a16fb09519eca59c1f42eace0514ad
                                                      • Opcode Fuzzy Hash: 24518f7327d708c4e5d7eec46118632f25ad0591849c5e7af73920e4a538eed8
                                                      • Instruction Fuzzy Hash: ACD0A9302483444BE70CAB09FC8A2263E4EE7E0306F04802EB50EC92E0C9A055A04460
                                                      APIs
                                                      • ReleaseMutex.KERNEL32(?,?,00DDFEFD,00DE3578,00DD5BEC,00DE3578,00000000,00000000,00000000,00000000,?,?,?,?,00000000,.bss), ref: 00DE0288
                                                      • CloseHandle.KERNEL32(?), ref: 00DE0290
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleMutexRelease
                                                      • String ID:
                                                      • API String ID: 4207627910-0
                                                      • Opcode ID: 0c1a260ef3d2cac1bf031c25186d2a6f510c7a08d1d1ee68b9e8bafad7430508
                                                      • Instruction ID: 6e576297d00065b60dcc884ff3e9de2cb031ae6d499ed6d83945134d9532c3fe
                                                      • Opcode Fuzzy Hash: 0c1a260ef3d2cac1bf031c25186d2a6f510c7a08d1d1ee68b9e8bafad7430508
                                                      • Instruction Fuzzy Hash: A8B0923A001260DFEB253F54FC4C894BFA5FF08251315046EF285C52388BB20C609BA0
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,?,00DD2FA7,00DD5A42,?,?,00DE03FD,00DD5A42,?,?,750901C0,00000000,?,00DD5A42,00000000), ref: 00DD5F02
                                                      • RtlAllocateHeap.NTDLL(00000000,?,00DE03FD,00DD5A42,?,?,750901C0,00000000,?,00DD5A42,00000000), ref: 00DD5F09
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateProcess
                                                      • String ID:
                                                      • API String ID: 1357844191-0
                                                      • Opcode ID: 1af52d5a6d7c6456b117c44e95c6a78ec189929782061e80089f725cdeef0a8c
                                                      • Instruction ID: 9d8f4706e2a3fd66786b978b3a1d1696c0689bb2213645bb4b380db85ee42508
                                                      • Opcode Fuzzy Hash: 1af52d5a6d7c6456b117c44e95c6a78ec189929782061e80089f725cdeef0a8c
                                                      • Instruction Fuzzy Hash: 1EA00271950340ABDE4477E49D8DF15361CA755702F014544B145C9150996554848731
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,?,00DD3044,?,00DD5C22,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EF1
                                                      • RtlFreeHeap.NTDLL(00000000,?,?,00DE36B9), ref: 00DD5EF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$FreeProcess
                                                      • String ID:
                                                      • API String ID: 3859560861-0
                                                      • Opcode ID: b9507f13416d2114a5efb5c7ad7a48d9448f25f8e53e9424a21b52ca3eec63b3
                                                      • Instruction ID: ba2bd6c556e1b490b51f4b679b75d32937a34c3e7e1f5c5b08d9d1815c017761
                                                      • Opcode Fuzzy Hash: b9507f13416d2114a5efb5c7ad7a48d9448f25f8e53e9424a21b52ca3eec63b3
                                                      • Instruction Fuzzy Hash: 8FA00271554340ABDDC477E09D4DB15352C9759702F004554B206CA250966454408731
                                                      APIs
                                                        • Part of subcall function 00DD308C: lstrlenA.KERNEL32(00000000,00DD30B4,750901C0,00000000,00000000,?,00DD32DC,00DD350E,00000000,-00000001,750901C0,?,00DD350E,00000000,?,00000000), ref: 00DD3093
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,-00000002,00000000,00000000,750901C0,00000000,00000000,?,00DD32DC,00DD350E,00000000,-00000001,750901C0), ref: 00DD30CA
                                                        • Part of subcall function 00DD5E22: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,00DD33E2,?,00DD5A4F,.bss,00000000), ref: 00DD5E30
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,?,00DD32DC,00DD350E,00000000,-00000001,750901C0,?,00DD350E,00000000), ref: 00DD30F5
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$ByteCharMultiVirtualWidelstrcpy$AllocFree
                                                      • String ID:
                                                      • API String ID: 4006399363-0
                                                      • Opcode ID: 015ff4c3a490d731fa17e0e9e7896500fdd6ac50f6e3b0459f6875e1239d3ca6
                                                      • Instruction ID: 5c98f1b77b246eec861509a7e288eb70c1bd859cf5a0e3d3bf74059dfb3ae936
                                                      • Opcode Fuzzy Hash: 015ff4c3a490d731fa17e0e9e7896500fdd6ac50f6e3b0459f6875e1239d3ca6
                                                      • Instruction Fuzzy Hash: 06015E75600214BBDB15FFA4DC82DEE7BA9DF49350B00012BB501DB392CA749F0087B1
                                                      APIs
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,00DE3589,?,00DE1618,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\,00000000,InitWindows), ref: 00DDF4A2
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DD1099: GetProcessHeap.KERNEL32(00000000,00000000,00DE1E18,00000000,00000000,00000000,00000000,.bss,00000000), ref: 00DD109F
                                                        • Part of subcall function 00DD1099: HeapFree.KERNEL32(00000000), ref: 00DD10A6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$FreeProcesslstrcpylstrlen$AllocateFileModuleNameVirtual
                                                      • String ID:
                                                      • API String ID: 258861418-0
                                                      • Opcode ID: 2837097df011fda046c9b61e8cc4e1557136a5c030d0901cdb3bdeba3e83460f
                                                      • Instruction ID: 97056265f057caa8c7faaea926849102473ad1a409558ad498afb00cc78d26c1
                                                      • Opcode Fuzzy Hash: 2837097df011fda046c9b61e8cc4e1557136a5c030d0901cdb3bdeba3e83460f
                                                      • Instruction Fuzzy Hash: B2E06D766042547BD614B765EC16FAF3BADCF81322F00001AF105A6281DEA45A4086B1
                                                      APIs
                                                      • RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,750901C0,?,?,00DE1165,?,?), ref: 00DE0F8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create
                                                      • String ID:
                                                      • API String ID: 2289755597-0
                                                      • Opcode ID: 2ebcb78e89e62c6b99a4a6c9a6a7989b7348263842bcf2169d0e20025f7cea1c
                                                      • Instruction ID: fd980b0394b9c4b6e810691bb02d63d3f754ac65430b3bccf58fa96dd08d90b3
                                                      • Opcode Fuzzy Hash: 2ebcb78e89e62c6b99a4a6c9a6a7989b7348263842bcf2169d0e20025f7cea1c
                                                      • Instruction Fuzzy Hash: 07E0DF32515229FFDB309B538D08ECB3E7CDF85BE4F008014F60AA6140C2B18A40D6F0
                                                      APIs
                                                      • ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 00DD3207
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$EnvironmentExpandStringslstrcpy
                                                      • String ID:
                                                      • API String ID: 1709970682-0
                                                      • Opcode ID: 6b850b67ae942ed184beffb1e48262438d80ff52aa4cba339b21435165b66919
                                                      • Instruction ID: 7f37a7408e83a95b425538386a0023646e30706dc5c0ae563db800728b9ee7c5
                                                      • Opcode Fuzzy Hash: 6b850b67ae942ed184beffb1e48262438d80ff52aa4cba339b21435165b66919
                                                      • Instruction Fuzzy Hash: 81E048B6B0025967DB20A6559C06F9A77ADDBC4718F040075B709F62C0E975DE06C7B8
                                                      APIs
                                                      • RegSetValueExW.KERNEL32(?,750901C0,00000000,?,?,?,?,?,00DE1432,00000000,00000000,?,00000001,?,?,?), ref: 00DE1058
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID:
                                                      • API String ID: 3702945584-0
                                                      • Opcode ID: 608427e4e3d78c39ac10018f06f1d174d4837a0aa8e51e3c7765ab6217d2c730
                                                      • Instruction ID: 67e99f7d921f51429229a10eda563d9b456a706b935666ab0293e449d3da4793
                                                      • Opcode Fuzzy Hash: 608427e4e3d78c39ac10018f06f1d174d4837a0aa8e51e3c7765ab6217d2c730
                                                      • Instruction Fuzzy Hash: 57E01A36201294AFDB11DF55DC45EA777A8EB49B50F588059F9058B320D631EC509BA0
                                                      APIs
                                                        • Part of subcall function 00DD3261: lstrlenW.KERNEL32(750901C0,00DD3646,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3268
                                                      • lstrcatW.KERNEL32(00000000,750901C0,?,?,00DE3589,?,00DE1515,00DE3589,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3365
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcatlstrlen
                                                      • String ID:
                                                      • API String ID: 1475610065-0
                                                      • Opcode ID: f4abc70631d4d04ea045151e3babd5ba83f1d8003ed85e34869e758b6173cce6
                                                      • Instruction ID: d1c9d80b60ac8b41f6a07d181742f463fe4335165da0d83fe25fcc5be35b8dfe
                                                      • Opcode Fuzzy Hash: f4abc70631d4d04ea045151e3babd5ba83f1d8003ed85e34869e758b6173cce6
                                                      • Instruction Fuzzy Hash: BAE086726042149BCB017BA9ECC596EBB9EEF95360B040537FA05DB311EA317D10C6F5
                                                      APIs
                                                        • Part of subcall function 00DE0298: CreateMutexA.KERNEL32(00000000,00000000,00000000,?,00DDFEDE,?,?,00DE0459,?,750901C0,00000000,00DD5A34), ref: 00DE02A0
                                                      • WSAStartup.WS2_32(00000002,?), ref: 00DD58FC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateMutexStartup
                                                      • String ID:
                                                      • API String ID: 3730780901-0
                                                      • Opcode ID: a895a101bc70be8dc7da302d3ad4536aabd03fed6807b873539aa1be2143872b
                                                      • Instruction ID: ee014e17d5d491a58b8574368a14e10f4c60e6f414a44e69120c255be7e7c32c
                                                      • Opcode Fuzzy Hash: a895a101bc70be8dc7da302d3ad4536aabd03fed6807b873539aa1be2143872b
                                                      • Instruction Fuzzy Hash: 36E0ED71501B508BC270AF2B9945897FBF8FFD07207400B1FA5A7C2A61C7B0B545CBA0
                                                      APIs
                                                        • Part of subcall function 00DD3125: lstrcatA.KERNEL32(00000000,750901C0,?,00000000,?,00DD35C4,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD3151
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,?,?), ref: 00DDFDC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateEventlstrcat
                                                      • String ID:
                                                      • API String ID: 2275612694-0
                                                      • Opcode ID: b38278a0104f32e2cd50e4c5d4fafed05d20d6b0fbf188043f43f659e9e04cde
                                                      • Instruction ID: dcf1681780acece0496029e9f6f0a79b85c572c5b3b36fb72dbeb99be523761e
                                                      • Opcode Fuzzy Hash: b38278a0104f32e2cd50e4c5d4fafed05d20d6b0fbf188043f43f659e9e04cde
                                                      • Instruction Fuzzy Hash: 9FD05E362443057BD710AB91DC46F86FF6AEB55760F004026F65986690DBB1A020C7A0
                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000000,00000000,?,00DDFEDE,?,?,00DE0459,?,750901C0,00000000,00DD5A34), ref: 00DE02A0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateMutex
                                                      • String ID:
                                                      • API String ID: 1964310414-0
                                                      • Opcode ID: de0d961f69fe0cec02a7ec010cbaa4f25a87bcb158d961f7b6916d5abc07db71
                                                      • Instruction ID: 8141b2ed189f1eff6cb68db7255b3653f8d1fa18198f685a8d141aa4c9cb572d
                                                      • Opcode Fuzzy Hash: de0d961f69fe0cec02a7ec010cbaa4f25a87bcb158d961f7b6916d5abc07db71
                                                      • Instruction Fuzzy Hash: 38D012B15006215FA324AF395C4886775DDEF98720315CE29B4A5CF2D4E6308C408770
                                                      APIs
                                                      • RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID:
                                                      • API String ID: 3535843008-0
                                                      • Opcode ID: fef68f8c47bf333c21f0a7023f0095326b67b34c3d18b4600dbc4ca0904f5f08
                                                      • Instruction ID: 11318162819598d577aaa8685b16e653735ca711c91fb0bf0aa71b636ab0bd36
                                                      • Opcode Fuzzy Hash: fef68f8c47bf333c21f0a7023f0095326b67b34c3d18b4600dbc4ca0904f5f08
                                                      • Instruction Fuzzy Hash: C1C04C31014261CBD7352F14F404790B6E5AF00316F25046DD5C05516497B50CD0CE54
                                                      APIs
                                                      • SHCreateDirectoryExW.SHELL32(00000000,?,00000000,00DE11A6,00000000,?,?,?,?,00000000,750901C0,00000000), ref: 00DDF725
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateDirectory
                                                      • String ID:
                                                      • API String ID: 4241100979-0
                                                      • Opcode ID: ea6fc2edcb7251a5e08807931a8df8b322654a15eb9850a95dc4d7e199f84ea8
                                                      • Instruction ID: 4de847e75ebaa97fcfa152fd3d3fba29fb92695565ced6ec6a4b88c1307fe88c
                                                      • Opcode Fuzzy Hash: ea6fc2edcb7251a5e08807931a8df8b322654a15eb9850a95dc4d7e199f84ea8
                                                      • Instruction Fuzzy Hash: 8BB012307E834157DA002B708C06F1035119742F07F2001A0B256CC0E0C65100005518
                                                      APIs
                                                      • lstrcmpA.KERNEL32(?,00DE1BD0,?,open,00DE1BD0), ref: 00DE09A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmp
                                                      • String ID:
                                                      • API String ID: 1534048567-0
                                                      • Opcode ID: bd55c4d13a9ad7deb999b5e3ca71d837af7bf630a85236ee8313c6a9ac1b249a
                                                      • Instruction ID: 92398b1771e5ef17a06d7e4441a3f82cbb0384cc9fa6fb944b733866b1ea10dc
                                                      • Opcode Fuzzy Hash: bd55c4d13a9ad7deb999b5e3ca71d837af7bf630a85236ee8313c6a9ac1b249a
                                                      • Instruction Fuzzy Hash: 18015E71A00614AFD710EF9ACC81A6ABBF8FF453147080169A445C7702EB70ED95CEE4
                                                      APIs
                                                        • Part of subcall function 00DD3554: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00DD4E98,?), ref: 00DD3581
                                                        • Part of subcall function 00DD3554: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD35AC
                                                        • Part of subcall function 00DD57FB: getaddrinfo.WS2_32(750901C0,00000000,00DD4EA0,00000000), ref: 00DD5848
                                                        • Part of subcall function 00DD57FB: socket.WS2_32(00000002,00000001,00000000), ref: 00DD585F
                                                        • Part of subcall function 00DD57FB: htons.WS2_32(00000000), ref: 00DD5885
                                                        • Part of subcall function 00DD57FB: freeaddrinfo.WS2_32(00000000), ref: 00DD5895
                                                        • Part of subcall function 00DD57FB: connect.WS2_32(?,?,00000010), ref: 00DD58A1
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      • Sleep.KERNEL32(?,?,?,?,?,?,00000000,750901C0,00000000), ref: 00DD4ECD
                                                        • Part of subcall function 00DD562F: setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 00DD5666
                                                        • Part of subcall function 00DD562F: recv.WS2_32(000000FF,?,0000000C,00000000), ref: 00DD56B6
                                                        • Part of subcall function 00DD562F: recv.WS2_32(000000FF,?,000000FF,00000000), ref: 00DD5726
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWiderecv$FreeSleepVirtualconnectfreeaddrinfogetaddrinfohtonssetsockoptsocket
                                                      • String ID:
                                                      • API String ID: 3250391716-0
                                                      • Opcode ID: a2a4479d05b7e7b05d336227422cbfa87eba73a50dd6bf96d674ecf1dc75ea52
                                                      • Instruction ID: f36295b15a9564323280397149d586d05f6fca44d8240c1612adada68ad946fd
                                                      • Opcode Fuzzy Hash: a2a4479d05b7e7b05d336227422cbfa87eba73a50dd6bf96d674ecf1dc75ea52
                                                      • Instruction Fuzzy Hash: C0014075600A15ABDB14AB74D849AEEF768FB40314F04021AE519A3255DB70AA54C7F0
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,00DD33E2,?,00DD5A4F,.bss,00000000), ref: 00DD5E30
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 9bae2a1357f253c298ce5846771cebc8bd664fa1435b323f675bd26bd684669a
                                                      • Instruction ID: 22675f5e9901b4deedcf5502ed6859f9cff04dc4a661e1b9bf3077af6fd89463
                                                      • Opcode Fuzzy Hash: 9bae2a1357f253c298ce5846771cebc8bd664fa1435b323f675bd26bd684669a
                                                      • Instruction Fuzzy Hash: F1C012223482602BF128222ABC1AF6B8AACCBC2F71F01006BF708CE3D0D8D10D0281B4
                                                      APIs
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 7fdc934b1473cc3ca3edcfd77140ba99799e1fb17084c0c4016db0c4a5108e55
                                                      • Instruction ID: 2b9b6f0bb1570b2b17521c181499c0f93c19dea0e1f5a353a14b24cef6094e44
                                                      • Opcode Fuzzy Hash: 7fdc934b1473cc3ca3edcfd77140ba99799e1fb17084c0c4016db0c4a5108e55
                                                      • Instruction Fuzzy Hash: E9B0927078070057EE3CEB309C95F2923117B80B06FA5458DB242DE2D48AA6E4018A68
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00DD3652,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD5EBE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 069abeb6308045b9109bb2ea882aba322fc23297e9d925e8fb61a6d19bd63236
                                                      • Instruction ID: 2274c77e45ee105ed09254a5593424779237d3a0bf11bd65ee36850dda8e2465
                                                      • Opcode Fuzzy Hash: 069abeb6308045b9109bb2ea882aba322fc23297e9d925e8fb61a6d19bd63236
                                                      • Instruction Fuzzy Hash: 4DA002B07D53407AFD696760AD5FF153918A780F16F200154B30DAD1D055E026008539
                                                      APIs
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: bbf2723abaf3e781c6a6c7a15f12e394f81d9a9accf739046527c39656731499
                                                      • Instruction ID: d9c8ff1f19ff14f2166d0082c482989010a48faf83263716b8f546be9d544469
                                                      • Opcode Fuzzy Hash: bbf2723abaf3e781c6a6c7a15f12e394f81d9a9accf739046527c39656731499
                                                      • Instruction Fuzzy Hash: E4A00270AD074066ED7467205D8AF0526146740B01F2146847341EC2E049A5A0448A6C
                                                      APIs
                                                      • GetAsyncKeyState.USER32(00000010), ref: 00DD8A11
                                                      • CallNextHookEx.USER32(00000000,?,?,?), ref: 00DD8E12
                                                        • Part of subcall function 00DD8E66: GetForegroundWindow.USER32(?,?,?), ref: 00DD8E8F
                                                        • Part of subcall function 00DD8E66: GetWindowTextW.USER32(00000000,?,00000104), ref: 00DD8EA2
                                                        • Part of subcall function 00DD8E66: lstrlenW.KERNEL32(-00000210,{Unknown},?,?), ref: 00DD8F0B
                                                        • Part of subcall function 00DD8E66: CreateFileW.KERNEL32(?,00000004,00000001,00000000,00000004,00000080,00000000,?,?), ref: 00DD8F79
                                                        • Part of subcall function 00DD8E66: lstrlenW.KERNEL32(00DE4AD0,00000008,00000000,?,?), ref: 00DD8FA2
                                                        • Part of subcall function 00DD8E66: WriteFile.KERNEL32(?,00DE4AD0,00000000,?,?), ref: 00DD8FAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileWindowlstrlen$AsyncCallCreateForegroundHookNextStateTextWrite
                                                      • String ID: [ALT]$[BKSP]$[CAPS]$[CTRL]$[DEL]$[ENTER]$[ESC]$[INSERT]$[TAB]
                                                      • API String ID: 2452648998-4143582258
                                                      • Opcode ID: 5667f9d9d6d63a3761e5ae358aceeb3f1d5ce887ee99e889eb8a6bd7e472a25b
                                                      • Instruction ID: 1d83735f79010b143b6a54c93c1e808b3537efbb9cf66f7798784ce7e2fb3d8e
                                                      • Opcode Fuzzy Hash: 5667f9d9d6d63a3761e5ae358aceeb3f1d5ce887ee99e889eb8a6bd7e472a25b
                                                      • Instruction Fuzzy Hash: 8D910632E852D0DBC72A365E86597796225E790300F6A4437FA837B7E0DD12CD44BAB2
                                                      APIs
                                                      • DefWindowProcA.USER32(?,?,?,?), ref: 00DD9084
                                                      • GetRawInputData.USER32(?,10000003,00000000,?,00000010), ref: 00DD90A1
                                                      • GetRawInputData.USER32(?,10000003,00000000,?,00000010), ref: 00DD90D7
                                                      • GetForegroundWindow.USER32 ref: 00DD90F4
                                                      • GetWindowTextW.USER32(00000000,?,00000104), ref: 00DD9105
                                                      • lstrlenW.KERNEL32(-00000210,-00000010,?,Unknow), ref: 00DD91EE
                                                      • PostQuitMessage.USER32(00000000), ref: 00DD9381
                                                      • RegisterRawInputDevices.USER32 ref: 00DD93B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InputWindow$Data$DevicesForegroundMessagePostProcQuitRegisterTextlstrlen
                                                      • String ID: Unknow
                                                      • API String ID: 3853268301-1240069140
                                                      • Opcode ID: 844cf40209c5604731922205f3a7e37e054ad23ebb77e299c9b052602e3dda68
                                                      • Instruction ID: 86468695ffa339b9c126861f8f854b7e3d581510263c5a099330ace31faa21b3
                                                      • Opcode Fuzzy Hash: 844cf40209c5604731922205f3a7e37e054ad23ebb77e299c9b052602e3dda68
                                                      • Instruction Fuzzy Hash: D8A156B1500340AFCB10EF65DC99EAABBA8EF85304F44052AF545DB3A1DB72E904CB76
                                                      Strings
                                                      • \Google\Chrome\User Data\Default\Login Data, xrefs: 00DDC23B
                                                      • \Comodo\Dragon\User Data\Default\Login Data, xrefs: 00DDC34B
                                                      • \CentBrowser\User Data\Default\Login Data, xrefs: 00DDC39C
                                                      • \Blisk\User Data\Default\Login Data, xrefs: 00DDC2DF
                                                      • \Epic Privacy Browser\User Data\Local State, xrefs: 00DDC251
                                                      • \UCBrowser\User Data_i18n\Default\UC Login Data.17, xrefs: 00DDC28D
                                                      • \BraveSoftware\Brave-Browser\User Data\Local State, xrefs: 00DDC310
                                                      • \Google\Chrome\User Data\Local State, xrefs: 00DDC236
                                                      • \UCBrowser\User Data_i18n\Local State, xrefs: 00DDC288
                                                      • \Torch\User Data\Default\Login Data, xrefs: 00DDC366
                                                      • \Epic Privacy Browser\User Data\Default\Login Data, xrefs: 00DDC256
                                                      • \Microsoft\Edge\User Data\Local State, xrefs: 00DDC26C
                                                      • \Slimjet\User Data\Local State, xrefs: 00DDC37C
                                                      • \Microsoft\Edge\User Data\Default\Login Data, xrefs: 00DDC271
                                                      • \Vivaldi\User Data\Default\Login Data, xrefs: 00DDC330
                                                      • \Blisk\User Data\Local State, xrefs: 00DDC2DA
                                                      • \CentBrowser\User Data\Local State, xrefs: 00DDC397
                                                      • \BraveSoftware\Brave-Browser\User Data\Default\Login Data, xrefs: 00DDC315
                                                      • \Slimjet\User Data\Default\Login Data, xrefs: 00DDC381
                                                      • \Opera Software\Opera Stable\Local State, xrefs: 00DDC2BF
                                                      • \Torch\User Data\Local State, xrefs: 00DDC361
                                                      • \Tencent\QQBrowser\User Data\Local State, xrefs: 00DDC2A3
                                                      • \Comodo\Dragon\User Data\Local State, xrefs: 00DDC346
                                                      • \Opera Software\Opera Stable\Login Data, xrefs: 00DDC2C4
                                                      • \Tencent\QQBrowser\User Data\Default\Login Data, xrefs: 00DDC2A8
                                                      • \Chromium\User Data\Default\Login Data, xrefs: 00DDC2FA
                                                      • \Vivaldi\User Data\Local State, xrefs: 00DDC329
                                                      • \Chromium\User Data\Local State, xrefs: 00DDC2F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FilePath$lstrcatlstrcpy$BinaryCopyExistsOpenType$CloseCombineEnumFolderInfoPrivateProfileQuerySpecialString
                                                      • String ID: \Blisk\User Data\Default\Login Data$\Blisk\User Data\Local State$\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\BraveSoftware\Brave-Browser\User Data\Local State$\CentBrowser\User Data\Default\Login Data$\CentBrowser\User Data\Local State$\Chromium\User Data\Default\Login Data$\Chromium\User Data\Local State$\Comodo\Dragon\User Data\Default\Login Data$\Comodo\Dragon\User Data\Local State$\Epic Privacy Browser\User Data\Default\Login Data$\Epic Privacy Browser\User Data\Local State$\Google\Chrome\User Data\Default\Login Data$\Google\Chrome\User Data\Local State$\Microsoft\Edge\User Data\Default\Login Data$\Microsoft\Edge\User Data\Local State$\Opera Software\Opera Stable\Local State$\Opera Software\Opera Stable\Login Data$\Slimjet\User Data\Default\Login Data$\Slimjet\User Data\Local State$\Tencent\QQBrowser\User Data\Default\Login Data$\Tencent\QQBrowser\User Data\Local State$\Torch\User Data\Default\Login Data$\Torch\User Data\Local State$\UCBrowser\User Data_i18n\Default\UC Login Data.17$\UCBrowser\User Data_i18n\Local State$\Vivaldi\User Data\Default\Login Data$\Vivaldi\User Data\Local State
                                                      • API String ID: 2377953819-4166025770
                                                      • Opcode ID: baf152d0ef2035de3f1bacb552b96adc7fc8437d7e21b987d2c7b516094f52c5
                                                      • Instruction ID: 1c3d6bfc23d8a23b90dc23986de931a211dd4ec110419ea27c706fb606f0ea7c
                                                      • Opcode Fuzzy Hash: baf152d0ef2035de3f1bacb552b96adc7fc8437d7e21b987d2c7b516094f52c5
                                                      • Instruction Fuzzy Hash: 92711031352741AFC728FB65DDA2E6A7769EF96758F00011EB1069F3E1CAA26804CB71
                                                      APIs
                                                      • RegQueryValueExW.ADVAPI32(?,Account Name,00000000,00000000,?,00001000,?,?,?,?,?,7508E9B0,7595F860,00000000,?,00DDA25E), ref: 00DDA31C
                                                      • RegQueryValueExW.ADVAPI32(?,Email,00000000,00000000,?,00001000,?,?,?,?,?,?,?,?,7508E9B0,7595F860), ref: 00DDA363
                                                      • RegQueryValueExW.ADVAPI32(?,POP3 Server,00000000,00000000,?,00001000), ref: 00DDA3A7
                                                      • RegQueryValueExW.ADVAPI32(?,POP3 User,00000000,00000000,?,00001000), ref: 00DDA3EB
                                                      • RegQueryValueExW.ADVAPI32(?,SMTP Server,00000000,00000000,?,00001000), ref: 00DDA42F
                                                      • RegQueryValueExW.ADVAPI32(?,POP3 Password,00000000,00000000,?,00001000), ref: 00DDA473
                                                      • RegQueryValueExW.ADVAPI32(?,SMTP Password,00000000,00000000,?,00001000), ref: 00DDA4E0
                                                      • RegQueryValueExW.ADVAPI32(?,HTTP Password,00000000,00000000,?,00001000), ref: 00DDA54D
                                                      • RegQueryValueExW.ADVAPI32(?,IMAP Password,00000000,00000000,?,00001000), ref: 00DDA5BA
                                                        • Part of subcall function 00DDA632: GlobalAlloc.KERNEL32(00000040,-00000001,7508E8E0,?,?,?,00DDA5E6,00001000,?,00000000,00001000), ref: 00DDA650
                                                        • Part of subcall function 00DDA632: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,00DDA5E6), ref: 00DDA686
                                                        • Part of subcall function 00DDA632: lstrcpyW.KERNEL32(?,Could not decrypt,?,?,00DDA5E6,00001000,?,00000000,00001000), ref: 00DDA6BD
                                                        • Part of subcall function 00DD3261: lstrlenW.KERNEL32(750901C0,00DD3646,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3268
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: QueryValue$AllocCryptDataGlobalUnprotectlstrcpylstrlen
                                                      • String ID: Account Name$Email$HTTP Password$IMAP Password$POP3 Password$POP3 Server$POP3 User$SMTP Password$SMTP Server
                                                      • API String ID: 6593746-2537589853
                                                      • Opcode ID: 9b8e8ddaf6b342017a0ede28045764d0ae9c5882bbf56a5b19be9ac56fe547a5
                                                      • Instruction ID: c25aa0f580b507b84b6394c3ad799dee437b6efa2ededec45d3bcf7f4fc7eea0
                                                      • Opcode Fuzzy Hash: 9b8e8ddaf6b342017a0ede28045764d0ae9c5882bbf56a5b19be9ac56fe547a5
                                                      • Instruction Fuzzy Hash: 2FA13DB2D10259BADB25FAA4CD46FEE737CEF14740F1401A6F604F2180E674AB488BB5
                                                      APIs
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      • LoadResource.KERNEL32(00000000,?,00000000), ref: 00DE30EE
                                                      • SizeofResource.KERNEL32(00000000,?), ref: 00DE30FA
                                                      • LockResource.KERNEL32(00000000), ref: 00DE3104
                                                      • GetTempPathA.KERNEL32(00000400,?), ref: 00DE313E
                                                      • lstrcatA.KERNEL32(?,find.exe), ref: 00DE3152
                                                      • GetTempPathA.KERNEL32(00000400,?), ref: 00DE3160
                                                      • lstrcatA.KERNEL32(?,find.db), ref: 00DE316E
                                                      • CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000002,00000084,00000000), ref: 00DE3189
                                                      • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00DE319B
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DE31A2
                                                      • wsprintfA.USER32 ref: 00DE31D2
                                                      • ShellExecuteExA.SHELL32(0000003C), ref: 00DE3220
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Resource$FilePathTemplstrcat$CloseCreateExecuteFreeHandleLoadLockShellSizeofVirtualWritelstrcpywsprintf
                                                      • String ID: -w %ws -d C -f %s$<$@$find.db$find.exe
                                                      • API String ID: 2504251837-265381321
                                                      • Opcode ID: 5951ccfb2a13e4a8b99e33bfc7fde9b72f43a278e6aa441c009799ec221f3266
                                                      • Instruction ID: ac3bed83d75e5f190f3abf01742dd66c3da0b7e2a4d06d6f9a8ea1e39a6c8ef5
                                                      • Opcode Fuzzy Hash: 5951ccfb2a13e4a8b99e33bfc7fde9b72f43a278e6aa441c009799ec221f3266
                                                      • Instruction Fuzzy Hash: 124119B290025DABDB10EFA5DD84EDEBBBCFF89304F004156F609E6250DB745A858BB4
                                                      APIs
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DDC118: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 00DDC154
                                                        • Part of subcall function 00DDC118: lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 00DDC162
                                                        • Part of subcall function 00DDC118: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,00DDA729,?,00000104,00000000), ref: 00DDC17B
                                                        • Part of subcall function 00DDC118: RegQueryValueExW.ADVAPI32(00DDA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 00DDC198
                                                        • Part of subcall function 00DDC118: RegCloseKey.ADVAPI32(00DDA729,?,00000104,00000000), ref: 00DDC1A1
                                                      • lstrcatW.KERNEL32(?,\firefox.exe,?), ref: 00DDAC8C
                                                      • GetBinaryTypeW.KERNEL32(?,?), ref: 00DDAC9D
                                                      • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,?), ref: 00DDB11D
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DD3272: wsprintfW.USER32 ref: 00DD328D
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DD3554: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00DD4E98,?), ref: 00DD3581
                                                        • Part of subcall function 00DD3554: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD35AC
                                                      • CopyFileW.KERNEL32(?,?,00000000,.tmp,00000000,00DE4684,\logins.json,?), ref: 00DDAE14
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$ByteCharMultiWidelstrcatlstrlen$BinaryCloseCopyFileFreeOpenPrivateProfileQueryStringTypeValueVirtualwsprintf
                                                      • String ID: .tmp$Path$Profile$\Mozilla\Firefox\$\firefox.exe$\logins.json$encryptedPassword$encryptedUsername$firefox.exe$hostname$profiles.ini
                                                      • API String ID: 288196626-815594582
                                                      • Opcode ID: 69aca702eef0e257264f1a6914332e9f19b4bb4d04775eef6785aed3809b19a9
                                                      • Instruction ID: 45356c2df20d8b4908c2fe61331f6ccc8519f58b301d3a529417b417bddd416a
                                                      • Opcode Fuzzy Hash: 69aca702eef0e257264f1a6914332e9f19b4bb4d04775eef6785aed3809b19a9
                                                      • Instruction Fuzzy Hash: A8E1E6B1900218ABDF25FBA0DC929EEB779EF54304F10406BB506A7296DF316E45CB71
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00DD8840
                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,-00000010), ref: 00DD8894
                                                      • lstrcatW.KERNEL32(-00000010,\Microsoft Vision\), ref: 00DD88AE
                                                      • GetLocalTime.KERNEL32(?), ref: 00DD88B5
                                                      • wsprintfW.USER32 ref: 00DD88E9
                                                      • lstrcatW.KERNEL32(-00000010,?), ref: 00DD8900
                                                      • CreateFileW.KERNEL32(?,10000000,00000001,00000000,00000002,00000080,00000000,00000010), ref: 00DD892C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DD893C
                                                        • Part of subcall function 00DE1E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E4E
                                                        • Part of subcall function 00DE1E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E61
                                                        • Part of subcall function 00DE1E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E72
                                                        • Part of subcall function 00DE1E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E7F
                                                        • Part of subcall function 00DE09D2: VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,7595F770,00000000,?,?,?,?,00DD895D), ref: 00DE09FE
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00DD89AF
                                                        • Part of subcall function 00DE0969: lstrcmpA.KERNEL32(?,00DE1BD0,?,open,00DE1BD0), ref: 00DE09A2
                                                      • TranslateMessage.USER32(?), ref: 00DD8996
                                                      • DispatchMessageA.USER32(?), ref: 00DD89A1
                                                      Strings
                                                      • SetWindowsHookExA, xrefs: 00DD8962
                                                      • \Microsoft Vision\, xrefs: 00DD88A8
                                                      • %02d-%02d-%02d_%02d.%02d.%02d, xrefs: 00DD88E3
                                                      • c:\windows\system32\user32.dll, xrefs: 00DD894A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$HandleMessage$CloseCreatelstrcat$AllocDispatchFolderLocalModulePathReadSizeTimeTranslateVirtuallstrcmpwsprintf
                                                      • String ID: %02d-%02d-%02d_%02d.%02d.%02d$SetWindowsHookExA$\Microsoft Vision\$c:\windows\system32\user32.dll
                                                      • API String ID: 1431388325-3884914687
                                                      • Opcode ID: 9ea5eb59a23f40238c74256df80a0d263700d5a1bf66d18271bdeabf7ff2c0e9
                                                      • Instruction ID: 8adab10f90ac6a972e503d372ffacbdf0f1a550ef58838f7950a229c1effcf3e
                                                      • Opcode Fuzzy Hash: 9ea5eb59a23f40238c74256df80a0d263700d5a1bf66d18271bdeabf7ff2c0e9
                                                      • Instruction Fuzzy Hash: 514180B1500380ABD710BBAAEC89E2B77ECFB89704F04091AF685DB391DA75D904CB75
                                                      APIs
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DDC118: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 00DDC154
                                                        • Part of subcall function 00DDC118: lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 00DDC162
                                                        • Part of subcall function 00DDC118: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,00DDA729,?,00000104,00000000), ref: 00DDC17B
                                                        • Part of subcall function 00DDC118: RegQueryValueExW.ADVAPI32(00DDA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 00DDC198
                                                        • Part of subcall function 00DDC118: RegCloseKey.ADVAPI32(00DDA729,?,00000104,00000000), ref: 00DDC1A1
                                                      • GetBinaryTypeW.KERNEL32(?,?), ref: 00DDA747
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DDB67E: GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 00DDB6AC
                                                        • Part of subcall function 00DDB67E: SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB6B5
                                                        • Part of subcall function 00DDB67E: PathFileExistsW.SHLWAPI(00DDA760,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?,nss3.dll), ref: 00DDB7A3
                                                      • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,?), ref: 00DDABCA
                                                        • Part of subcall function 00DDB67E: PathFileExistsW.SHLWAPI(00DDA760,.dll,?,00DDA760,?,00000104,00000000), ref: 00DDB7FF
                                                        • Part of subcall function 00DDB67E: LoadLibraryW.KERNEL32(?,00DDA760,?,00000104,00000000), ref: 00DDB83E
                                                        • Part of subcall function 00DDB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB849
                                                        • Part of subcall function 00DDB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB854
                                                        • Part of subcall function 00DDB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB85F
                                                        • Part of subcall function 00DDB67E: LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB86A
                                                        • Part of subcall function 00DDB67E: SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB957
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$CurrentDirectorylstrcpy$ExistsFilePathlstrlen$BinaryCloseOpenPrivateProfileQueryStringTypeValuelstrcat
                                                      • String ID: .tmp$Path$Profile$\Thunderbird\$\logins.json$encryptedPassword$encryptedUsername$hostname$profiles.ini$thunderbird.exe
                                                      • API String ID: 1065485167-1863067114
                                                      • Opcode ID: 47345278fc3d5862fae39627b3090c0f3d8a0ac1898aaee2aa15795f230ad761
                                                      • Instruction ID: 82e6db4218526161da07c06cf9cc06e8d64c09822c26f6bb23ebca6f21773c21
                                                      • Opcode Fuzzy Hash: 47345278fc3d5862fae39627b3090c0f3d8a0ac1898aaee2aa15795f230ad761
                                                      • Instruction Fuzzy Hash: 78E1D5B1900218ABDF15FBA0DC929EEB779EF54300F50406BF506A7296DE316E49CBB1
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 00DDD517
                                                      • OpenServiceW.ADVAPI32(00000000,?,00000010), ref: 00DDD52C
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD539
                                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 00DDD546
                                                      • GetLastError.KERNEL32 ref: 00DDD550
                                                      • Sleep.KERNEL32(000007D0), ref: 00DDD562
                                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 00DDD56B
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD57F
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD582
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$OpenStart$ErrorLastManagerSleep
                                                      • String ID: ServicesActive
                                                      • API String ID: 104619213-3071072050
                                                      • Opcode ID: 868876a73d7e06e4c7269becd300d03ee6f3bba7cdb6ce919fb0f108ef14cf6b
                                                      • Instruction ID: cc705e142311f70fe39311461596aad181173a640b3820887a4eab4849d63832
                                                      • Opcode Fuzzy Hash: 868876a73d7e06e4c7269becd300d03ee6f3bba7cdb6ce919fb0f108ef14cf6b
                                                      • Instruction Fuzzy Hash: 78018F716403A57BDA302B63BC8DE5B3E6DDBD6B65B540026F706DA350DA64C90086B0
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000005), ref: 00DDDA82
                                                      • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,00000000,00000000,?,?,?,00000000), ref: 00DDDAB9
                                                        • Part of subcall function 00DD5EFF: GetProcessHeap.KERNEL32(00000008,?,00DD2FA7,00DD5A42,?,?,00DE03FD,00DD5A42,?,?,750901C0,00000000,?,00DD5A42,00000000), ref: 00DD5F02
                                                        • Part of subcall function 00DD5EFF: RtlAllocateHeap.NTDLL(00000000,?,00DE03FD,00DD5A42,?,?,750901C0,00000000,?,00DD5A42,00000000), ref: 00DD5F09
                                                      • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,00000000,?,?,?,?,00000000), ref: 00DDDAE2
                                                      • GetLastError.KERNEL32 ref: 00DDDAEC
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDDAFA
                                                      • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000005,00000000,00000000,00000000), ref: 00DDDBBB
                                                      • lstrcmpW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000), ref: 00DDDBFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnumHeapManagerOpenServicesStatus$AllocateCloseErrorHandleLastProcessServicelstrcmp
                                                      • String ID: ServicesActive
                                                      • API String ID: 899334174-3071072050
                                                      • Opcode ID: b3ff3de54b36c4dfda10c5358ee4525192693f3c505ae93bda59ebd015561d83
                                                      • Instruction ID: cedd05158f5e9d51c3daf97393be60103f4253543e02bcc4120199b272f288ec
                                                      • Opcode Fuzzy Hash: b3ff3de54b36c4dfda10c5358ee4525192693f3c505ae93bda59ebd015561d83
                                                      • Instruction Fuzzy Hash: A5516E71900219ABDF15EFA0DC95BEEBBB9EF18305F15006BE502B6381DB74AA44CB70
                                                      APIs
                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?,?,?,?,?), ref: 00DD7A16
                                                        • Part of subcall function 00DD8617: GetCurrentProcess.KERNEL32(00DE9698,00DD7A03,?,?,?,?), ref: 00DD861C
                                                        • Part of subcall function 00DD8617: IsWow64Process.KERNEL32(00000000), ref: 00DD8623
                                                        • Part of subcall function 00DD8617: GetProcessHeap.KERNEL32 ref: 00DD8629
                                                      • VirtualAllocEx.KERNEL32(00000000,00000000,00100000,00003000,00000040,00000000), ref: 00DD7A3A
                                                      • VirtualProtectEx.KERNEL32(00000000,00000000,00100000,00000040,00000000), ref: 00DD7A5B
                                                      • VirtualAllocEx.KERNEL32(00000000,33370000,00000100,00003000,00000040), ref: 00DD7A73
                                                      • WriteProcessMemory.KERNEL32(00000000,00000000,XXXXXX,00000000,00000000), ref: 00DD7A9D
                                                      • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00DD7AC5
                                                      • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DD7ADD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Virtual$AllocMemoryWrite$CreateCurrentHeapOpenProtectRemoteThreadWow64
                                                      • String ID: XXXXXX
                                                      • API String ID: 813767414-582547948
                                                      • Opcode ID: 601b307a50c175d021acace9b7461fd20bd8f993022a60c9a6143931014c0067
                                                      • Instruction ID: d0d9a995eb23e2c3b69bfb7a49bd10617bdb35643b915eeaa39752426f6e3bcd
                                                      • Opcode Fuzzy Hash: 601b307a50c175d021acace9b7461fd20bd8f993022a60c9a6143931014c0067
                                                      • Instruction Fuzzy Hash: 0D21A271A05355BFEB21A7A19C45FBF7A6CDF01725F24016AF614E42D0EBB48A008675
                                                      APIs
                                                      • GetFullPathNameA.KERNEL32(00DE96A8,00000104,?,00000000), ref: 00DD9E17
                                                      • PathCombineA.SHLWAPI(?,?,00DE5F88), ref: 00DD9E36
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 00DD9E46
                                                      • PathCombineA.SHLWAPI(?,00DE96A8,0000002E), ref: 00DD9E7D
                                                      • PathCombineA.SHLWAPI(?,?,Accounts\Account.rec0), ref: 00DD9E8C
                                                        • Part of subcall function 00DD9ADF: CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 00DD9AFC
                                                        • Part of subcall function 00DD9ADF: GetLastError.KERNEL32 ref: 00DD9B09
                                                        • Part of subcall function 00DD9ADF: CloseHandle.KERNEL32(00000000), ref: 00DD9B10
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 00DD9EA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Path$CombineFile$Find$CloseCreateErrorFirstFullHandleLastNameNext
                                                      • String ID: .$Accounts\Account.rec0
                                                      • API String ID: 3873318193-2526347284
                                                      • Opcode ID: 00f4b6317540239a3f3cf3fc9e6488f02e4326a2d45e7375c0030dbc401e1873
                                                      • Instruction ID: bb349a57a81038501dea376eb7c335cb62b1971027441b179330a990dfc3883d
                                                      • Opcode Fuzzy Hash: 00f4b6317540239a3f3cf3fc9e6488f02e4326a2d45e7375c0030dbc401e1873
                                                      • Instruction Fuzzy Hash: 071160B2A0125C6FDB20E7A4DC88EEEB76CEB44354F0045A7A609D3180E7749E888F70
                                                      APIs
                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,00000000,00000000,750901C0,00000000), ref: 00DE1FEC
                                                      • GetCurrentProcessId.KERNEL32 ref: 00DE1FF7
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,000000FF), ref: 00DE2015
                                                      • VirtualAllocEx.KERNEL32(00000000,00000000,00000800,00003000,00000040), ref: 00DE203F
                                                      • WriteProcessMemory.KERNEL32(00000000,00000000,00DE9158,00000800,00000000), ref: 00DE2057
                                                      • VirtualProtectEx.KERNEL32(00DE1FD3,00000000,00000800,00000040,?), ref: 00DE2068
                                                      • VirtualAllocEx.KERNEL32(00DE1FD3,00000000,00000103,00003000,00000004), ref: 00DE207F
                                                      • WriteProcessMemory.KERNEL32(00DE1FD3,00000000,?,00000103,00000000), ref: 00DE2095
                                                      • CreateRemoteThread.KERNEL32(00DE1FD3,00000000,00000000,0000010E,00000000,00000000,00000000), ref: 00DE20A8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Virtual$AllocHeapMemoryWrite$AllocateCreateCurrentFileModuleNameOpenProtectRemoteThread
                                                      • String ID:
                                                      • API String ID: 900395357-0
                                                      • Opcode ID: b0df0b5fead520b83126685173ac36d0b1b90521577f1e2c62084ef39687edb6
                                                      • Instruction ID: 226f6026bc2a5dcb377609795ebaf625da6a04735b1c4f281b787c9ebb89f865
                                                      • Opcode Fuzzy Hash: b0df0b5fead520b83126685173ac36d0b1b90521577f1e2c62084ef39687edb6
                                                      • Instruction Fuzzy Hash: 52214271640358BEE720AB51DC4BFEA7B6CEB45760F100165B705EA1D0DAF06E409AB4
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 00DDD4AB
                                                      • OpenServiceW.ADVAPI32(00000000,?,00000002), ref: 00DDD4C0
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD4CD
                                                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DDD4E6
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD4FA
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD4FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                      • String ID: ServicesActive
                                                      • API String ID: 493672254-3071072050
                                                      • Opcode ID: 00034753b5f045565d4f4467ab3762535859a261379fc22fc5c3f9ed2fe4043a
                                                      • Instruction ID: 490a284d648c9b71a3ed583312c2eddedda0f04d9c7bea19e961b70e55cb0cfa
                                                      • Opcode Fuzzy Hash: 00034753b5f045565d4f4467ab3762535859a261379fc22fc5c3f9ed2fe4043a
                                                      • Instruction Fuzzy Hash: 87F096322443657BDA212B67AC89E6B3E5DEBC67717440232FB16DA390CA74D80186B0
                                                      APIs
                                                      • InitializeSecurityDescriptor.ADVAPI32(?,00000001,00000000,?,?,?,?,?,?,?,?,?,00DE1B06), ref: 00DE18C7
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,00DE1B06), ref: 00DE18DB
                                                      • RegCreateKeyExA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command,00000000,00000000,00000000,00020006,0000000C,00DE1B06,?), ref: 00DE1913
                                                      • RegCloseKey.ADVAPI32(00DE1B06), ref: 00DE1920
                                                      • SetLastError.KERNEL32(00000000), ref: 00DE192B
                                                      Strings
                                                      • Software\Classes\Folder\shell\open\command, xrefs: 00DE1909
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DescriptorSecurity$CloseCreateDaclErrorInitializeLast
                                                      • String ID: Software\Classes\Folder\shell\open\command
                                                      • API String ID: 1473660444-2536721355
                                                      • Opcode ID: 80fd346f7ecd9dc6dae0bc07b7ff84bedb53c8cc16dd03b9325928ed9321ef8b
                                                      • Instruction ID: 5cc2a9ce9fc8dd32e93fd664402719b00afa3dc0842d751d538d869d3be7ce0e
                                                      • Opcode Fuzzy Hash: 80fd346f7ecd9dc6dae0bc07b7ff84bedb53c8cc16dd03b9325928ed9321ef8b
                                                      • Instruction Fuzzy Hash: 30011A75A01358BADB20ABA2EC89EDF7FBCEF09751F040121F605F6151E6708644CAB0
                                                      APIs
                                                      • BCryptOpenAlgorithmProvider.BCRYPT(00000020,AES,00000000,00000000,?,00000000,?,?,?,00DDCA5F,?), ref: 00DDCCD1
                                                      • BCryptSetProperty.BCRYPT(00000020,ChainingMode,ChainingModeGCM,00000020,00000000,?,00DDCA5F,?), ref: 00DDCCEA
                                                      • BCryptGenerateSymmetricKey.BCRYPT(00000020,00DDCA5F,00000000,00000000,?,00000020,00000000,?,00DDCA5F,?), ref: 00DDCCFF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$AlgorithmGenerateOpenPropertyProviderSymmetric
                                                      • String ID: AES$ChainingMode$ChainingModeGCM
                                                      • API String ID: 1692524283-1213888626
                                                      • Opcode ID: fa95598c79d8473c6557992c8bf9fb3f01be0dcbc29eff44a6fc061241b07637
                                                      • Instruction ID: e7e6087d3501aabb35a321f61456bbbc02bb614930b613f2997eef8af577a650
                                                      • Opcode Fuzzy Hash: fa95598c79d8473c6557992c8bf9fb3f01be0dcbc29eff44a6fc061241b07637
                                                      • Instruction Fuzzy Hash: E6F06231291321BFDB251B5BEC49E9BBFACEF5ABA5B100026F505D6264D6B1580097F0
                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 00DDCFE0
                                                      • BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 00DDD00E
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • LocalFree.KERNEL32(?), ref: 00DDD096
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapLocal$AllocAllocateCryptDecryptFreeProcess
                                                      • String ID: 0$v1
                                                      • API String ID: 4131498132-3331332043
                                                      • Opcode ID: ca4104652dca7216030025acb3948b2ec4fa663ee2c51daadd597e07984af9ac
                                                      • Instruction ID: e52ac79de88dc145a3f11701398cff16102c7dcf7d1db781ade43f42ef18a9fb
                                                      • Opcode Fuzzy Hash: ca4104652dca7216030025acb3948b2ec4fa663ee2c51daadd597e07984af9ac
                                                      • Instruction Fuzzy Hash: 92414AB6D00108BBDF11ABE5DC85DBEBBBDEF84344F044026F915E6340E6759A468B71
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,750901C0), ref: 00DE20C7
                                                      • Process32First.KERNEL32(00000000,?), ref: 00DE20F4
                                                      • Process32Next.KERNEL32(00000000,?), ref: 00DE211B
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DE2126
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID: explorer.exe
                                                      • API String ID: 420147892-3187896405
                                                      • Opcode ID: cee8e22d529095cf0f8daca3de5a83a1b50e2cb36ee2d83d9802fc6a32e9b623
                                                      • Instruction ID: d63a69c893c7ac71351bf82f3099091424ea727e7f35105ccec6042ca4f4a5c4
                                                      • Opcode Fuzzy Hash: cee8e22d529095cf0f8daca3de5a83a1b50e2cb36ee2d83d9802fc6a32e9b623
                                                      • Instruction Fuzzy Hash: D601F976901364ABDB60B761AC45FEA37FCDF44710F0000A1FA05E5180EE30DB808A74
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(ntdll.dll), ref: 00DDFA5A
                                                      • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00DDFA6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RtlGetVersion$ntdll.dll
                                                      • API String ID: 2574300362-1489217083
                                                      • Opcode ID: ee44fffa54c6c1c5318b9006e2af4013ce217e09e950be48918be16823cfd6f3
                                                      • Instruction ID: ca03bac8618d113113f1b6ff69f560eb091757e8dbc520039a90fc51396b30b7
                                                      • Opcode Fuzzy Hash: ee44fffa54c6c1c5318b9006e2af4013ce217e09e950be48918be16823cfd6f3
                                                      • Instruction Fuzzy Hash: C7415B30A4022C9ADF248B55DC663FC76B4AF5174DF1988F7E646E4281E278CEC9CA74
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,-00000001,7508E8E0,?,?,?,00DDA5E6,00001000,?,00000000,00001000), ref: 00DDA650
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,00DDA5E6), ref: 00DDA686
                                                      • lstrcpyW.KERNEL32(?,Could not decrypt,?,?,00DDA5E6,00001000,?,00000000,00001000), ref: 00DDA6BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocCryptDataGlobalUnprotectlstrcpy
                                                      • String ID: Could not decrypt
                                                      • API String ID: 3112367126-1484008118
                                                      • Opcode ID: 491eb99c201b7d85b73913d0add2c3529f9a209a05cb51d525b3602bbbc845c6
                                                      • Instruction ID: d292456c8a8301a165953b560ffec746f53504345bf45d769c33802189f41b5c
                                                      • Opcode Fuzzy Hash: 491eb99c201b7d85b73913d0add2c3529f9a209a05cb51d525b3602bbbc845c6
                                                      • Instruction Fuzzy Hash: B811C176900719DBC721DB99C8809AEF7BCEF48700B1880A6E955E7301E631EA01CBB1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00DDD471,?,?,00000001), ref: 00DDF5C2
                                                      • LookupAccountSidW.ADVAPI32(00000000,00DDD471,?,00000104,?,00000010,?), ref: 00DDF5E7
                                                      • GetLastError.KERNEL32(?,?,00000001), ref: 00DDF5F1
                                                      • FreeSid.ADVAPI32(00DDD471,?,?,00000001), ref: 00DDF5FF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AccountAllocateErrorFreeInitializeLastLookup
                                                      • String ID:
                                                      • API String ID: 1866703397-0
                                                      • Opcode ID: 6b0da8eb60e1fe2b875919f9b091bb4e25bf3ed81b323518ca57a560f522e70c
                                                      • Instruction ID: d6c274da9383d0516e2f151b1c9125a30e5237b5dd7b9c8b867d097ec2d6cb64
                                                      • Opcode Fuzzy Hash: 6b0da8eb60e1fe2b875919f9b091bb4e25bf3ed81b323518ca57a560f522e70c
                                                      • Instruction Fuzzy Hash: AF11CBB190021DBBDB10EFD5EC89AEEB7BCEB04344F1404B6E605E6250E7709B489BB5
                                                      APIs
                                                      • CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00DDCC73
                                                      • LocalAlloc.KERNEL32(00000040,?,?,00DDCBC6,?,00000000,?,00000000,?), ref: 00DDCC81
                                                      • CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00DDCC97
                                                      • LocalFree.KERNEL32(?,?,00DDCBC6,?,00000000,?,00000000,?), ref: 00DDCCA5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BinaryCryptLocalString$AllocFree
                                                      • String ID:
                                                      • API String ID: 4291131564-0
                                                      • Opcode ID: 6e42640af2807715d5cf009f4267c24f3afcecc1071876bca92e2b588202975f
                                                      • Instruction ID: 4e5f3e0e8c41750e50617c1fadd8bb68b484b54357b73fb222d5ca11effb7075
                                                      • Opcode Fuzzy Hash: 6e42640af2807715d5cf009f4267c24f3afcecc1071876bca92e2b588202975f
                                                      • Instruction Fuzzy Hash: E701B671611226BFEB215B5BDD89E97BEACEF097A1B140021FA08DA350E6718C10CAB0
                                                      APIs
                                                        • Part of subcall function 00DDF76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 00DDF79C
                                                        • Part of subcall function 00DD3335: lstrcatW.KERNEL32(00000000,750901C0,?,?,00DE3589,?,00DE1515,00DE3589,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3365
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DD351D: PathFindExtensionW.SHLWAPI(?,?,00DD282E,?,?,00000000,00DE4684), ref: 00DD3527
                                                      • URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 00DD2860
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 00DD288A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Path$DownloadExecuteExtensionFileFindFolderFreeShellSpecialVirtuallstrcatlstrcpy
                                                      • String ID: open
                                                      • API String ID: 4166385161-2758837156
                                                      • Opcode ID: d34aa4616ea5caa245f5d7ec5f4bc843c33af82b6f1f6fcbdf8127cb7a6c2f55
                                                      • Instruction ID: 5a6865d931eabe6c689c85dfb3dad32d449417c8215879cab4847c2c7a83d1b9
                                                      • Opcode Fuzzy Hash: d34aa4616ea5caa245f5d7ec5f4bc843c33af82b6f1f6fcbdf8127cb7a6c2f55
                                                      • Instruction Fuzzy Hash: 3D215A75900208BBDB24BFA1D885EEE7B78EF95710F00805AF4166B391DB749B49CBB1
                                                      APIs
                                                        • Part of subcall function 00DD5F53: GetProcessHeap.KERNEL32(00000000,000000F4,00DE0477,?,750901C0,00000000,00DD5A34), ref: 00DD5F56
                                                        • Part of subcall function 00DD5F53: HeapAlloc.KERNEL32(00000000), ref: 00DD5F5D
                                                      • GetLogicalDriveStringsW.KERNEL32(00000104,00000000), ref: 00DE0060
                                                      • GetLogicalDriveStringsW.KERNEL32(00000000,00000000), ref: 00DE0087
                                                      • GetDriveTypeW.KERNEL32(?,00000000,00000000), ref: 00DE00B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Drive$HeapLogicalStrings$AllocProcessType
                                                      • String ID:
                                                      • API String ID: 2408535517-0
                                                      • Opcode ID: 43740d2c21fd262de04f51dfcbf727cc292b2982b619a922d61b5c800b796648
                                                      • Instruction ID: 61b235cc9722383f1e3fffab2c5807d4168574c3f0dc73dc6acbc8ef92151734
                                                      • Opcode Fuzzy Hash: 43740d2c21fd262de04f51dfcbf727cc292b2982b619a922d61b5c800b796648
                                                      • Instruction Fuzzy Hash: 2E314D71E002199BCF14FBE4D9969AFBBB8EF44340F10446AE502B7381EA705E44CBB1
                                                      APIs
                                                      • lstrlenA.KERNEL32(?,?,?,00000000,?,00DDAA4B,?,?,?,?,?,encryptedUsername,?,?,00000000,C0000000), ref: 00DDB17B
                                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,?,?,00000000,00000000), ref: 00DDB1A9
                                                        • Part of subcall function 00DD5EB4: VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00DD3652,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD5EBE
                                                      • lstrcpyA.KERNEL32(00000000,?), ref: 00DDB1F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocBinaryCryptStringVirtuallstrcpylstrlen
                                                      • String ID:
                                                      • API String ID: 573875632-0
                                                      • Opcode ID: 27bca8caa44cc10cae4247d9cb1bc862953141508b92297a0ce5771f68d5093f
                                                      • Instruction ID: 9dbe9fb688379b6fe60c7c42fb6c89bbe7061eee233f926f53f5bd538c35cc88
                                                      • Opcode Fuzzy Hash: 27bca8caa44cc10cae4247d9cb1bc862953141508b92297a0ce5771f68d5093f
                                                      • Instruction Fuzzy Hash: 4311B3B6D00209AFDB01DFA4D8849EEBBBDEB48344F1041AAF919E7251D7359A45CBA0
                                                      APIs
                                                      • OpenProcessToken.ADVAPI32(00000000,00000028,?,?,00000000,00000000,?,?,?,?,?,?,?,?,00DDE18E), ref: 00DDF644
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,?), ref: 00DDF655
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,?,?,?,00000000,00000000), ref: 00DDF68A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Token$AdjustLookupOpenPrivilegePrivilegesProcessValue
                                                      • String ID:
                                                      • API String ID: 658607936-0
                                                      • Opcode ID: 353e52ec131f4e825d0de7b48ebd15bf2e10aedefd6f2ae9df20f10e09e69150
                                                      • Instruction ID: 8d59a34e65550f2e26f679cf09fd4278cd2aa5b72c3b66d5b641f922575d2d0d
                                                      • Opcode Fuzzy Hash: 353e52ec131f4e825d0de7b48ebd15bf2e10aedefd6f2ae9df20f10e09e69150
                                                      • Instruction Fuzzy Hash: 9011DA75A10219AFEB11DFA5DC849EFFBBCFB48640F10452AA501F2250E6709A049BA0
                                                      APIs
                                                      • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?), ref: 00DDCB24
                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,?,00DDCAD5,?,00000000,?,?,?,?,00DDCA44), ref: 00DDCB3B
                                                      • LocalFree.KERNEL32(00DDCAD5,?,?,?,?,?,00DDCAD5,?,00000000,?,?,?,?,00DDCA44), ref: 00DDCB5B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Local$AllocCryptDataFreeUnprotect
                                                      • String ID:
                                                      • API String ID: 2068576380-0
                                                      • Opcode ID: ac81aa81e5da8cbf27972dfd8bdc613c63fedc5c358b1db680d8a1979c352732
                                                      • Instruction ID: 20dea680e78babd35be025a17509afae93049715412c3b2bbe6731399a476c98
                                                      • Opcode Fuzzy Hash: ac81aa81e5da8cbf27972dfd8bdc613c63fedc5c358b1db680d8a1979c352732
                                                      • Instruction Fuzzy Hash: 860100B5910209AFDB059FA4DC4A8AEBBB9EB48311F14016AFD41A6350E671D944CAB0
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,?,?), ref: 00DDFF54
                                                      • FindNextFileW.KERNEL32(00000000,00000010,00000000), ref: 00DDFFF6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFind$FirstNext
                                                      • String ID:
                                                      • API String ID: 1690352074-0
                                                      • Opcode ID: 3be5c1d49a0e63f8395a3342947a65737543caa763ae1b200b63ed00ea27837e
                                                      • Instruction ID: e23bf4c7ad0cefd70ffd94db4f481e2b7fed0d4cf1858b9212e96f37c54906d7
                                                      • Opcode Fuzzy Hash: 3be5c1d49a0e63f8395a3342947a65737543caa763ae1b200b63ed00ea27837e
                                                      • Instruction Fuzzy Hash: BD314E75D01209ABDB10EFB5D885BEEBBB4EF48310F10456AE402A3381DB749A44CF70
                                                      APIs
                                                      • NetUserAdd.NETAPI32(00000000,00000001,?,00000000,?,00000000,00F1E080,?,?,?,00DDE634,00F1E07C,00F1E080), ref: 00DDD45A
                                                        • Part of subcall function 00DDF56D: AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00DDD471,?,?,00000001), ref: 00DDF5C2
                                                        • Part of subcall function 00DDF56D: LookupAccountSidW.ADVAPI32(00000000,00DDD471,?,00000104,?,00000010,?), ref: 00DDF5E7
                                                        • Part of subcall function 00DDF56D: GetLastError.KERNEL32(?,?,00000001), ref: 00DDF5F1
                                                        • Part of subcall function 00DDF56D: FreeSid.ADVAPI32(00DDD471,?,?,00000001), ref: 00DDF5FF
                                                      • NetLocalGroupAddMembers.NETAPI32(00000000,00000000,00000003,00010201,00000001,?,?,?,00DDE634,00F1E07C,00F1E080), ref: 00DDD47B
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Free$AccountAllocateErrorGroupInitializeLastLocalLookupMembersUserVirtual
                                                      • String ID:
                                                      • API String ID: 188019324-0
                                                      • Opcode ID: d41be4783309a5e6814c2780254b1d247c9a475a4406b0f5cafdeb578f37876f
                                                      • Instruction ID: 8598a8622a0c5b4ddf84206180c4de241c407a77019fc006b639f3b974baff8f
                                                      • Opcode Fuzzy Hash: d41be4783309a5e6814c2780254b1d247c9a475a4406b0f5cafdeb578f37876f
                                                      • Instruction Fuzzy Hash: 88111272900208AFDB11DFA9D8849EEB7F9FF59314B10442BF951EB310D7749A448B60
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5591a45f8ec71f9df1d6b4e146d8c1370b447604982269fdd642af02d843cb38
                                                      • Instruction ID: 99a72845c57cb91a635bf6b1712bec3fa8a5c92854a38602b5766b9c97298822
                                                      • Opcode Fuzzy Hash: 5591a45f8ec71f9df1d6b4e146d8c1370b447604982269fdd642af02d843cb38
                                                      • Instruction Fuzzy Hash: 9D218776D00208ABDB159FA8D892BEEB7B9EF44310F144067E505EB341E63199858BB4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ee9a03c5baf9720a6e7d8e5d675cdaadf48f2bf7d7bc5066cbb6e6d82dfa4c0b
                                                      • Instruction ID: f0535cccd7094f04b75fe9f53188737f403d50586e6a09fea536b4da622641f3
                                                      • Opcode Fuzzy Hash: ee9a03c5baf9720a6e7d8e5d675cdaadf48f2bf7d7bc5066cbb6e6d82dfa4c0b
                                                      • Instruction Fuzzy Hash: 041148323905210A872C983E4D57067FBDBD3C911075C853EE59BCB251E431E7068690
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 60c1047820937477a62ebe8b3556f1e42973dfa080cef3034b4bd0468cc2296e
                                                      • Instruction ID: 6bc48a04d338f3165ae8bdc40ae71c84b97b8aff9785fe17f5f85ed9318c3bc0
                                                      • Opcode Fuzzy Hash: 60c1047820937477a62ebe8b3556f1e42973dfa080cef3034b4bd0468cc2296e
                                                      • Instruction Fuzzy Hash: F2E08C32200590CBCA21FB1BD440B12BBB4FBC0370B2A046CE48AA3501C3A0FCA1CAB0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1a420be4fd1d60918cb23d9961ed4b3e9e51cbd9e1df09b6748f783962a9c5c8
                                                      • Instruction ID: fd984e7c4e6249c65f8a4f255fed2bfd3c12a57ee4a4e9ce0390df81adf119fa
                                                      • Opcode Fuzzy Hash: 1a420be4fd1d60918cb23d9961ed4b3e9e51cbd9e1df09b6748f783962a9c5c8
                                                      • Instruction Fuzzy Hash: E5D0EA783619418FDB51CF19C684E01B3E4EB49B60B098491E909CB736D734ED40EA10
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                      • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                                      • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 00DDB6AC
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB6B5
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DD3272: wsprintfW.USER32 ref: 00DD328D
                                                      • PathFileExistsW.SHLWAPI(00DDA760,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?,nss3.dll), ref: 00DDB7A3
                                                      • PathFileExistsW.SHLWAPI(00DDA760,.dll,?,00DDA760,?,00000104,00000000), ref: 00DDB7FF
                                                      • LoadLibraryW.KERNEL32(?,00DDA760,?,00000104,00000000), ref: 00DDB83E
                                                      • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB849
                                                      • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB854
                                                      • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB85F
                                                      • LoadLibraryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB86A
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,00000104,00000000), ref: 00DDB957
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$CurrentDirectory$ExistsFilePath$FreeVirtuallstrcpywsprintf
                                                      • String ID: .dll$NSSBase64_DecodeBuffer$NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_CheckUserPassword$PK11_FreeSlot$PK11_GetInternalKeySlot$PR_GetError$mozglue.dll$msvcp$msvcp120.dll$msvcr$msvcr120.dll$nss3.dll$softokn3.dll
                                                      • API String ID: 410702425-850564384
                                                      • Opcode ID: 473d045cc939c497cb90caf1c6ed66949ad8deac79a4cf81bbe3ab68bc5fa327
                                                      • Instruction ID: b76d297c62a432b24c255b5b93229c9793483eb6ce958e4ef7c9a6ce72b4430d
                                                      • Opcode Fuzzy Hash: 473d045cc939c497cb90caf1c6ed66949ad8deac79a4cf81bbe3ab68bc5fa327
                                                      • Instruction Fuzzy Hash: F29118B5A00649EBCB04FFA1E8919EEB779FF44300F10412BE515A6351DB34AB54CBB1
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00DD95BC
                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,-00000010), ref: 00DD962B
                                                      • lstrcatW.KERNEL32(-00000010,\Microsoft Vision\), ref: 00DD9645
                                                      • CreateDirectoryW.KERNEL32(-00000010,00000000), ref: 00DD9651
                                                      • lstrcpyW.KERNEL32(?,-00000010), ref: 00DD968B
                                                      • lstrcatW.KERNEL32(?,00DE4A58), ref: 00DD969E
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DDFF27: FindFirstFileW.KERNEL32(?,?,?,?), ref: 00DDFF54
                                                      • GetLocalTime.KERNEL32(?,00000000,ExplorerIdentifier), ref: 00DD9721
                                                      • wsprintfW.USER32 ref: 00DD9758
                                                      • CreateFileW.KERNEL32(?,10000000,00000001,00000000,00000002,00000080,00000000,00000010,?), ref: 00DD979A
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DD97AA
                                                      • RegisterClassW.USER32 ref: 00DD97C9
                                                      • CreateWindowExW.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,?), ref: 00DD97E1
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00DD9802
                                                      • TranslateMessage.USER32(?), ref: 00DD9814
                                                      • DispatchMessageA.USER32(?), ref: 00DD981F
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00DD982F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$Create$FileHandlelstrcatlstrcpylstrlen$ClassCloseDirectoryDispatchFindFirstFolderLocalModulePathRegisterTimeTranslateWindowwsprintf
                                                      • String ID: %02d-%02d-%02d_%02d.%02d.%02d$ExplorerIdentifier$\Microsoft Vision\
                                                      • API String ID: 2678186124-2372768292
                                                      • Opcode ID: cd2e70f41a86300f949086546ea1e4a9b040763a38c3062d136bdef011d5014f
                                                      • Instruction ID: f294ec6c1ddf8fd8a5f6cf83c695e5e9bb3310e6ae8e09425789d3a0cd469055
                                                      • Opcode Fuzzy Hash: cd2e70f41a86300f949086546ea1e4a9b040763a38c3062d136bdef011d5014f
                                                      • Instruction Fuzzy Hash: 5D717CB2504384AFC710EBA5DC89EABB7E8FB89700F04091AF655DA391DA75D904CB72
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?), ref: 00DDA12F
                                                      • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?), ref: 00DDA14C
                                                      • lstrcpyW.KERNEL32(?,Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676), ref: 00DDA19F
                                                      • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DDA1B5
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,00000800,00000000,00000000,00000000,00000000), ref: 00DDA1E8
                                                      • RegCloseKey.ADVAPI32(?), ref: 00DDA1F9
                                                      • lstrcpyW.KERNEL32(?,?), ref: 00DDA20D
                                                      • lstrcatW.KERNEL32(?,00DE4684), ref: 00DDA21B
                                                      • lstrcatW.KERNEL32(?,?), ref: 00DDA22F
                                                      • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?), ref: 00DDA24C
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00DDA261
                                                      • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?), ref: 00DDA27E
                                                      Strings
                                                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 00DDA142, 00DDA152
                                                      • Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 00DDA17C, 00DDA181, 00DDA191
                                                      • Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676, xrefs: 00DDA15F, 00DDA16F
                                                      • Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 00DDA135
                                                      • Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 00DDA125
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Open$Closelstrcatlstrcpy$EnumInfoQuery
                                                      • String ID: Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                                                      • API String ID: 1891545080-2020977430
                                                      • Opcode ID: 6c3c700e898ab7940b11182628d03d4811ff9316f8abc721b5a007785fc229f7
                                                      • Instruction ID: 5fd918bf3c058614e6e57a9e1a057e38d56783677d7666cdc5bd6d711a4f543a
                                                      • Opcode Fuzzy Hash: 6c3c700e898ab7940b11182628d03d4811ff9316f8abc721b5a007785fc229f7
                                                      • Instruction Fuzzy Hash: 9F413FB290021DBEEB21EA95DC84EFF7B7CEB04784F1444A6B615E2201E6719F449BB1
                                                      APIs
                                                        • Part of subcall function 00DDFBFC: GetCurrentProcess.KERNEL32(00000008,00000000,750901C0,00000000,750901C0,00000000,?,?,?,?,00DE3589,?), ref: 00DDFC0E
                                                        • Part of subcall function 00DDFBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00DE3589,?), ref: 00DDFC15
                                                        • Part of subcall function 00DDFBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00DE3589,?), ref: 00DDFC33
                                                        • Part of subcall function 00DDFBFC: CloseHandle.KERNEL32(00000000), ref: 00DDFC48
                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00DE1AD8
                                                      • GetCurrentProcess.KERNEL32(?), ref: 00DE1AE7
                                                      • IsWow64Process.KERNEL32(00000000), ref: 00DE1AEE
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000400), ref: 00DE1B25
                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00DE1B57
                                                      • lstrcatW.KERNEL32(?,\sdclt.exe), ref: 00DE1B69
                                                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00DE1B81
                                                      • ShellExecuteExW.SHELL32(?), ref: 00DE1BB3
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00DE1BBD
                                                      • Sleep.KERNEL32(000007D0), ref: 00DE1BD5
                                                      • RegDeleteKeyA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command), ref: 00DE1BE5
                                                      • ExitProcess.KERNEL32 ref: 00DE1BEC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CloseCurrentExecuteHandleShellToken$DeleteDirectoryExitFileInformationModuleNameOpenSleepSystemTerminateWow64lstrcat
                                                      • String ID: <$@$DelegateExecute$Software\Classes\Folder\shell\open\command$\sdclt.exe$open
                                                      • API String ID: 3164795406-2081737068
                                                      • Opcode ID: 0d2df9ed7cec009f9d67d1041b1d820aa43ae7c6f31aff0c299810805a4cd683
                                                      • Instruction ID: 52c4085774e9ae3cabc72014699fa01680055af7ebc7533e4f8d6335593c608d
                                                      • Opcode Fuzzy Hash: 0d2df9ed7cec009f9d67d1041b1d820aa43ae7c6f31aff0c299810805a4cd683
                                                      • Instruction Fuzzy Hash: CF312BB1C01298FBDB10BBA5EC899DEBB7CEF45711F004166F609E6250E7355A85CB70
                                                      APIs
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      • LoadResource.KERNEL32(00000000,?,00000000), ref: 00DE30EE
                                                      • SizeofResource.KERNEL32(00000000,?), ref: 00DE30FA
                                                      • LockResource.KERNEL32(00000000), ref: 00DE3104
                                                      • GetTempPathA.KERNEL32(00000400,?), ref: 00DE313E
                                                      • lstrcatA.KERNEL32(?,find.exe), ref: 00DE3152
                                                      • GetTempPathA.KERNEL32(00000400,?), ref: 00DE3160
                                                      • lstrcatA.KERNEL32(?,find.db), ref: 00DE316E
                                                      • CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000002,00000084,00000000), ref: 00DE3189
                                                      • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00DE319B
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DE31A2
                                                      • wsprintfA.USER32 ref: 00DE31D2
                                                      • ShellExecuteExA.SHELL32(0000003C), ref: 00DE3220
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Resource$FilePathTemplstrcat$CloseCreateExecuteFreeHandleLoadLockShellSizeofVirtualWritelstrcpywsprintf
                                                      • String ID: -w %ws -d C -f %s$<$@$find.db$find.exe
                                                      • API String ID: 2504251837-265381321
                                                      • Opcode ID: 3c01dd0f4cd7c8add7f8b8788bff880088ae4b699a8bd78e1d1ed2f3a893a3ee
                                                      • Instruction ID: e5bb9f92c51fb5ce5625d233f9449bd22bf5741c446f74083cbb2ff9780e5da4
                                                      • Opcode Fuzzy Hash: 3c01dd0f4cd7c8add7f8b8788bff880088ae4b699a8bd78e1d1ed2f3a893a3ee
                                                      • Instruction Fuzzy Hash: F84128B1900259ABDB10EFA1DD84EDEBBBCFF89304F004156F608E6251DB745A858BB4
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,?), ref: 00DD8E8F
                                                      • GetWindowTextW.USER32(00000000,?,00000104), ref: 00DD8EA2
                                                      • lstrlenW.KERNEL32(-00000210,{Unknown},?,?), ref: 00DD8F0B
                                                      • lstrcpyW.KERNEL32(-00000210,?,?,?), ref: 00DD8F58
                                                      • CreateFileW.KERNEL32(?,00000004,00000001,00000000,00000004,00000080,00000000,?,?), ref: 00DD8F79
                                                      • lstrlenW.KERNEL32(00DE4AD0,00000008,00000000,?,?), ref: 00DD8FA2
                                                      • WriteFile.KERNEL32(?,00DE4AD0,00000000,?,?), ref: 00DD8FAE
                                                      • WriteFile.KERNEL32(?,?,00000000,-00000008,00000000,?,?), ref: 00DD8FD2
                                                      • lstrlenW.KERNEL32(00DE4AD0,-00000008,00000000,?,?), ref: 00DD8FE5
                                                      • WriteFile.KERNEL32(?,00DE4AD0,00000000,?,?), ref: 00DD8FF1
                                                      • lstrlenW.KERNEL32(?,00000008,00000000,?,?), ref: 00DD9003
                                                      • WriteFile.KERNEL32(?,?,00000000,?,?), ref: 00DD9011
                                                      • CloseHandle.KERNEL32(?,?,?), ref: 00DD901B
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3335: lstrcatW.KERNEL32(00000000,750901C0,?,?,00DE3589,?,00DE1515,00DE3589,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3365
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$File$Write$Windowlstrcpy$CloseCreateForegroundFreeHandleTextVirtuallstrcat
                                                      • String ID: {Unknown}
                                                      • API String ID: 2314120260-4054869793
                                                      • Opcode ID: 7ab99d7edab73a8c27735dfb22733e6bd6f1c6c76e4f79ad97cb55bf535d60d3
                                                      • Instruction ID: db0798363575821615fe5fc8e9b790f738f004268336d1bcf1b4b5292785ef53
                                                      • Opcode Fuzzy Hash: 7ab99d7edab73a8c27735dfb22733e6bd6f1c6c76e4f79ad97cb55bf535d60d3
                                                      • Instruction Fuzzy Hash: 995150B1A01244AFDB11FF64DC95EAAB7A8EF44304F45406AF505EB361DB71AE04CB74
                                                      APIs
                                                      • InitializeCriticalSection.KERNEL32(?,?,?), ref: 00DDE407
                                                      • DeleteCriticalSection.KERNEL32(?,?,?), ref: 00DDE41E
                                                      • EnterCriticalSection.KERNEL32(00F1E020,?,?), ref: 00DDE42A
                                                        • Part of subcall function 00DDDE1F: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,?,00F1E020,?,?,00DDE451,?,?), ref: 00DDDE51
                                                      • RegCreateKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList,00000000,00000000,00000000,000F013F,00000000,?,?,00000000,00000000,?,?), ref: 00DDE5FF
                                                      • RegSetValueExW.ADVAPI32(?,00000000,00000004,?,00000004,?,?), ref: 00DDE61A
                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00DDE623
                                                      • LeaveCriticalSection.KERNEL32(00F1E020,00000000,00F1E07C,00F1E080,?,?), ref: 00DDE65E
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DD3261: lstrlenW.KERNEL32(750901C0,00DD3646,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3268
                                                      • LeaveCriticalSection.KERNEL32(00F1E020,00000000,rpdp,00F1E080,00000000,rudp,00F1E07C,00F1E07C,00F1E080,?,?), ref: 00DDE6C4
                                                      • LeaveCriticalSection.KERNEL32(00F1E020,00000000,?,?), ref: 00DDE6F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leavelstrlen$lstrcpy$CloseCreateDeleteEnterFreeInitializeOpenValueVirtual
                                                      • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList$rpdp$rudp
                                                      • API String ID: 2046459734-177601018
                                                      • Opcode ID: 227e7e47c4048d4ca0b927ee6bf844bc1f7fb8dbb0ae6edf3e7482e8c20a3bbe
                                                      • Instruction ID: 014a9a9fa549c73cdb80161a8d6e902151dff1450283006b09c5e4b67564b56a
                                                      • Opcode Fuzzy Hash: 227e7e47c4048d4ca0b927ee6bf844bc1f7fb8dbb0ae6edf3e7482e8c20a3bbe
                                                      • Instruction Fuzzy Hash: AA719071600218ABDF14FB60DC96EEE7B29EF5C750B00442BF906AA392DF70AA45D771
                                                      APIs
                                                        • Part of subcall function 00DDEA89: GetCurrentThreadId.KERNEL32 ref: 00DDEA95
                                                        • Part of subcall function 00DDEA89: SetEvent.KERNEL32(00000000), ref: 00DDEAA9
                                                        • Part of subcall function 00DDEA89: WaitForSingleObject.KERNEL32(00DE956C,00001388), ref: 00DDEAB6
                                                        • Part of subcall function 00DDEA89: TerminateThread.KERNEL32(00DE956C,000000FE), ref: 00DDEAC7
                                                      • CreatePipe.KERNEL32(00000000,00000000,?,00000000,?,?,00000000), ref: 00DDEB41
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000001,00000002,?,00000000), ref: 00DDEB5E
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 00DDEB64
                                                      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00DDEB6D
                                                      • CreatePipe.KERNEL32(00000000,00000000,0000000C,00000000,?,00000000), ref: 00DDEB85
                                                      • GetCurrentProcess.KERNEL32(00DE9560,00000000,00000000,00000002,?,00000000), ref: 00DDEB9E
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 00DDEBA4
                                                      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00DDEBA7
                                                      • GetCurrentProcess.KERNEL32(00DE9564,00000000,00000000,00000002,?,00000000), ref: 00DDEBBC
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000), ref: 00DDEBC2
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00DDEC18
                                                      • CreateThread.KERNEL32(00000000,00000000,00DDE92A,00DE9558,00000000,00DE9570), ref: 00DDEC38
                                                      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00DDEBC5
                                                        • Part of subcall function 00DDEC8C: CloseHandle.KERNEL32(00DE9568,00DE9558,00DDEADC,?,00000000,00DD2A8C,00000000,exit,00000000,start), ref: 00DDEC96
                                                        • Part of subcall function 00DD362D: lstrcpyW.KERNEL32(00000000,750901C0,?,?,?,00DE150A,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3657
                                                        • Part of subcall function 00DDE891: CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000010,00000000,00000000,?,00000000,?,?,00000001), ref: 00DDE8E3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentProcess$Create$Handle$DuplicateThread$EventPipe$CloseObjectSingleTerminateWaitlstrcpy
                                                      • String ID:
                                                      • API String ID: 337272696-0
                                                      • Opcode ID: a9f7a7d2e26d94ca8380e8b02df53a105ab98b1d1acc5efd070d6a3a1e9d061a
                                                      • Instruction ID: 730041187b91ad96e4f0b2733bb5ae8f56b2fba8f50a258e6c2469de934d9fda
                                                      • Opcode Fuzzy Hash: a9f7a7d2e26d94ca8380e8b02df53a105ab98b1d1acc5efd070d6a3a1e9d061a
                                                      • Instruction Fuzzy Hash: EF415B71A10309BADF15FBA5DD96FEEBB7CEF10741F100016B201AA2D1DBB0AA04CA71
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,00000001), ref: 00DDD5A0
                                                      • OpenServiceW.ADVAPI32(00000000,?,00000001), ref: 00DDD5B9
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD5C6
                                                      • QueryServiceConfigW.ADVAPI32(00000000,00000000,00000000,?), ref: 00DDD5D5
                                                      • GetLastError.KERNEL32 ref: 00DDD5DF
                                                      • QueryServiceConfigW.ADVAPI32(00000000,00000000,?,?), ref: 00DDD600
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD611
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD614
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD624
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00DDD627
                                                        • Part of subcall function 00DD1099: GetProcessHeap.KERNEL32(00000000,00000000,00DE1E18,00000000,00000000,00000000,00000000,.bss,00000000), ref: 00DD109F
                                                        • Part of subcall function 00DD1099: HeapFree.KERNEL32(00000000), ref: 00DD10A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$ConfigHeapOpenQuery$ErrorFreeLastManagerProcess
                                                      • String ID: ServicesActive
                                                      • API String ID: 1929760286-3071072050
                                                      • Opcode ID: b1e41099eec57ff25745dbb4e18f353f4d193870cdce1695f4e4a2e366d52f79
                                                      • Instruction ID: 17e58fb1cd9cf6bea8005cce62eaf3e34adb1dff41b309915b83b505e6b445b2
                                                      • Opcode Fuzzy Hash: b1e41099eec57ff25745dbb4e18f353f4d193870cdce1695f4e4a2e366d52f79
                                                      • Instruction Fuzzy Hash: CF116D71500258BBCB20AB66ED89D9F7F6EEF857607140066F606DB310DA74DE00CBB0
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32 ref: 00DDDEEF
                                                        • Part of subcall function 00DDFC58: GetCurrentProcess.KERNEL32(?,?,00DD2D84,?,00DE4648,?,?,00000000,?,?,?), ref: 00DDFC5C
                                                      • PathFileExistsW.SHLWAPI(?), ref: 00DDE099
                                                      • PathFileExistsW.SHLWAPI(?), ref: 00DDDF0D
                                                        • Part of subcall function 00DDFDF0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000001,00000000,00000000,?,?,?,00DD9A69,?,?,?), ref: 00DDFE07
                                                        • Part of subcall function 00DDFDF0: GetLastError.KERNEL32(?,?,?,00DD9A69,?,?,?), ref: 00DDFE15
                                                      • LeaveCriticalSection.KERNEL32(?,00000000), ref: 00DDE28C
                                                        • Part of subcall function 00DDD9B6: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000102,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters), ref: 00DDD9EA
                                                      • GetCurrentProcess.KERNEL32(SeDebugPrivilege), ref: 00DDE17F
                                                      • LeaveCriticalSection.KERNEL32(?,00000000), ref: 00DDE2CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalFileSection$CurrentExistsLeavePathProcess$CreateEnterErrorLastOpen
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 1717069549-2896544425
                                                      • Opcode ID: 3557b5848ee5699372b49e4dc58f4f893741f156086d0e6fac53521429165da8
                                                      • Instruction ID: 5e3e94e4926ff4d1110208491d5e7a8ea0af4ab6ff151fb04a4739ca0dcc5c92
                                                      • Opcode Fuzzy Hash: 3557b5848ee5699372b49e4dc58f4f893741f156086d0e6fac53521429165da8
                                                      • Instruction Fuzzy Hash: 2EB11971108345ABC714FBA0DC91DAEB7A9FF94344F44092FF59296291EB70EA08CB72
                                                      APIs
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                      • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,SYSTEM\CurrentControlSet\Services\TermService), ref: 00DDDCF3
                                                        • Part of subcall function 00DE0FC3: RegQueryValueExW.ADVAPI32(?,750901C0,00000000,750901C0,00000000,00000000,?,00000000,00DE3589,?,?,?,00DE15B2,?,?,80000001), ref: 00DE0FE6
                                                        • Part of subcall function 00DE0FC3: RegQueryValueExW.ADVAPI32(?,750901C0,00000000,750901C0,00000000,00000000,?,00DE15B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 00DE100A
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DE0FAE: RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      • StrStrW.SHLWAPI(?,svchost.exe,?,00000000,ImagePath,?), ref: 00DDDD57
                                                      • StrStrW.SHLWAPI(?,svchost.exe -k), ref: 00DDDD65
                                                      • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?), ref: 00DDDD82
                                                      Strings
                                                      • ServiceDll, xrefs: 00DDDD90
                                                      • svchost.exe -k, xrefs: 00DDDD5D
                                                      • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 00DDDCCE
                                                      • ImagePath, xrefs: 00DDDD05
                                                      • SYSTEM\CurrentControlSet\Services\TermService, xrefs: 00DDDCBE
                                                      • svchost.exe, xrefs: 00DDDD4F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: OpenQueryValuelstrlen$CloseFreeVirtuallstrcpy
                                                      • String ID: ImagePath$SYSTEM\CurrentControlSet\Services\TermService$SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$svchost.exe$svchost.exe -k
                                                      • API String ID: 2246401353-3333427388
                                                      • Opcode ID: 3bd33c02657e1d6235e1cd5628ddd50f261fec9104cc20eab0e99f45fb62276d
                                                      • Instruction ID: 03effc2fb5668fb3bcafe4b64641ea6ca01232b071168cc338897e4c3376bd26
                                                      • Opcode Fuzzy Hash: 3bd33c02657e1d6235e1cd5628ddd50f261fec9104cc20eab0e99f45fb62276d
                                                      • Instruction Fuzzy Hash: 1C41C571D00218ABDF14FBA1DD92AEEB779EF14740F50016AB501B6295EB70AB04CBB0
                                                      APIs
                                                      • CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 00DD9AFC
                                                      • GetLastError.KERNEL32 ref: 00DD9B09
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DD9B10
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00DD9B1D
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00DD9B4C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DD9B53
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateErrorLastReadSize
                                                      • String ID: Password$Password
                                                      • API String ID: 1366138817-7788977
                                                      • Opcode ID: 8c487255d160d6861280eefebfe09578433c194eee2efd2c72f9ad871e216bd7
                                                      • Instruction ID: ab901492c490c04f04b0efbf7b7c20f8d9488a2f49b7a8649a93711473bdb226
                                                      • Opcode Fuzzy Hash: 8c487255d160d6861280eefebfe09578433c194eee2efd2c72f9ad871e216bd7
                                                      • Instruction Fuzzy Hash: DA81F470C042846EEF25EBB8D8A5BBDBFA5EF55314F18405BE0416A382CB765E42C772
                                                      APIs
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00DDF825
                                                      • CoInitialize.OLE32(00000000), ref: 00DDF82C
                                                      • CoCreateInstance.OLE32(00DE4490,00000000,00000017,00DE6E60,?,?,?,?,?,?,?,?,?,00DD2D0C), ref: 00DDF84A
                                                      • VariantInit.OLEAUT32(?), ref: 00DDF8CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Initialize$CreateInitInstanceSecurityVariant
                                                      • String ID: Name$SELECT Name FROM Win32_VideoController$WQL$root\CIMV2
                                                      • API String ID: 2382742315-3227336550
                                                      • Opcode ID: aa625cfe7de376a671090edf7429b033067bcc48f420cd9efb4f8e9456551228
                                                      • Instruction ID: c4eec83d0590f1ff35e821eefd9ac25b312f53dea9c3eafbb82e9b48944de285
                                                      • Opcode Fuzzy Hash: aa625cfe7de376a671090edf7429b033067bcc48f420cd9efb4f8e9456551228
                                                      • Instruction Fuzzy Hash: C341FB74A00249BFCB14DB96CC88E9FBBBDEFC9B14B104459F506EB290D670A905DB31
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,00000000,750901C0,00000000), ref: 00DE1F25
                                                      • IsWow64Process.KERNEL32(00000000), ref: 00DE1F2C
                                                      • VirtualAlloc.KERNEL32(00000000,000000FF,00001000,00000040), ref: 00DE1F50
                                                      • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 00DE1F5E
                                                      • lstrlenA.KERNEL32(00000000,\System32\cmd.exe,00000014), ref: 00DE1F6C
                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00DE1FA9
                                                      • Sleep.KERNEL32(000003E8), ref: 00DE1FB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$AllocCreateCurrentDirectorySleepVirtualWindowsWow64lstrlen
                                                      • String ID: \System32\cmd.exe
                                                      • API String ID: 3151064845-2003734499
                                                      • Opcode ID: 9afb375efd5c51205f039bdafdbd1f5b7015d6e1ef2d21692a3b5d249b0b2525
                                                      • Instruction ID: 3a6a02d1614c87d70e7328018f9c8e03a27f860483b59027e1531a032c450f66
                                                      • Opcode Fuzzy Hash: 9afb375efd5c51205f039bdafdbd1f5b7015d6e1ef2d21692a3b5d249b0b2525
                                                      • Instruction Fuzzy Hash: 7B111FB6A00348BBE710B7B6AC89FAF766CEF44745F140025F705EA191DA709E0486B5
                                                      APIs
                                                      • lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 00DDC154
                                                      • lstrcatW.KERNEL32(?,thunderbird.exe,?,00000104,00000000), ref: 00DDC162
                                                      • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,00DDA729,?,00000104,00000000), ref: 00DDC17B
                                                      • RegQueryValueExW.ADVAPI32(00DDA729,Path,00000000,?,?,?,?,00000104,00000000), ref: 00DDC198
                                                      • RegCloseKey.ADVAPI32(00DDA729,?,00000104,00000000), ref: 00DDC1A1
                                                      Strings
                                                      • Path, xrefs: 00DDC190
                                                      • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 00DDC14E
                                                      • thunderbird.exe, xrefs: 00DDC15A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValuelstrcatlstrcpy
                                                      • String ID: Path$Software\Microsoft\Windows\CurrentVersion\App Paths\$thunderbird.exe
                                                      • API String ID: 3135247354-1374996286
                                                      • Opcode ID: b50abf7aa7c81e95f9734892ced413d1a60bc8ef5825c83ece54cb3cda4fed3a
                                                      • Instruction ID: cfd3cf2dc0514135a172d8124bb09534cc7e4191754640324803170a4e37c599
                                                      • Opcode Fuzzy Hash: b50abf7aa7c81e95f9734892ced413d1a60bc8ef5825c83ece54cb3cda4fed3a
                                                      • Instruction Fuzzy Hash: A7111EB694025DBFEB10BBA5ED89FEE77BCEB14345F1000B6B605E6250E6709E048B71
                                                      APIs
                                                        • Part of subcall function 00DDF76B: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,00000000,?), ref: 00DDF79C
                                                        • Part of subcall function 00DD3335: lstrcatW.KERNEL32(00000000,750901C0,?,?,00DE3589,?,00DE1515,00DE3589,00DE35B9,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,00DE3589,00000000,750901C0,00000000), ref: 00DD3365
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      • PathFileExistsW.SHLWAPI(00000000,?,00000000,00000000,00000000,.tmp,00000000,00DE4684,.tmp,00000000,00DE4684,?,00000000), ref: 00DDC5A5
                                                      • PathFileExistsW.SHLWAPI(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00DDC245), ref: 00DDC5AF
                                                      • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00DDC5C3
                                                      • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00DDC5CF
                                                        • Part of subcall function 00DDCED9: LocalFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00DDC66B,?,?,00000000,?), ref: 00DDCF43
                                                        • Part of subcall function 00DDCED9: LocalFree.KERNEL32(?,00000000,00000000,00000000,00000000,?,00DDC66B,?,?,00000000,?), ref: 00DDCF4C
                                                        • Part of subcall function 00DDCF58: LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 00DDCFE0
                                                        • Part of subcall function 00DDCF58: BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 00DDD00E
                                                        • Part of subcall function 00DDCF58: LocalFree.KERNEL32(?), ref: 00DDD096
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,750901C0,?,00DD5A4F,.bss,00000000), ref: 00DD33C8
                                                        • Part of subcall function 00DD33BF: lstrlenA.KERNEL32(?,?,00DD5A4F,.bss,00000000), ref: 00DD33D5
                                                        • Part of subcall function 00DD33BF: lstrcpyA.KERNEL32(00000000,?,?,00DD5A4F,.bss,00000000), ref: 00DD33E8
                                                        • Part of subcall function 00DD3125: lstrcatA.KERNEL32(00000000,750901C0,?,00000000,?,00DD35C4,00000000,00000000,?,00DD4E98,?,?,?,?,?,00000000), ref: 00DD3151
                                                        • Part of subcall function 00DD308C: lstrlenA.KERNEL32(00000000,00DD30B4,750901C0,00000000,00000000,?,00DD32DC,00DD350E,00000000,-00000001,750901C0,?,00DD350E,00000000,?,00000000), ref: 00DD3093
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFreeLocal$Pathlstrlen$CopyExistslstrcat$AllocCryptDecryptFolderSpecialVirtuallstrcpy
                                                      • String ID: .tmp$select signon_realm, origin_url, username_value, password_value from logins$select signon_realm, origin_url, username_value, password_value from wow_logins
                                                      • API String ID: 881303001-3832748974
                                                      • Opcode ID: f567e8dab67195afab9d477b4807b91dda77f533ea3c35c7763376a2c271de59
                                                      • Instruction ID: 542ccb648a61139cc6413b5c8abd1bd3e5ca93b546cce6cdf166f37a4478950e
                                                      • Opcode Fuzzy Hash: f567e8dab67195afab9d477b4807b91dda77f533ea3c35c7763376a2c271de59
                                                      • Instruction Fuzzy Hash: CDD10A72910209ABDF15FFA4DC92AEEB779EF54300F14442BF512A6291DF31AA05CB71
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00DE274C
                                                      • CoCreateInstance.OLE32(00DE45A0,00000000,00000001,00DE7410,00DE227B), ref: 00DE2779
                                                      • CoUninitialize.OLE32 ref: 00DE2902
                                                        • Part of subcall function 00DE2A6B: CoCreateInstance.OLE32(00DE45E0,00000000,00000001,00DE73F0,?,76CCE550,00000000,00000000,?,?,00DE27B0), ref: 00DE2A99
                                                      • CoCreateInstance.OLE32(00DE45F0,00000000,00000001,00DE7400,?), ref: 00DE27CA
                                                        • Part of subcall function 00DE24EB: CoTaskMemFree.OLE32(?,?,00000000,00DE2896), ref: 00DE24F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateInstance$FreeInitializeTaskUninitialize
                                                      • String ID: Grabber$Source$vids
                                                      • API String ID: 533512943-4200688928
                                                      • Opcode ID: 924a90883cea97a1513dce1b2374f8a58aaf197b80811b1e20f7be4a3540ed8d
                                                      • Instruction ID: d4a9088e4c9b8508b4217f14e398d67b8339fdcefe002873477a36cea873f56f
                                                      • Opcode Fuzzy Hash: 924a90883cea97a1513dce1b2374f8a58aaf197b80811b1e20f7be4a3540ed8d
                                                      • Instruction Fuzzy Hash: 34513B71A00249AFDB14EFA5C898EBEB7B9EF84705F08845DF515AB250CB719D05CB70
                                                      APIs
                                                        • Part of subcall function 00DE0F31: RegDeleteKeyW.ADVAPI32(80000001,?), ref: 00DE0F38
                                                      • TerminateThread.KERNEL32(00000000,?,?), ref: 00DE1740
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 00DE17AD
                                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00DE1837
                                                      • CloseHandle.KERNEL32(?), ref: 00DE1846
                                                      • CloseHandle.KERNEL32(?), ref: 00DE184B
                                                      • ExitProcess.KERNEL32 ref: 00DE184E
                                                      Strings
                                                      • cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q , xrefs: 00DE17BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$CreateDeleteExitFileModuleNameTerminateThread
                                                      • String ID: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
                                                      • API String ID: 3630425516-84290196
                                                      • Opcode ID: acd4e94e51c0841fbc7fb5b97a7c6136844216bb7f3dfaf0c0f3f629eb8fb1fa
                                                      • Instruction ID: 268f2a2179e2de20202ec2f30433ccf6701467a83cfdaf34347ce4a5f88ce2c7
                                                      • Opcode Fuzzy Hash: acd4e94e51c0841fbc7fb5b97a7c6136844216bb7f3dfaf0c0f3f629eb8fb1fa
                                                      • Instruction Fuzzy Hash: F63137B6900659FBDB11FBA1DD86EEEBB7DEF04300F400466B205A6251DB74AE44CAB1
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(vaultcli.dll,00000000,00DDB229), ref: 00DDB561
                                                        • Part of subcall function 00DE0969: lstrcmpA.KERNEL32(?,00DE1BD0,?,open,00DE1BD0), ref: 00DE09A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoadlstrcmp
                                                      • String ID: VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                      • API String ID: 2493137890-3967309459
                                                      • Opcode ID: b48c968e56970145a1cfc7d4b24edad5ba471e565979e0ff8b8cb8c2dd3a4801
                                                      • Instruction ID: b5ac1c888945c218230f7e3a11e9bbdfe6e451f25780bf73baf094b0ba153b05
                                                      • Opcode Fuzzy Hash: b48c968e56970145a1cfc7d4b24edad5ba471e565979e0ff8b8cb8c2dd3a4801
                                                      • Instruction Fuzzy Hash: BF11EC30A01B41CFE724AB72B841BA676E5EB84755F58492FD49A9B346DB70A841CF30
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,000F003F,?,00000208,00F1CBF0,?,?,?,?,00DE1A78), ref: 00DE19E9
                                                      • RegCreateKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,00DE1A78), ref: 00DE1A06
                                                      • lstrlenW.KERNEL32(00F1CBF0,?,?,?,?,00DE1A78,?,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A12
                                                      • RegSetValueExW.ADVAPI32(?,Install,00000000,00000001,00F1CBF0,00000000,?,?,?,?,00DE1A78,?,?,?,?,00DD57B9), ref: 00DE1A28
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00DE1A78,?,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A31
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateOpenValuelstrlen
                                                      • String ID: Install$SOFTWARE\_rptls
                                                      • API String ID: 2036214137-3226779556
                                                      • Opcode ID: 791091114dcb2c6633da4b8fcde6bda83a25963b7db5704490e2e263e038a7ab
                                                      • Instruction ID: f5a27608b61714a2c6a0ce72625c881974005e23f59392924a7eaa6483d89a60
                                                      • Opcode Fuzzy Hash: 791091114dcb2c6633da4b8fcde6bda83a25963b7db5704490e2e263e038a7ab
                                                      • Instruction Fuzzy Hash: 3DF04F76500198BFE720A797EC8DEEB7E7CEBC6751B000079BA05E2211D6615E44D6B4
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,00F1CBF0,00000208,00000000,00000000,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A58
                                                      • IsUserAnAdmin.SHELL32 ref: 00DE1A5E
                                                        • Part of subcall function 00DDFBFC: GetCurrentProcess.KERNEL32(00000008,00000000,750901C0,00000000,750901C0,00000000,?,?,?,?,00DE3589,?), ref: 00DDFC0E
                                                        • Part of subcall function 00DDFBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00DE3589,?), ref: 00DDFC15
                                                        • Part of subcall function 00DDFBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00DE3589,?), ref: 00DDFC33
                                                        • Part of subcall function 00DDFBFC: CloseHandle.KERNEL32(00000000), ref: 00DDFC48
                                                        • Part of subcall function 00DE19C9: RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,000F003F,?,00000208,00F1CBF0,?,?,?,?,00DE1A78), ref: 00DE19E9
                                                        • Part of subcall function 00DE19C9: RegCreateKeyExW.ADVAPI32(80000001,SOFTWARE\_rptls,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,00DE1A78), ref: 00DE1A06
                                                        • Part of subcall function 00DE19C9: lstrlenW.KERNEL32(00F1CBF0,?,?,?,?,00DE1A78,?,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A12
                                                        • Part of subcall function 00DE19C9: RegSetValueExW.ADVAPI32(?,Install,00000000,00000001,00F1CBF0,00000000,?,?,?,?,00DE1A78,?,?,?,?,00DD57B9), ref: 00DE1A28
                                                        • Part of subcall function 00DE19C9: RegCloseKey.ADVAPI32(?,?,?,?,?,00DE1A78,?,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A31
                                                      • FindResourceW.KERNEL32(00000000,00000066,WM_DSP,?,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1A87
                                                      • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,00DD57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00DE1A91
                                                      • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,00DD57B9,?,00000000,00000000,?,?,?,?,?,?), ref: 00DE1A9B
                                                      • LockResource.KERNEL32(00000000,?,?,?,?,00DD57B9,?,00000000,00000000,?,?,?,?,?,?,00000000), ref: 00DE1AA2
                                                        • Part of subcall function 00DE1936: VirtualProtect.KERNEL32(00000000,000007D0,00000040,00000000,00000000,00000000,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000), ref: 00DE1974
                                                        • Part of subcall function 00DE1936: VirtualAlloc.KERNEL32(00000000,000001FE,00001000,00000040,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1988
                                                        • Part of subcall function 00DE1936: GetWindowsDirectoryW.KERNEL32(00000000,00000104,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1996
                                                        • Part of subcall function 00DE1936: lstrlenW.KERNEL32(00000000,\System32\cmd.exe,00000028,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE19A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Resource$CloseOpenProcessTokenVirtuallstrlen$AdminAllocCreateCurrentDirectoryFileFindHandleInformationLoadLockModuleNameProtectSizeofUserValueWindows
                                                      • String ID: WM_DSP
                                                      • API String ID: 1403607128-506093727
                                                      • Opcode ID: 0ef86ad10ef8cead73f06b0497c0ff0448d10ddc1aadcdf3a01190ffd7c7e6da
                                                      • Instruction ID: e59b183d2b45755432cd6b5f77e3a2c3fbb408a57e0cef3d6650ebcfe478c83c
                                                      • Opcode Fuzzy Hash: 0ef86ad10ef8cead73f06b0497c0ff0448d10ddc1aadcdf3a01190ffd7c7e6da
                                                      • Instruction Fuzzy Hash: B1F062357413D06BDB2037B36C8DF6F2D5CDF91750F050425F506DA392DA3488818671
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(USER32.DLL,?,00DE02E1,?,750901C0,00000000), ref: 00DD5CAB
                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00DD5CB7
                                                      • ExitProcess.KERNEL32 ref: 00DD5CDB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressExitLibraryLoadProcProcess
                                                      • String ID: An assertion condition failed$Assert$MessageBoxA$USER32.DLL
                                                      • API String ID: 881411216-1361702557
                                                      • Opcode ID: 6b5a838ce9769581b06b9609f96d88bbb932a20c8df19e08aaeab54f93af09c7
                                                      • Instruction ID: 274cfbc046c777c316497f71dde9c6f43bf44262dfb053bbadd50e44f06bc13e
                                                      • Opcode Fuzzy Hash: 6b5a838ce9769581b06b9609f96d88bbb932a20c8df19e08aaeab54f93af09c7
                                                      • Instruction Fuzzy Hash: 82D05E307C13C1BEEE1037B33CDEF652A086B15F15F184015B641DA3C1D69284989534
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(USER32.DLL), ref: 00DD5F6F
                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00DD5F7B
                                                      • ExitProcess.KERNEL32 ref: 00DD5F9A
                                                      Strings
                                                      • MessageBoxA, xrefs: 00DD5F75
                                                      • USER32.DLL, xrefs: 00DD5F6A
                                                      • A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application, xrefs: 00DD5F8F
                                                      • PureCall, xrefs: 00DD5F8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressExitLibraryLoadProcProcess
                                                      • String ID: A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application$MessageBoxA$PureCall$USER32.DLL
                                                      • API String ID: 881411216-4134947204
                                                      • Opcode ID: 942e9c304ebd9712930db57d8db379e02ecad05a6a74caed47b1c830cda65c45
                                                      • Instruction ID: 9306d0732b11bfc5b0babbf7ee49483ca8412d8a650e6ba293891f7f3ceebb4c
                                                      • Opcode Fuzzy Hash: 942e9c304ebd9712930db57d8db379e02ecad05a6a74caed47b1c830cda65c45
                                                      • Instruction Fuzzy Hash: D2D0CA303C07C16EEA503BB3BCCEF282914AF15F06F040428BA05E82D1CAE09088AA79
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00DE0D6A
                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00DE0D83
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DE0D8E
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      • OpenProcess.KERNEL32(00001410,00000000,?,?), ref: 00DE0DF8
                                                      • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000208), ref: 00DE0E2E
                                                      • CloseHandle.KERNEL32(00000000,00000000,00DE4C14), ref: 00DE0E81
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00DE0EE5
                                                      • CloseHandle.KERNEL32(00000000), ref: 00DE0EF7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$Process32lstrcpylstrlen$CreateFileFirstFreeModuleNameNextOpenProcessSnapshotToolhelp32Virtual
                                                      • String ID:
                                                      • API String ID: 3514491001-0
                                                      • Opcode ID: 7831ab1e815d70b9f013c55caf94c1aaa4dc69cb7f8562c92aa1931dfea29081
                                                      • Instruction ID: 5ab6cb6ebd4e6688f7618e253ad780a934738eb3ed658591a1afa5d934f7d2df
                                                      • Opcode Fuzzy Hash: 7831ab1e815d70b9f013c55caf94c1aaa4dc69cb7f8562c92aa1931dfea29081
                                                      • Instruction Fuzzy Hash: AD517E72D01259ABDB10FBA1DC89AEEBB78EF54710F050166F505B7280EB749B85CBB0
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00DE2D1A
                                                      • CoCreateInstance.OLE32(00DE45A0,00000000,00000001,00DE7410,0105EAC0,?,?), ref: 00DE2D32
                                                      • CoCreateInstance.OLE32(00DE45F0,00000000,00000001,00DE7400,0105EACC,?,?,00DE4580,0105EAC4,?,?), ref: 00DE2D8C
                                                        • Part of subcall function 00DE2A6B: CoCreateInstance.OLE32(00DE45E0,00000000,00000001,00DE73F0,?,76CCE550,00000000,00000000,?,?,00DE27B0), ref: 00DE2A99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateInstance$Initialize
                                                      • String ID: Grabber$Source$vids
                                                      • API String ID: 1108742289-4200688928
                                                      • Opcode ID: 51119b82048fbc20e8028d179c4920e7909913a78e61a44959ac0a0a3d22557d
                                                      • Instruction ID: a1b3906482ab032b33cefe0098f2117cb5c6bc3fa2df028b658d8db0dce83f43
                                                      • Opcode Fuzzy Hash: 51119b82048fbc20e8028d179c4920e7909913a78e61a44959ac0a0a3d22557d
                                                      • Instruction Fuzzy Hash: AD515B71600245AFDB24EFA5CC85EAA3B69EF49700B144598F915AF295CB72E805CBB0
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,000000FF,00001000,00000040,00000000,?,?), ref: 00DD796B
                                                      • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 00DD7979
                                                      • lstrlenA.KERNEL32(00000000,\System32\cmd.exe,00000014), ref: 00DD7987
                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00DD79C1
                                                      • Sleep.KERNEL32(000003E8), ref: 00DD79D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocCreateDirectoryProcessSleepVirtualWindowslstrlen
                                                      • String ID: \System32\cmd.exe
                                                      • API String ID: 2560724043-2003734499
                                                      • Opcode ID: f23a6a131e46cd43b19a0b6e86fe997e4d8bb31e349d55d0e8ab4151ee4f3a22
                                                      • Instruction ID: ee1f9a5f5f70092b6851c24bf2cf3cfea172fc2f6be206133247ef241c9ec549
                                                      • Opcode Fuzzy Hash: f23a6a131e46cd43b19a0b6e86fe997e4d8bb31e349d55d0e8ab4151ee4f3a22
                                                      • Instruction Fuzzy Hash: 0F113CB6600348BFE711ABE8DCC6FAF766CEB04745F000026F702EA291DA709E0486B5
                                                      APIs
                                                      • lstrlenA.KERNEL32(00DE1B3D,00DE6056,?,?,00DE1B3D,00DE6056,?), ref: 00DE185D
                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Classes\Folder\shell\open\command,00000000,00020006,?,?,?,00DE1B3D,00DE6056,?), ref: 00DE187A
                                                      • SetLastError.KERNEL32(00000000,?,?,00DE1B3D,00DE6056,?), ref: 00DE1885
                                                      • RegSetValueExA.ADVAPI32(?,00DE6056,00000000,00000001,00DE1B3D,00000000,?,?,00DE1B3D,00DE6056,?), ref: 00DE189D
                                                      • RegCloseKey.ADVAPI32(?,?,?,00DE1B3D,00DE6056,?), ref: 00DE18A8
                                                      Strings
                                                      • Software\Classes\Folder\shell\open\command, xrefs: 00DE1870
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseErrorLastOpenValuelstrlen
                                                      • String ID: Software\Classes\Folder\shell\open\command
                                                      • API String ID: 1613093083-2536721355
                                                      • Opcode ID: 62fda1b0bc8937c8197d677dc0c02520a4cbe4f2ded8d2e0c788f60ea8d0a784
                                                      • Instruction ID: b09d437e2fb64418684057acc89f29b46ec9d325d4c1f6acadda745d3678a259
                                                      • Opcode Fuzzy Hash: 62fda1b0bc8937c8197d677dc0c02520a4cbe4f2ded8d2e0c788f60ea8d0a784
                                                      • Instruction Fuzzy Hash: 98F01D39A01354FBDF212FA1EC89FDA3B69AB05750F104160BA05AA260D6B19A00AAB4
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00DD86D6,00000000), ref: 00DD7CD3
                                                      • GetProcAddress.KERNEL32(00000000,RtlNtStatusToDosError), ref: 00DD7CE1
                                                      • GetProcAddress.KERNEL32(00000000,RtlSetLastWin32Error), ref: 00DD7CF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: RtlNtStatusToDosError$RtlSetLastWin32Error$ntdll.dll
                                                      • API String ID: 667068680-2897241497
                                                      • Opcode ID: dfa864da9b6890224a9da767e6d2012c9053ef0463d666c9a68d1426fed73af7
                                                      • Instruction ID: 7e5ad558408b3d8f299481a4dacef49fb713c6264d44cb69a81cb908b2fb9e80
                                                      • Opcode Fuzzy Hash: dfa864da9b6890224a9da767e6d2012c9053ef0463d666c9a68d1426fed73af7
                                                      • Instruction Fuzzy Hash: F5F05E30244345DFDB04AF66AC59E7A7BA9AF89B01305846DFD09D33A0EBB09801DA30
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000000,?,00000000,?), ref: 00DDCBDC
                                                      • GetFileSizeEx.KERNEL32(00000000,?,?,00000000,?), ref: 00DDCBF2
                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00000000,?), ref: 00DDCC0D
                                                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,?), ref: 00DDCC25
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?), ref: 00DDCC48
                                                        • Part of subcall function 00DDCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00DDCC73
                                                        • Part of subcall function 00DDCC54: LocalAlloc.KERNEL32(00000040,?,?,00DDCBC6,?,00000000,?,00000000,?), ref: 00DDCC81
                                                        • Part of subcall function 00DDCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00DDCC97
                                                        • Part of subcall function 00DDCC54: LocalFree.KERNEL32(?,?,00DDCBC6,?,00000000,?,00000000,?), ref: 00DDCCA5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileLocal$AllocBinaryCryptString$CloseCreateFreeHandleReadSize
                                                      • String ID:
                                                      • API String ID: 4225742195-0
                                                      • Opcode ID: 2d73acada72eee1313148c30f05dc172eabb8d752b20ac546fea3df7763722f8
                                                      • Instruction ID: bb9f3a2a7dff5ab2bd1af38f26d603b8f65a56678e40077658a139d54af66cf9
                                                      • Opcode Fuzzy Hash: 2d73acada72eee1313148c30f05dc172eabb8d752b20ac546fea3df7763722f8
                                                      • Instruction Fuzzy Hash: 6D119071620215ABCB25AFADDC84AAEBBBCEB45750F044116FA09DA350D730ED01DB70
                                                      APIs
                                                        • Part of subcall function 00DDF80E: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00DDF825
                                                        • Part of subcall function 00DDF80E: CoInitialize.OLE32(00000000), ref: 00DDF82C
                                                        • Part of subcall function 00DDF80E: CoCreateInstance.OLE32(00DE4490,00000000,00000017,00DE6E60,?,?,?,?,?,?,?,?,?,00DD2D0C), ref: 00DDF84A
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00DD2D1B
                                                        • Part of subcall function 00DE1E21: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E4E
                                                        • Part of subcall function 00DE1E21: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E61
                                                        • Part of subcall function 00DE1E21: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E72
                                                        • Part of subcall function 00DE1E21: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00DE349D), ref: 00DE1E7F
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DDFA1F: GlobalMemoryStatusEx.KERNEL32(?), ref: 00DDFA30
                                                        • Part of subcall function 00DDFC7E: GetComputerNameW.KERNEL32(00DD2D7F,00000010), ref: 00DDFCA1
                                                        • Part of subcall function 00DDFC58: GetCurrentProcess.KERNEL32(?,?,00DD2D84,?,00DE4648,?,?,00000000,?,?,?), ref: 00DDFC5C
                                                        • Part of subcall function 00DDFBFC: GetCurrentProcess.KERNEL32(00000008,00000000,750901C0,00000000,750901C0,00000000,?,?,?,?,00DE3589,?), ref: 00DDFC0E
                                                        • Part of subcall function 00DDFBFC: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,00DE3589,?), ref: 00DDFC15
                                                        • Part of subcall function 00DDFBFC: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,00DE3589,?), ref: 00DDFC33
                                                        • Part of subcall function 00DDFBFC: CloseHandle.KERNEL32(00000000), ref: 00DDFC48
                                                        • Part of subcall function 00DDFA42: LoadLibraryA.KERNEL32(ntdll.dll), ref: 00DDFA5A
                                                        • Part of subcall function 00DDFA42: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00DDFA6A
                                                        • Part of subcall function 00DDFCB8: RegOpenKeyExW.ADVAPI32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 00DDFCFC
                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 00DD2DDF
                                                      • lstrcatW.KERNEL32(?,\Microsoft Vision\,?,?), ref: 00DD2DF1
                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?), ref: 00DD2DFF
                                                        • Part of subcall function 00DD990A: InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD9916
                                                        • Part of subcall function 00DD990A: DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD992D
                                                        • Part of subcall function 00DD990A: EnterCriticalSection.KERNEL32(00F1DB10,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD9939
                                                        • Part of subcall function 00DD990A: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD9949
                                                        • Part of subcall function 00DD990A: LeaveCriticalSection.KERNEL32(00F1DB10,?,00000000), ref: 00DD999C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalFileSection$CreateHandleInitializeProcess$CloseCurrentModuleNameOpenTokenlstrlen$AddressComputerDeleteDirectoryEnterFolderGlobalInformationInstanceLeaveLibraryLoadMemoryPathProcReadSecuritySizeStatuslstrcatlstrcpy
                                                      • String ID: \Microsoft Vision\
                                                      • API String ID: 1987359387-1618823865
                                                      • Opcode ID: c2d2718228b71eb84b9a630e77cb11a54344c2a6ca673d5709773fd3fc3a9cbf
                                                      • Instruction ID: b2ac1c9bbee7442a5726f2f8ec8bb37e807e589ca19305894f2ae3372f6526fe
                                                      • Opcode Fuzzy Hash: c2d2718228b71eb84b9a630e77cb11a54344c2a6ca673d5709773fd3fc3a9cbf
                                                      • Instruction Fuzzy Hash: CE3180B1A10258BBDB14FBE4DC96DEEBB7CEF44300F40046AB506B6392DA705B458BB1
                                                      APIs
                                                        • Part of subcall function 00DE0969: lstrcmpA.KERNEL32(?,00DE1BD0,?,open,00DE1BD0), ref: 00DE09A2
                                                      • MessageBoxA.USER32(00000000,Bla2,Bla2,00000000), ref: 00DE0B70
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DE0BD9: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,750901C0,00000000), ref: 00DE0C14
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      • Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper, xrefs: 00DE0B7E
                                                      • C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe, xrefs: 00DE0BAE
                                                      • Bla2, xrefs: 00DE0B67, 00DE0B6D, 00DE0B6E
                                                      • VirtualQuery, xrefs: 00DE0B37
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$CreateFreeMessageProcessVirtuallstrcmplstrcpy
                                                      • String ID: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper$Bla2$C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe$VirtualQuery
                                                      • API String ID: 1196126833-2308542105
                                                      • Opcode ID: f159a66d3f612c07ab373d496a74bfa7212a9e9546e72124361818d10fbc0b6b
                                                      • Instruction ID: 323a01a1d6cba225fe7c467eb3277218638d4df7c8eeb50595b9625475ae7630
                                                      • Opcode Fuzzy Hash: f159a66d3f612c07ab373d496a74bfa7212a9e9546e72124361818d10fbc0b6b
                                                      • Instruction Fuzzy Hash: 49112EB1A00158BADB18FBA2ED56CEFBB7CEF54750B10005AB402B2281DB709F44C6B1
                                                      APIs
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • VirtualProtect.KERNEL32(00000000,000007D0,00000040,00000000,00000000,00000000,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000), ref: 00DE1974
                                                      • VirtualAlloc.KERNEL32(00000000,000001FE,00001000,00000040,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1988
                                                      • GetWindowsDirectoryW.KERNEL32(00000000,00000104,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE1996
                                                      • lstrlenW.KERNEL32(00000000,\System32\cmd.exe,00000028,?,00000000,?,00DE1AB4,?,?,?,00DD57B9,?,00000000,00000000), ref: 00DE19A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapVirtual$AllocAllocateDirectoryProcessProtectWindowslstrlen
                                                      • String ID: \System32\cmd.exe
                                                      • API String ID: 2244922440-2003734499
                                                      • Opcode ID: cc395eeb98025a1150d256803e06378526da6868f76ff94f8d36d1300d86ce3e
                                                      • Instruction ID: cf435ffaed44939ee08a92e4c2483500bbe6e59fe71c83ad26a2be3e9ed2eba4
                                                      • Opcode Fuzzy Hash: cc395eeb98025a1150d256803e06378526da6868f76ff94f8d36d1300d86ce3e
                                                      • Instruction Fuzzy Hash: 6501F2727803917BE62177759C4AFAB3BACDB85B51F000025F709EE2C1C9E5AD4487B8
                                                      APIs
                                                      • LocalFree.KERNEL32(?,00000000,00000000,00DDCAF5), ref: 00DDCE9A
                                                      • LocalFree.KERNEL32(?,00000000,00000000,00DDCAF5), ref: 00DDCEA5
                                                      • LocalFree.KERNEL32(?,00000000,00000000,00DDCAF5), ref: 00DDCEB0
                                                      • LocalFree.KERNEL32(?,00000000,00000000,00DDCAF5), ref: 00DDCEBB
                                                      • LocalFree.KERNEL32(?,00000000,00000000,00DDCAF5), ref: 00DDCEC6
                                                      • LocalFree.KERNEL32(?,00000000,00000000,00DDCAF5), ref: 00DDCED1
                                                      • LocalFree.KERNEL32(00000000,00000000,00000000,00DDCAF5), ref: 00DDCED4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLocal
                                                      • String ID:
                                                      • API String ID: 2826327444-0
                                                      • Opcode ID: 0ee2b70c44c65c176dda9a6da72558c032759b6a179229024fcdb557c73f78f1
                                                      • Instruction ID: b544e5e461417fa25c3cf985b3435af3232d6f7f321194d7bae284221949e45c
                                                      • Opcode Fuzzy Hash: 0ee2b70c44c65c176dda9a6da72558c032759b6a179229024fcdb557c73f78f1
                                                      • Instruction Fuzzy Hash: D1F09C71020B159BD7366B26DC04767B7E1BF80305F09193AE58151A708775B896EF60
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000001,software\Aerofox\FoxmailPreview,00000000,00020019,?), ref: 00DD9DB5
                                                      • RegQueryValueExA.ADVAPI32(?,Executable,00000000,00000000,00DE97B0,?), ref: 00DD9DDC
                                                      • PathRemoveFileSpecA.SHLWAPI(00DE97B0), ref: 00DD9DE7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileOpenPathQueryRemoveSpecValue
                                                      • String ID: Executable$software\Aerofox\FoxmailPreview
                                                      • API String ID: 3687894118-2371247776
                                                      • Opcode ID: 83953c4a65a288a67c7f6432a0c285dc6e79923a927b1ddd3fcce82ce404c124
                                                      • Instruction ID: a2b9c88be8a9a4f676ce885a89ba722030ec818c461da57490e75ae3e7bf3323
                                                      • Opcode Fuzzy Hash: 83953c4a65a288a67c7f6432a0c285dc6e79923a927b1ddd3fcce82ce404c124
                                                      • Instruction Fuzzy Hash: C5F0A7B4640344BFEF20AF51DC9AFDABBBCDB41B88F100065FA01F5284E2B199099534
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: recv
                                                      • String ID:
                                                      • API String ID: 1507349165-0
                                                      • Opcode ID: 1f3d72aaa85d2ad28a7cbc139bf7d89cf8b3096f592837e9d3fb2e3790760608
                                                      • Instruction ID: 303a05328eba39cfb6c72ae5205f38541575fb4dc1bfd0b1fe8ddf83a20de330
                                                      • Opcode Fuzzy Hash: 1f3d72aaa85d2ad28a7cbc139bf7d89cf8b3096f592837e9d3fb2e3790760608
                                                      • Instruction Fuzzy Hash: 7761C371904618AAEB10DFA4DC85BEEB7B9FF05300F04806AF545AF382D7B5A945CBB1
                                                      APIs
                                                      • socket.WS2_32(00000002,00000001,00000006), ref: 00DDEEB4
                                                      • gethostbyname.WS2_32(?), ref: 00DDEEBD
                                                      • htons.WS2_32(?), ref: 00DDEEE1
                                                      • InetNtopW.WS2_32(00000002,?,?,00000802), ref: 00DDEF12
                                                      • connect.WS2_32(00000000,?,00000010), ref: 00DDEF2B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InetNtopconnectgethostbynamehtonssocket
                                                      • String ID:
                                                      • API String ID: 2393792429-0
                                                      • Opcode ID: 677cbdea71cfb82d88af426d9fa58cf571c6d35f9dabe1bb75209e5fc20837d1
                                                      • Instruction ID: 64c8680060a43e6aad13a70c3e2406ce9bd8af6a2a2d59c55c42a2e479099f69
                                                      • Opcode Fuzzy Hash: 677cbdea71cfb82d88af426d9fa58cf571c6d35f9dabe1bb75209e5fc20837d1
                                                      • Instruction Fuzzy Hash: 1811E972D00394BBD710A7B4AC8AFBB77ACEF05324F044466F909DF291D670894487B0
                                                      APIs
                                                      • InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD9916
                                                      • DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD992D
                                                      • EnterCriticalSection.KERNEL32(00F1DB10,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD9939
                                                      • GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,00DD2E0D,?,00000001,?,?), ref: 00DD9949
                                                      • LeaveCriticalSection.KERNEL32(00F1DB10,?,00000000), ref: 00DD999C
                                                        • Part of subcall function 00DD1F4B: CreateThread.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 00DD1F60
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CreateDeleteEnterHandleInitializeLeaveModuleThread
                                                      • String ID:
                                                      • API String ID: 2964645253-0
                                                      • Opcode ID: a3a53b316885b1280ecef7d0865835667ebf174dc7f50035cc800dc9c3205a11
                                                      • Instruction ID: 6ee02fd05ec5e289b09c60fc7f8d90617233d448f15b4dd94c8287fa5b602eb5
                                                      • Opcode Fuzzy Hash: a3a53b316885b1280ecef7d0865835667ebf174dc7f50035cc800dc9c3205a11
                                                      • Instruction Fuzzy Hash: 7F015E76A04318ABCB10BB61AC99ADF7B7CEB85310F41801AF5069B352D7799485EBB0
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00DE0C97
                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00DE0CAC
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00DE0CC4
                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00DE0CCF
                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00DE0CE0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 1789362936-0
                                                      • Opcode ID: 4f8a9cb1403af092e675d8769f5bc24ac043cdf9a7834a9ec49a79407d4ddcdd
                                                      • Instruction ID: 023a6537056434ab21267888a2a7d62f72f3351d7ab7b0b133f088879d97763f
                                                      • Opcode Fuzzy Hash: 4f8a9cb1403af092e675d8769f5bc24ac043cdf9a7834a9ec49a79407d4ddcdd
                                                      • Instruction Fuzzy Hash: 8301D631601354ABDB207BB6AC8CB7E7ABCEB44725F200155F605E6290D7B08C81CB70
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,00000001,?,00000000,00DDB132), ref: 00DDB9BA
                                                      • FreeLibrary.KERNEL32(?,?,00000000,00DDB132), ref: 00DDB9CA
                                                      • FreeLibrary.KERNEL32(?,?,00000000,00DDB132), ref: 00DDB9D8
                                                      • FreeLibrary.KERNEL32(?,?,00000000,00DDB132), ref: 00DDB9E6
                                                      • FreeLibrary.KERNEL32(?,?,00000000,00DDB132), ref: 00DDB9F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 9efa7308eae3fec042626a69f7bae58ad8132973c1ce1be75b23f21e891f8077
                                                      • Instruction ID: 2f5629fe4c353f380bc748c1bc2fdbd97b7278922a1c25d6dae4c52f1d69811c
                                                      • Opcode Fuzzy Hash: 9efa7308eae3fec042626a69f7bae58ad8132973c1ce1be75b23f21e891f8077
                                                      • Instruction Fuzzy Hash: D8F0A571B00B16BED7495F768C84B86FE6AFF49260F01422B952C42221CB716474DFD2
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,?,00000000,00DDABDF), ref: 00DDB638
                                                      • FreeLibrary.KERNEL32(?,?,?,00000000,00DDABDF), ref: 00DDB648
                                                      • FreeLibrary.KERNEL32(?,?,?,00000000,00DDABDF), ref: 00DDB656
                                                      • FreeLibrary.KERNEL32(?,?,?,00000000,00DDABDF), ref: 00DDB664
                                                      • FreeLibrary.KERNEL32(?,?,?,00000000,00DDABDF), ref: 00DDB672
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 9efa7308eae3fec042626a69f7bae58ad8132973c1ce1be75b23f21e891f8077
                                                      • Instruction ID: 2f5629fe4c353f380bc748c1bc2fdbd97b7278922a1c25d6dae4c52f1d69811c
                                                      • Opcode Fuzzy Hash: 9efa7308eae3fec042626a69f7bae58ad8132973c1ce1be75b23f21e891f8077
                                                      • Instruction Fuzzy Hash: D8F0A571B00B16BED7495F768C84B86FE6AFF49260F01422B952C42221CB716474DFD2
                                                      APIs
                                                        • Part of subcall function 00DDB559: LoadLibraryA.KERNEL32(vaultcli.dll,00000000,00DDB229), ref: 00DDB561
                                                      • FreeLibrary.KERNEL32(?), ref: 00DDB506
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3248: lstrcmpW.KERNEL32(?,?), ref: 00DD3252
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLibrarylstrcpylstrlen$LoadVirtuallstrcmp
                                                      • String ID: 4$8$Internet Explorer
                                                      • API String ID: 708496175-747916358
                                                      • Opcode ID: c7f205019a893439b7ea0bb4e14cb5ecaead3ad290780e2a3eaeb0f0dbde5d75
                                                      • Instruction ID: 3c1047e3536f7f426ebce0472cf77f508c92fd9d100b9498b60d93f390645bdb
                                                      • Opcode Fuzzy Hash: c7f205019a893439b7ea0bb4e14cb5ecaead3ad290780e2a3eaeb0f0dbde5d75
                                                      • Instruction Fuzzy Hash: BFA1F2B1D00219ABDF15EFE5D8859EEBB79FF44714F14402AF405A7252EB30AA45CBB0
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000400,?), ref: 00DE327D
                                                      • lstrcatW.KERNEL32(?,send.db), ref: 00DE328F
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD3437: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,00DE1E0A,00000000,00000000,00000000,.bss,00000000), ref: 00DD345C
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpylstrlen$FreePathTempVirtuallstrcat
                                                      • String ID: 5$send.db
                                                      • API String ID: 891666058-2022884741
                                                      • Opcode ID: 2b1e98901bce6efe1d06d3ac4dbdcad09cfe3e6b627d61d6817900c928a1344b
                                                      • Instruction ID: c63d149a178db395c3b422462a45a606876dd6257ebab83e5554f82a5e521ae4
                                                      • Opcode Fuzzy Hash: 2b1e98901bce6efe1d06d3ac4dbdcad09cfe3e6b627d61d6817900c928a1344b
                                                      • Instruction Fuzzy Hash: C7015E71D4011CABDB10EB64DC46EEE77BCEF50304F008066B505A6281EB749B46CBF1
                                                      APIs
                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 00DE3710
                                                      • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 00DE3722
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FolderFreePathVirtuallstrcat
                                                      • String ID: ;$\Microsoft Vision\
                                                      • API String ID: 1529938272-253167065
                                                      • Opcode ID: b8302bac7e434143f2f8b9c574856ddc4900698fb505e91e7dac483ad9795901
                                                      • Instruction ID: 4cf95000f6dfe699ad13351248150af99dc528269f6047736c000605106e554b
                                                      • Opcode Fuzzy Hash: b8302bac7e434143f2f8b9c574856ddc4900698fb505e91e7dac483ad9795901
                                                      • Instruction Fuzzy Hash: 120109B1800219BADB10FBA0ED4ADDEBBB8EF14304F104156B505A6281EA34AB44CBF1
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(ntdll.dll), ref: 00DDF4E6
                                                      • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00DDF4F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RtlGetVersion$ntdll.dll
                                                      • API String ID: 2574300362-1489217083
                                                      • Opcode ID: 7ffdf8265d3ba43fb9afc105df25e1fa974905611e6566580293c1d461058098
                                                      • Instruction ID: 9f6db22fc20098ac43ea65a060a82530441644a6247fbf2b0ce110946a5dca70
                                                      • Opcode Fuzzy Hash: 7ffdf8265d3ba43fb9afc105df25e1fa974905611e6566580293c1d461058098
                                                      • Instruction Fuzzy Hash: B4E0D83078039C19CB347F75BC0B6D77AA85B12745F8841B49143D1384DA74DA06CAF0
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(ntdll.dll), ref: 00DDF535
                                                      • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00DDF545
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RtlGetVersion$ntdll.dll
                                                      • API String ID: 2574300362-1489217083
                                                      • Opcode ID: 66c34b1d25aba93843cf12e705ff44a79cff5500cd25585918fe5fa7da8908c4
                                                      • Instruction ID: cef8fa4053f223d12b56466b574643e57c474c3b11e8fb3771b06152574f9bf8
                                                      • Opcode Fuzzy Hash: 66c34b1d25aba93843cf12e705ff44a79cff5500cd25585918fe5fa7da8908c4
                                                      • Instruction Fuzzy Hash: 0EE0123074035C5ACB24BF72EC0AAD677A85B22749F4445A4E206E1280DA74C9498EB0
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,00DDFC6D,?,?,00DD2D84,?,00DE4648,?,?,00000000,?), ref: 00DE0C4B
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00DE0C52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: IsWow64Process$kernel32
                                                      • API String ID: 1646373207-3789238822
                                                      • Opcode ID: 33e12f3a3f918f4edcf82a3e1fe3df147064dded33de48a268962f804b112c65
                                                      • Instruction ID: 7ea0d4a9bf594a1e1e97b9aa9c19c7e74595d2363c2d12b2bbc73be2adbfc745
                                                      • Opcode Fuzzy Hash: 33e12f3a3f918f4edcf82a3e1fe3df147064dded33de48a268962f804b112c65
                                                      • Instruction Fuzzy Hash: 4DE0867A540344FFDB20EBA2DC49A8F776CDB14755B504044B001E2280D6B4DA04C7B0
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00DDD18E
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00DDD1DD
                                                        • Part of subcall function 00DD33F5: lstrcpyA.KERNEL32(00000000,?,?,00000000,?,00DD2A97,?,?,00000000,exit,00000000,start), ref: 00DD341A
                                                        • Part of subcall function 00DD57FB: getaddrinfo.WS2_32(750901C0,00000000,00DD4EA0,00000000), ref: 00DD5848
                                                        • Part of subcall function 00DD57FB: socket.WS2_32(00000002,00000001,00000000), ref: 00DD585F
                                                        • Part of subcall function 00DD57FB: htons.WS2_32(00000000), ref: 00DD5885
                                                        • Part of subcall function 00DD57FB: freeaddrinfo.WS2_32(00000000), ref: 00DD5895
                                                        • Part of subcall function 00DD57FB: connect.WS2_32(?,?,00000010), ref: 00DD58A1
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00DDD261
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00DDD27E
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00DDD288
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$Enter$connectfreeaddrinfogetaddrinfohtonslstrcpysocket
                                                      • String ID:
                                                      • API String ID: 4195813003-0
                                                      • Opcode ID: 237a04c5d5074d4d90bf0b124407f1677b32a4d8979f97e0fd4c4e1d906e9a8b
                                                      • Instruction ID: fcf691ed4ee8c766fab176ab35e3875bce8367280641131b6cade3cd969f7a63
                                                      • Opcode Fuzzy Hash: 237a04c5d5074d4d90bf0b124407f1677b32a4d8979f97e0fd4c4e1d906e9a8b
                                                      • Instruction Fuzzy Hash: 18314371600706BBDB05EBB0DC51FAAB7ADFF15350F50461AF52992281EB70BA158BB0
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,?,00DDDCAA), ref: 00DDF6AA
                                                      • FindResourceW.KERNEL32(00000000,00000001,00000010,?,00000000,00000002,?,?,?,00DDDCAA), ref: 00DDF6BE
                                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000,00000002,?,?,?,00DDDCAA), ref: 00DDF6CA
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000002,?,?,?,00DDDCAA), ref: 00DDF70F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoadResource$FindFree
                                                      • String ID:
                                                      • API String ID: 3272429154-0
                                                      • Opcode ID: d7e4a50c978427b41ea751a8759f7d8f1f7d71c4505081ca693547860d0fdab9
                                                      • Instruction ID: 603bd79e6d8f7a69aca63f9a20282c03c4d59de3a856cc2e22fc3d20f74ac78b
                                                      • Opcode Fuzzy Hash: d7e4a50c978427b41ea751a8759f7d8f1f7d71c4505081ca693547860d0fdab9
                                                      • Instruction Fuzzy Hash: 890180B5300B01AFD7085F69EC89AA6B7B4FF483147048239E42AC73A0D774D855C7B0
                                                      APIs
                                                        • Part of subcall function 00DDCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00DDCC73
                                                        • Part of subcall function 00DDCC54: LocalAlloc.KERNEL32(00000040,?,?,00DDCBC6,?,00000000,?,00000000,?), ref: 00DDCC81
                                                        • Part of subcall function 00DDCC54: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00DDCC97
                                                        • Part of subcall function 00DDCC54: LocalFree.KERNEL32(?,?,00DDCBC6,?,00000000,?,00000000,?), ref: 00DDCCA5
                                                      • LocalFree.KERNEL32(?,00000000,-0000003A,00000000,?), ref: 00DDCA6C
                                                        • Part of subcall function 00DDCA78: GetLastError.KERNEL32 ref: 00DDCADE
                                                      • LocalFree.KERNEL32(?), ref: 00DDCA65
                                                        • Part of subcall function 00DDCCB4: BCryptOpenAlgorithmProvider.BCRYPT(00000020,AES,00000000,00000000,?,00000000,?,?,?,00DDCA5F,?), ref: 00DDCCD1
                                                        • Part of subcall function 00DDCCB4: BCryptSetProperty.BCRYPT(00000020,ChainingMode,ChainingModeGCM,00000020,00000000,?,00DDCA5F,?), ref: 00DDCCEA
                                                        • Part of subcall function 00DDCCB4: BCryptGenerateSymmetricKey.BCRYPT(00000020,00DDCA5F,00000000,00000000,?,00000020,00000000,?,00DDCA5F,?), ref: 00DDCCFF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$Local$Free$BinaryString$AlgorithmAllocErrorGenerateLastOpenPropertyProviderSymmetric
                                                      • String ID: $DPAPI
                                                      • API String ID: 379455710-1819349886
                                                      • Opcode ID: 1183dd3f2dfce2a7c2b3ea109b1d2abddf5bf5b3edd887a063584b29c25fd0cd
                                                      • Instruction ID: c781967c6b2e69925e764407d4c9c6973f89f10308d4135c3759710738645d2e
                                                      • Opcode Fuzzy Hash: 1183dd3f2dfce2a7c2b3ea109b1d2abddf5bf5b3edd887a063584b29c25fd0cd
                                                      • Instruction Fuzzy Hash: D101C072A1060EFBCF10EBA5DD859DEB778EB44705F049266E800E6240E730AB45DBB0
                                                      APIs
                                                      • GetLastInputInfo.USER32(?), ref: 00DD47FF
                                                      • GetTickCount.KERNEL32 ref: 00DD4805
                                                      • GetForegroundWindow.USER32 ref: 00DD4819
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DD482C
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Windowlstrlen$CountForegroundFreeInfoInputLastTextTickVirtuallstrcpy
                                                      • String ID:
                                                      • API String ID: 2567647128-0
                                                      • Opcode ID: 391c54db5865ccb28507c6ab796421b327bdf5bc5be9ea8be0fb6ba358335d8f
                                                      • Instruction ID: 456ee253367810d7f69ccf79fee0290a1a70e3cbee541f645628b71968d8eaad
                                                      • Opcode Fuzzy Hash: 391c54db5865ccb28507c6ab796421b327bdf5bc5be9ea8be0fb6ba358335d8f
                                                      • Instruction Fuzzy Hash: 331109B1D00208ABDB04EBA4E959ADDB7B9EF58305F004156B502A6291EF74AB54CBB4
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00DDEA95
                                                      • SetEvent.KERNEL32(00000000), ref: 00DDEAA9
                                                      • WaitForSingleObject.KERNEL32(00DE956C,00001388), ref: 00DDEAB6
                                                      • TerminateThread.KERNEL32(00DE956C,000000FE), ref: 00DDEAC7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CurrentEventObjectSingleTerminateWait
                                                      • String ID:
                                                      • API String ID: 2174867186-0
                                                      • Opcode ID: ceeee2075a20af136c33a2640489b563112d0df8d17bbab4624a19e352b978f9
                                                      • Instruction ID: 232a31e4d0695181b9622e8d08a67d63a318d2c2f7b6ecd32035c76aa20454dc
                                                      • Opcode Fuzzy Hash: ceeee2075a20af136c33a2640489b563112d0df8d17bbab4624a19e352b978f9
                                                      • Instruction Fuzzy Hash: DF0131310107019BD734BF14E989A99B3B2FF50311F540A2BE0529AAE1DBB06988CB71
                                                      APIs
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                      • RegOpenKeyExW.ADVAPI32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 00DDFCFC
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DE0FC3: RegQueryValueExW.ADVAPI32(?,750901C0,00000000,750901C0,00000000,00000000,?,00000000,00DE3589,?,?,?,00DE15B2,?,?,80000001), ref: 00DE0FE6
                                                        • Part of subcall function 00DE0FC3: RegQueryValueExW.ADVAPI32(?,750901C0,00000000,750901C0,00000000,00000000,?,00DE15B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 00DE100A
                                                        • Part of subcall function 00DE0FAE: RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: QueryValuelstrlen$CloseFreeOpenVirtuallstrcpy
                                                      • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                      • API String ID: 1903904756-1211650757
                                                      • Opcode ID: 4742cd9326059456494b1af41775025c9816aa5380d03704194abe42a5ebed32
                                                      • Instruction ID: ca0a98c891d592565a308577a86e0cb3baa51df9ee679c50764bac8c16c1c2c4
                                                      • Opcode Fuzzy Hash: 4742cd9326059456494b1af41775025c9816aa5380d03704194abe42a5ebed32
                                                      • Instruction Fuzzy Hash: 5E111F70E00159ABCB24FBA4DD528EDBB79EF54700B50056BF406A3291DBB05F45CBB1
                                                      APIs
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                      • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020119,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters,?,00F1E020,?,?,00DDE451,?,?), ref: 00DDDE51
                                                        • Part of subcall function 00DE0FC3: RegQueryValueExW.ADVAPI32(?,750901C0,00000000,750901C0,00000000,00000000,?,00000000,00DE3589,?,?,?,00DE15B2,?,?,80000001), ref: 00DE0FE6
                                                        • Part of subcall function 00DE0FC3: RegQueryValueExW.ADVAPI32(?,750901C0,00000000,750901C0,00000000,00000000,?,00DE15B2,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows\CurrentVersion\Run\), ref: 00DE100A
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DE0FAE: RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      Strings
                                                      • ServiceDll, xrefs: 00DDDE5F
                                                      • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 00DDDE2C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: QueryValuelstrlen$CloseFreeOpenVirtuallstrcpy
                                                      • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll
                                                      • API String ID: 1903904756-387424650
                                                      • Opcode ID: 913ee925cdbc23d328ad01f5e4bc611a5bf281efd977b6db7fed77ffd7f86c69
                                                      • Instruction ID: d01d195edc9687d3154035d314eba6a9826166f110c8cec720db53ba0ba96ec6
                                                      • Opcode Fuzzy Hash: 913ee925cdbc23d328ad01f5e4bc611a5bf281efd977b6db7fed77ffd7f86c69
                                                      • Instruction Fuzzy Hash: 0D112E71D00108ABCF24FBA5D956CEEBB79EF94740B50015AB802B7285EB705F44CBB1
                                                      APIs
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,00000000,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD35EE
                                                        • Part of subcall function 00DD35E5: lstrlenW.KERNEL32(00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3605
                                                        • Part of subcall function 00DD35E5: lstrcpyW.KERNEL32(?,00DE1E02,?,00DE1E02,00000000,00000000,.bss,00000000), ref: 00DD3620
                                                      • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000102,?,SYSTEM\CurrentControlSet\Services\TermService\Parameters), ref: 00DDD9EA
                                                        • Part of subcall function 00DE1039: RegSetValueExW.KERNEL32(?,750901C0,00000000,?,?,?,?,?,00DE1432,00000000,00000000,?,00000001,?,?,?), ref: 00DE1058
                                                        • Part of subcall function 00DD5EA5: VirtualFree.KERNELBASE(?,00000000,00008000,00DD5C2A,00000000,?,00DE10EE,?,?,00DE36B9), ref: 00DD5EAD
                                                        • Part of subcall function 00DE0FAE: RegCloseKey.KERNEL32(?,?,00DE112D,?,?,00DE36B9), ref: 00DE0FB8
                                                      Strings
                                                      • ServiceDll, xrefs: 00DDDA03
                                                      • SYSTEM\CurrentControlSet\Services\TermService\Parameters, xrefs: 00DDD9C2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$CloseFreeOpenValueVirtuallstrcpy
                                                      • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll
                                                      • API String ID: 2854241163-387424650
                                                      • Opcode ID: e51f572084a95fac2b27e8802fda077d1d7780ede12496289788f70c50517a01
                                                      • Instruction ID: ab9cd5a6636fece5efc518c1262506b6944984acb82253edb7403e7d3d78be2f
                                                      • Opcode Fuzzy Hash: e51f572084a95fac2b27e8802fda077d1d7780ede12496289788f70c50517a01
                                                      • Instruction Fuzzy Hash: 4C111F75D00258ABCB24FBA2DC96CFEBB79EF94700F40402AE50272285DB706A45CA71
                                                      APIs
                                                        • Part of subcall function 00DD1085: GetProcessHeap.KERNEL32(00000000,?,00DE1E36,00400000,?,?,00000000,?,?,00DE349D), ref: 00DD108B
                                                        • Part of subcall function 00DD1085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00DE349D), ref: 00DD1092
                                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000100,?,?,?,?,?,?,?,00000000,750901C0,00000000,00DE3628), ref: 00DE3008
                                                      • WinExec.KERNEL32(00000000,00000000), ref: 00DE304E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3314587191.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                      • Associated: 00000000.00000002.3314568689.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314609858.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000DE9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314631166.0000000000F1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3314694362.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_dd0000_hb21QzBgft.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateExecFileModuleNameProcess
                                                      • String ID: powershell Add-MpPreference -ExclusionPath
                                                      • API String ID: 1183730998-2194938034
                                                      • Opcode ID: e19ada67acc818ccc554a7cdfff8ce6411ab8b30b3d5a1ebfd52bc02be802c95
                                                      • Instruction ID: 8bf82e2d8457a191af1466eaf62f9a48a2cc5bb37f65f66f00b461d551b0fa13
                                                      • Opcode Fuzzy Hash: e19ada67acc818ccc554a7cdfff8ce6411ab8b30b3d5a1ebfd52bc02be802c95
                                                      • Instruction Fuzzy Hash: 53F096B994035076F22032B16CCBFBF5A9CDF99751F040027F604E53C2EA689D4041B5