Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NujUXO42Rg.exe

Overview

General Information

Sample name:NujUXO42Rg.exe
renamed because original name is a hash value
Original sample name:10e19f80d967ab7d4a8ed10f674df5c5.exe
Analysis ID:1549861
MD5:10e19f80d967ab7d4a8ed10f674df5c5
SHA1:895fdb3318b041506c9957b426e5ffe797a57c7f
SHA256:034b31656266ad9f80490a4fc983ac53bb3224ac88084069080ee2ba0a91fc20
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Delayed program exit found
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • NujUXO42Rg.exe (PID: 7468 cmdline: "C:\Users\user\Desktop\NujUXO42Rg.exe" MD5: 10E19F80D967AB7D4A8ED10F674DF5C5)
    • WerFault.exe (PID: 7616 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7672 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1088 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7748 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1120 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7836 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1028 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7892 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1128 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7948 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1160 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 8000 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • yavascript.exe (PID: 8044 cmdline: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" MD5: 10E19F80D967AB7D4A8ED10F674DF5C5)
      • WerFault.exe (PID: 6100 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8044 -s 520 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 8076 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1304 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • yavascript.exe (PID: 8016 cmdline: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" MD5: 10E19F80D967AB7D4A8ED10F674DF5C5)
    • WerFault.exe (PID: 404 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 668 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1804 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 676 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7688 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 648 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7852 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 688 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7892 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 740 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7984 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 748 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • yavascript.exe (PID: 1868 cmdline: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" MD5: 10E19F80D967AB7D4A8ED10F674DF5C5)
    • WerFault.exe (PID: 7748 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 532 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["198.23.227.212:32583:1"], "Assigned name": "Yavakosa", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "yavascript.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-I7G983", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "xenor", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
0000001A.00000002.2104228554.0000000002D0B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    0000001A.00000002.2104198203.0000000002CC4000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0xe38:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000010.00000002.2976585478.0000000002C92000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1740:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000011.00000002.2087932850.0000000002E1D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        Click to see the 87 entries
        SourceRuleDescriptionAuthorStrings
        0.2.NujUXO42Rg.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          0.2.NujUXO42Rg.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0.2.NujUXO42Rg.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0.2.NujUXO42Rg.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6b6f8:$a1: Remcos restarted by watchdog!
              • 0x6bc70:$a3: %02i:%02i:%02i:%03i
              0.2.NujUXO42Rg.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
              • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
              • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x65a04:$str_b2: Executing file:
              • 0x6683c:$str_b3: GetDirectListeningPort
              • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x66380:$str_b7: \update.vbs
              • 0x65a2c:$str_b9: Downloaded file:
              • 0x65a18:$str_b10: Downloading file:
              • 0x65abc:$str_b12: Failed to upload file:
              • 0x66804:$str_b13: StartForward
              • 0x66824:$str_b14: StopForward
              • 0x662d8:$str_b15: fso.DeleteFile "
              • 0x6626c:$str_b16: On Error Resume Next
              • 0x66308:$str_b17: fso.DeleteFolder "
              • 0x65aac:$str_b18: Uploaded file:
              • 0x65a6c:$str_b19: Unable to delete:
              • 0x662a0:$str_b20: while fso.FileExists("
              • 0x65f49:$str_c0: [Firefox StoredLogins not found]
              Click to see the 139 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\NujUXO42Rg.exe, ProcessId: 7468, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-I7G983

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: 1E 04 D2 DB 3F 0C FE F3 82 62 77 23 55 F6 79 B1 49 36 B3 E5 8E 32 C4 27 AC CB 73 6A A6 1A 04 B0 85 53 8A 49 43 14 D9 00 32 A6 F6 34 FD ED 3A E0 37 9D 04 D1 2A 0E C5 90 9E 15 4D 75 99 34 21 C5 73 C4 69 5A AC 89 28 B2 DE 68 91 0C F8 47 B7 30 EA 73 5B 70 24 DF 67 DA 70 E1 5E 5F 65 46 F0 13 90 71 48 89 66 9B 35 50 , EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\xenor\yavascript.exe, ProcessId: 8016, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-I7G983\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-06T07:44:28.652885+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449732TCP
              2024-11-06T07:45:10.745749+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449820TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-06T07:43:57.816353+010020365941Malware Command and Control Activity Detected192.168.2.449735198.23.227.21232583TCP
              2024-11-06T07:44:35.026676+010020365941Malware Command and Control Activity Detected192.168.2.449742198.23.227.21232583TCP
              2024-11-06T07:44:38.556950+010020365941Malware Command and Control Activity Detected192.168.2.449746198.23.227.21232583TCP
              2024-11-06T07:44:40.991185+010020365941Malware Command and Control Activity Detected192.168.2.449749198.23.227.21232583TCP
              2024-11-06T07:44:42.838468+010020365941Malware Command and Control Activity Detected192.168.2.449751198.23.227.21232583TCP
              2024-11-06T07:44:44.368393+010020365941Malware Command and Control Activity Detected192.168.2.449752198.23.227.21232583TCP
              2024-11-06T07:44:45.917615+010020365941Malware Command and Control Activity Detected192.168.2.449753198.23.227.21232583TCP
              2024-11-06T07:44:47.446899+010020365941Malware Command and Control Activity Detected192.168.2.449754198.23.227.21232583TCP
              2024-11-06T07:44:48.975123+010020365941Malware Command and Control Activity Detected192.168.2.449755198.23.227.21232583TCP
              2024-11-06T07:44:50.719321+010020365941Malware Command and Control Activity Detected192.168.2.449756198.23.227.21232583TCP
              2024-11-06T07:44:52.246626+010020365941Malware Command and Control Activity Detected192.168.2.449757198.23.227.21232583TCP
              2024-11-06T07:44:53.767317+010020365941Malware Command and Control Activity Detected192.168.2.449758198.23.227.21232583TCP
              2024-11-06T07:44:55.276021+010020365941Malware Command and Control Activity Detected192.168.2.449759198.23.227.21232583TCP
              2024-11-06T07:44:56.825571+010020365941Malware Command and Control Activity Detected192.168.2.449760198.23.227.21232583TCP
              2024-11-06T07:44:58.344094+010020365941Malware Command and Control Activity Detected192.168.2.449762198.23.227.21232583TCP
              2024-11-06T07:44:59.866866+010020365941Malware Command and Control Activity Detected192.168.2.449768198.23.227.21232583TCP
              2024-11-06T07:45:01.415991+010020365941Malware Command and Control Activity Detected192.168.2.449779198.23.227.21232583TCP
              2024-11-06T07:45:02.933709+010020365941Malware Command and Control Activity Detected192.168.2.449785198.23.227.21232583TCP
              2024-11-06T07:45:04.459109+010020365941Malware Command and Control Activity Detected192.168.2.449796198.23.227.21232583TCP
              2024-11-06T07:45:06.281224+010020365941Malware Command and Control Activity Detected192.168.2.449807198.23.227.21232583TCP
              2024-11-06T07:45:07.796557+010020365941Malware Command and Control Activity Detected192.168.2.449814198.23.227.21232583TCP
              2024-11-06T07:45:10.247962+010020365941Malware Command and Control Activity Detected192.168.2.449825198.23.227.21232583TCP
              2024-11-06T07:45:11.769746+010020365941Malware Command and Control Activity Detected192.168.2.449836198.23.227.21232583TCP
              2024-11-06T07:45:13.704236+010020365941Malware Command and Control Activity Detected192.168.2.449847198.23.227.21232583TCP
              2024-11-06T07:45:15.219609+010020365941Malware Command and Control Activity Detected192.168.2.449858198.23.227.21232583TCP
              2024-11-06T07:45:16.761856+010020365941Malware Command and Control Activity Detected192.168.2.449866198.23.227.21232583TCP
              2024-11-06T07:45:18.358675+010020365941Malware Command and Control Activity Detected192.168.2.449876198.23.227.21232583TCP
              2024-11-06T07:45:19.928819+010020365941Malware Command and Control Activity Detected192.168.2.449886198.23.227.21232583TCP
              2024-11-06T07:45:21.475963+010020365941Malware Command and Control Activity Detected192.168.2.449897198.23.227.21232583TCP
              2024-11-06T07:45:23.011677+010020365941Malware Command and Control Activity Detected192.168.2.449905198.23.227.21232583TCP
              2024-11-06T07:45:24.535030+010020365941Malware Command and Control Activity Detected192.168.2.449914198.23.227.21232583TCP
              2024-11-06T07:45:26.583510+010020365941Malware Command and Control Activity Detected192.168.2.449927198.23.227.21232583TCP
              2024-11-06T07:45:28.130469+010020365941Malware Command and Control Activity Detected192.168.2.449934198.23.227.21232583TCP
              2024-11-06T07:45:29.611446+010020365941Malware Command and Control Activity Detected192.168.2.449944198.23.227.21232583TCP
              2024-11-06T07:45:31.073895+010020365941Malware Command and Control Activity Detected192.168.2.449955198.23.227.21232583TCP
              2024-11-06T07:45:32.502999+010020365941Malware Command and Control Activity Detected192.168.2.449963198.23.227.21232583TCP
              2024-11-06T07:45:34.156193+010020365941Malware Command and Control Activity Detected192.168.2.449972198.23.227.21232583TCP
              2024-11-06T07:45:35.858728+010020365941Malware Command and Control Activity Detected192.168.2.449983198.23.227.21232583TCP
              2024-11-06T07:45:37.303985+010020365941Malware Command and Control Activity Detected192.168.2.449994198.23.227.21232583TCP
              2024-11-06T07:45:38.609693+010020365941Malware Command and Control Activity Detected192.168.2.450000198.23.227.21232583TCP
              2024-11-06T07:45:39.892930+010020365941Malware Command and Control Activity Detected192.168.2.450011198.23.227.21232583TCP
              2024-11-06T07:45:41.240816+010020365941Malware Command and Control Activity Detected192.168.2.450017198.23.227.21232583TCP
              2024-11-06T07:45:42.462206+010020365941Malware Command and Control Activity Detected192.168.2.450025198.23.227.21232583TCP
              2024-11-06T07:45:43.909906+010020365941Malware Command and Control Activity Detected192.168.2.450034198.23.227.21232583TCP
              2024-11-06T07:45:45.110198+010020365941Malware Command and Control Activity Detected192.168.2.450042198.23.227.21232583TCP
              2024-11-06T07:45:46.306006+010020365941Malware Command and Control Activity Detected192.168.2.450048198.23.227.21232583TCP
              2024-11-06T07:45:47.732283+010020365941Malware Command and Control Activity Detected192.168.2.450058198.23.227.21232583TCP
              2024-11-06T07:45:48.912870+010020365941Malware Command and Control Activity Detected192.168.2.450060198.23.227.21232583TCP
              2024-11-06T07:45:50.249920+010020365941Malware Command and Control Activity Detected192.168.2.450061198.23.227.21232583TCP
              2024-11-06T07:45:51.341145+010020365941Malware Command and Control Activity Detected192.168.2.450062198.23.227.21232583TCP
              2024-11-06T07:45:52.825738+010020365941Malware Command and Control Activity Detected192.168.2.450063198.23.227.21232583TCP
              2024-11-06T07:45:53.887784+010020365941Malware Command and Control Activity Detected192.168.2.450064198.23.227.21232583TCP
              2024-11-06T07:45:54.929691+010020365941Malware Command and Control Activity Detected192.168.2.450065198.23.227.21232583TCP
              2024-11-06T07:45:56.160651+010020365941Malware Command and Control Activity Detected192.168.2.450066198.23.227.21232583TCP
              2024-11-06T07:45:57.506931+010020365941Malware Command and Control Activity Detected192.168.2.450067198.23.227.21232583TCP
              2024-11-06T07:45:58.501721+010020365941Malware Command and Control Activity Detected192.168.2.450068198.23.227.21232583TCP
              2024-11-06T07:45:59.957100+010020365941Malware Command and Control Activity Detected192.168.2.450069198.23.227.21232583TCP
              2024-11-06T07:46:00.930062+010020365941Malware Command and Control Activity Detected192.168.2.450070198.23.227.21232583TCP
              2024-11-06T07:46:02.323937+010020365941Malware Command and Control Activity Detected192.168.2.450071198.23.227.21232583TCP
              2024-11-06T07:46:03.283592+010020365941Malware Command and Control Activity Detected192.168.2.450072198.23.227.21232583TCP
              2024-11-06T07:46:04.617461+010020365941Malware Command and Control Activity Detected192.168.2.450073198.23.227.21232583TCP
              2024-11-06T07:46:05.552215+010020365941Malware Command and Control Activity Detected192.168.2.450074198.23.227.21232583TCP
              2024-11-06T07:46:07.320124+010020365941Malware Command and Control Activity Detected192.168.2.450075198.23.227.21232583TCP
              2024-11-06T07:46:08.333386+010020365941Malware Command and Control Activity Detected192.168.2.450076198.23.227.21232583TCP
              2024-11-06T07:46:09.491899+010020365941Malware Command and Control Activity Detected192.168.2.450077198.23.227.21232583TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: NujUXO42Rg.exeAvira: detected
              Source: 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["198.23.227.212:32583:1"], "Assigned name": "Yavakosa", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "yavascript.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-I7G983", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "xenor", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeReversingLabs: Detection: 65%
              Source: NujUXO42Rg.exeReversingLabs: Detection: 65%
              Source: NujUXO42Rg.exeVirustotal: Detection: 70%Perma Link
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000001A.00000002.2104228554.0000000002D0B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087932850.0000000002E1D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2074993782.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
              Source: NujUXO42Rg.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_0043293A
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04852BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_04852BA1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,16_2_0043293A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C22BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,16_2_02C22BA1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,17_2_0043293A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D22BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,17_2_02D22BA1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,26_2_0043293A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E32BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,26_2_02E32BA1
              Source: NujUXO42Rg.exeBinary or memory string: -----BEGIN PUBLIC KEY-----

              Exploits

              barindex
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTR

              Privilege Escalation

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00406764 _wcslen,CoGetObject,0_2_00406764
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00406764 _wcslen,CoGetObject,16_2_00406764
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00406764 _wcslen,CoGetObject,17_2_00406764
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00406764 _wcslen,CoGetObject,26_2_00406764
              Source: NujUXO42Rg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040B335
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0041B42F
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040B53A
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,0_2_004089A9
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00406AC2 FindFirstFileW,FindNextFileW,0_2_00406AC2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_00407A8C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00418C69
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,0_2_00408DA7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0482B59C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0483B696
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0482900E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04827CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_04827CF3
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04826D29 FindFirstFileW,FindNextFileW,0_2_04826D29
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04838ED0 FindFirstFileW,0_2_04838ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,16_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,16_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,16_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00406AC2 FindFirstFileW,FindNextFileW,16_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,16_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,16_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,16_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,16_2_02BF900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,16_2_02C0B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BFB59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_02BFB59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C08ED0 FindFirstFileW,16_2_02C08ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF7CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,16_2_02BF7CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF6D29 FindFirstFileW,FindNextFileW,16_2_02BF6D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,17_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,17_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00406AC2 FindFirstFileW,FindNextFileW,17_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,17_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,17_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_02CF900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_02D0B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CFB59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_02CFB59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D08ED0 FindFirstFileW,17_2_02D08ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF7CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_02CF7CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF6D29 FindFirstFileW,FindNextFileW,17_2_02CF6D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,26_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,26_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,26_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,26_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00406AC2 FindFirstFileW,FindNextFileW,26_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,26_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,26_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,26_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E0900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,26_2_02E0900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,26_2_02E1B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E0B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,26_2_02E0B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E18ED0 FindFirstFileW,26_2_02E18ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E07CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,26_2_02E07CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E06D29 FindFirstFileW,FindNextFileW,26_2_02E06D29
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406F06

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49742 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49754 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49760 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49751 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49758 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49746 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49762 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49756 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49752 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49755 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49779 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49768 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49785 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49749 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49757 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49796 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49814 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49825 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49836 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49847 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49759 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49753 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49807 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49858 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49866 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49886 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49897 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49876 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49905 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49927 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49944 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49934 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49914 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49963 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49955 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49972 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50000 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50011 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49983 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49994 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50017 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50025 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50034 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50042 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50048 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50058 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50061 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50067 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50060 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50068 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50070 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50062 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50065 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50069 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50071 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50076 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50072 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50073 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50075 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50074 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50063 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50066 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50077 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50064 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49735 -> 198.23.227.212:32583
              Source: Malware configuration extractorIPs: 198.23.227.212
              Source: global trafficTCP traffic: 192.168.2.4:49735 -> 198.23.227.212:32583
              Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49732
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49820
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004260F7 recv,0_2_004260F7
              Source: yavascript.exeString found in binary or memory: http://geoplugin.net/json.gp
              Source: NujUXO42Rg.exe, 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, NujUXO42Rg.exe, 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, NujUXO42Rg.exe, 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, yavascript.exe, 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, yavascript.exe, 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000000_2_004099E4
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,16_2_004159C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,17_2_004159C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,26_2_004159C6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_00409B10
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTR

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000001A.00000002.2104228554.0000000002D0B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087932850.0000000002E1D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2074993782.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041BB71 SystemParametersInfoW,0_2_0041BB71
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041BB77 SystemParametersInfoW,0_2_0041BB77
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483BDD8 SystemParametersInfoW,0_2_0483BDD8
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483BDDE SystemParametersInfoW,0_2_0483BDDE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041BB71 SystemParametersInfoW,16_2_0041BB71
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041BB77 SystemParametersInfoW,16_2_0041BB77
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0BDD8 SystemParametersInfoW,16_2_02C0BDD8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0BDDE SystemParametersInfoW,16_2_02C0BDDE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041BB71 SystemParametersInfoW,17_2_0041BB71
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041BB77 SystemParametersInfoW,17_2_0041BB77
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0BDD8 SystemParametersInfoW,17_2_02D0BDD8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0BDDE SystemParametersInfoW,17_2_02D0BDDE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1BDD8 SystemParametersInfoW,26_2_02E1BDD8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1BDDE SystemParametersInfoW,26_2_02E1BDDE

              System Summary

              barindex
              Source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0000001A.00000002.2104198203.0000000002CC4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000010.00000002.2976585478.0000000002C92000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000000.00000002.2074953120.0000000002D93000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000011.00000002.2087828491.0000000002DC4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,0_2_0041CA9E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041ACC1
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,0_2_0041ACED
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,0_2_0483CD05
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483AF28 OpenProcess,NtSuspendProcess,CloseHandle,0_2_0483AF28
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483AF54 OpenProcess,NtResumeProcess,CloseHandle,0_2_0483AF54
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,16_2_0041CA9E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,16_2_0041ACC1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,16_2_0041ACED
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0AF54 OpenProcess,NtResumeProcess,CloseHandle,16_2_02C0AF54
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0AF28 OpenProcess,NtSuspendProcess,CloseHandle,16_2_02C0AF28
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,16_2_02C0CD05
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,17_2_0041CA9E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,17_2_0041ACC1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,17_2_0041ACED
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0AF54 OpenProcess,NtResumeProcess,CloseHandle,17_2_02D0AF54
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0AF28 OpenProcess,NtSuspendProcess,CloseHandle,17_2_02D0AF28
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,17_2_02D0CD05
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,26_2_0041CA9E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,26_2_0041ACC1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,26_2_0041ACED
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1AF54 OpenProcess,NtResumeProcess,CloseHandle,26_2_02E1AF54
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1AF28 OpenProcess,NtSuspendProcess,CloseHandle,26_2_02E1AF28
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,26_2_02E1CD05
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004158B9
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04835B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_04835B1C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,16_2_004158B9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C05B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,16_2_02C05B1C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,17_2_004158B9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D05B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,17_2_02D05B1C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,26_2_004158B9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E15B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,26_2_02E15B1C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041D0710_2_0041D071
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004520D20_2_004520D2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043D0980_2_0043D098
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004371500_2_00437150
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004361AA0_2_004361AA
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004262540_2_00426254
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004313770_2_00431377
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043651C0_2_0043651C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041E5DF0_2_0041E5DF
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0044C7390_2_0044C739
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004367C60_2_004367C6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004267CB0_2_004267CB
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043C9DD0_2_0043C9DD
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00432A490_2_00432A49
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00436A8D0_2_00436A8D
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043CC0C0_2_0043CC0C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00436D480_2_00436D48
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00434D220_2_00434D22
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00426E730_2_00426E73
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00440E200_2_00440E20
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043CE3B0_2_0043CE3B
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00412F450_2_00412F45
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00452F000_2_00452F00
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00426FAD0_2_00426FAD
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048464BB0_2_048464BB
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048564110_2_04856411
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048610870_2_04861087
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0485D0A20_2_0485D0A2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048470DA0_2_048470DA
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483D2D80_2_0483D2D8
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0485D2FF0_2_0485D2FF
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048472140_2_04847214
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048573B70_2_048573B7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048723390_2_04872339
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04852CB00_2_04852CB0
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0485CC440_2_0485CC44
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0485CE730_2_0485CE73
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483E8460_2_0483E846
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04846A320_2_04846A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041D07116_2_0041D071
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004520D216_2_004520D2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043D09816_2_0043D098
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043715016_2_00437150
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004361AA16_2_004361AA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0042625416_2_00426254
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043137716_2_00431377
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043651C16_2_0043651C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041E5DF16_2_0041E5DF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0044C73916_2_0044C739
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004367C616_2_004367C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004267CB16_2_004267CB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043C9DD16_2_0043C9DD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00432A4916_2_00432A49
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00436A8D16_2_00436A8D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043CC0C16_2_0043CC0C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00436D4816_2_00436D48
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00434D2216_2_00434D22
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00426E7316_2_00426E73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00440E2016_2_00440E20
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043CE3B16_2_0043CE3B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00412F4516_2_00412F45
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00452F0016_2_00452F00
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00426FAD16_2_00426FAD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0D2D816_2_02C0D2D8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2D2FF16_2_02C2D2FF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C1721416_2_02C17214
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C273B716_2_02C273B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C4233916_2_02C42339
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C170DA16_2_02C170DA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C3108716_2_02C31087
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2D0A216_2_02C2D0A2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C164BB16_2_02C164BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2641116_2_02C26411
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C16A3216_2_02C16A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0E84616_2_02C0E846
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2CE7316_2_02C2CE73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C22CB016_2_02C22CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2CC4416_2_02C2CC44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041D07117_2_0041D071
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004520D217_2_004520D2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043D09817_2_0043D098
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043715017_2_00437150
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004361AA17_2_004361AA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0042625417_2_00426254
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043137717_2_00431377
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043651C17_2_0043651C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041E5DF17_2_0041E5DF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0044C73917_2_0044C739
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004367C617_2_004367C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004267CB17_2_004267CB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043C9DD17_2_0043C9DD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00432A4917_2_00432A49
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00436A8D17_2_00436A8D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043CC0C17_2_0043CC0C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00436D4817_2_00436D48
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00434D2217_2_00434D22
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00426E7317_2_00426E73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00440E2017_2_00440E20
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043CE3B17_2_0043CE3B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00412F4517_2_00412F45
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00452F0017_2_00452F00
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00426FAD17_2_00426FAD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0D2D817_2_02D0D2D8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D2D2FF17_2_02D2D2FF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D1721417_2_02D17214
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D273B717_2_02D273B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D4233917_2_02D42339
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D170DA17_2_02D170DA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D3108717_2_02D31087
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D2D0A217_2_02D2D0A2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D164BB17_2_02D164BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D2641117_2_02D26411
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D16A3217_2_02D16A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0E84617_2_02D0E846
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D2CE7317_2_02D2CE73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D22CB017_2_02D22CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D2CC4417_2_02D2CC44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041D07126_2_0041D071
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004520D226_2_004520D2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043D09826_2_0043D098
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043715026_2_00437150
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004361AA26_2_004361AA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0042625426_2_00426254
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043137726_2_00431377
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043651C26_2_0043651C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041E5DF26_2_0041E5DF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0044C73926_2_0044C739
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004367C626_2_004367C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004267CB26_2_004267CB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043C9DD26_2_0043C9DD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00432A4926_2_00432A49
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00436A8D26_2_00436A8D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043CC0C26_2_0043CC0C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00436D4826_2_00436D48
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00434D2226_2_00434D22
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00426E7326_2_00426E73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00440E2026_2_00440E20
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043CE3B26_2_0043CE3B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00412F4526_2_00412F45
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00452F0026_2_00452F00
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00426FAD26_2_00426FAD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E3D2FF26_2_02E3D2FF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1D2D826_2_02E1D2D8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E2721426_2_02E27214
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E373B726_2_02E373B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E5233926_2_02E52339
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E270DA26_2_02E270DA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E3D0A226_2_02E3D0A2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E4108726_2_02E41087
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E264BB26_2_02E264BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E3641126_2_02E36411
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E26A3226_2_02E26A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1E84626_2_02E1E846
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E3CE7326_2_02E3CE73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E32CB026_2_02E32CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E3CC4426_2_02E3CC44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02BF234E appears 37 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 0043ADAE appears 45 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401D64 appears 64 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00447174 appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401F66 appears 150 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401FAA appears 63 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00403B40 appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00433FB0 appears 165 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00406478 appears 33 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02D23B0C appears 41 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00444B14 appears 84 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00404C9E appears 48 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02E34217 appears 46 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004026CE appears 45 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02D24217 appears 46 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02E33B0C appears 41 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004020E7 appears 119 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02C24217 appears 46 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004567E0 appears 39 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02C23B0C appears 41 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401E8F appears 52 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02CF234E appears 37 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401E52 appears 33 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004040BB appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00410D8D appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004338A5 appears 123 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 02E0234E appears 37 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 004020E7 appears 39 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 00401F66 appears 50 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 0482234E appears 37 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 04854217 appears 46 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 004338A5 appears 41 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 04853B0C appears 41 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: String function: 00433FB0 appears 55 times
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020
              Source: NujUXO42Rg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0000001A.00000002.2104198203.0000000002CC4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000010.00000002.2976585478.0000000002C92000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000000.00000002.2074953120.0000000002D93000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000011.00000002.2087828491.0000000002DC4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: NujUXO42Rg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: yavascript.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@19/67@0/1
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00416AB7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04836D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_04836D1E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,16_2_00416AB7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C06D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,16_2_02C06D1E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,17_2_00416AB7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D06D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,17_2_02D06D1E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,26_2_00416AB7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E16D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,26_2_02E16D1E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040E219
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041A63F
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00419BC4
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeFile created: C:\Users\user\AppData\Roaming\xenorJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1868
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7468
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8016
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e6a05fe8-8333-4073-b92f-8ca12943052dJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Software\0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Rmc-I7G9830_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Exe0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Exe0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Rmc-I7G9830_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: 0DG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Inj0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Inj0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: @CG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: exepath0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: @CG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: exepath0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: licence0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: `=G0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: dCG0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: Administrator0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: User0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: del0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: del0_2_0040D767
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCommand line argument: del0_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Software\16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Rmc-I7G98316_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Rmc-I7G98316_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: 0DG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: licence16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: `=G16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: dCG16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Administrator16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: User16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del16_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Software\17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: (CG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: (CG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: 0DG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: licence17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: `=G17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: dCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Administrator17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: User17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del17_2_0040D767
              Source: NujUXO42Rg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: NujUXO42Rg.exeReversingLabs: Detection: 65%
              Source: NujUXO42Rg.exeVirustotal: Detection: 70%
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeFile read: C:\Users\user\Desktop\NujUXO42Rg.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\NujUXO42Rg.exe "C:\Users\user\Desktop\NujUXO42Rg.exe"
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1088
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1120
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1028
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1128
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1160
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1304
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 668
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8044 -s 520
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 676
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 648
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 688
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 748
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" Jump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: msvcr100.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: apphelp.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msimg32.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msvcr100.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msimg32.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msvcr100.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msimg32.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msvcr100.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
              Source: NujUXO42Rg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: NujUXO42Rg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: NujUXO42Rg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: NujUXO42Rg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: NujUXO42Rg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeUnpacked PE file: 0.2.NujUXO42Rg.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeUnpacked PE file: 16.2.yavascript.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeUnpacked PE file: 17.2.yavascript.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCE3
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004567E0 push eax; ret 0_2_004567FE
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0045B9DD push esi; ret 0_2_0045B9E6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00455EAF push ecx; ret 0_2_00455EC2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00433FF6 push ecx; ret 0_2_00434009
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_02D99232 pushfd ; ret 0_2_02D99233
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_02D963BD push es; ret 0_2_02D963CA
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0484409D push esi; ret 0_2_0484409F
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04876116 push ecx; ret 0_2_04876129
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482724F push edx; retf 0_2_04827252
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0485425D push ecx; ret 0_2_04854270
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04835C73 push esp; ret 0_2_04835C74
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04835EC9 push edi; ret 0_2_04835ECA
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04876A47 push eax; ret 0_2_04876A65
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004567E0 push eax; ret 16_2_004567FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0045B9DD push esi; ret 16_2_0045B9E6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00455EAF push ecx; ret 16_2_00455EC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00433FF6 push ecx; ret 16_2_00434009
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2425D push ecx; ret 16_2_02C24270
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF724F push edx; retf 16_2_02BF7252
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C1409D push esi; ret 16_2_02C1409F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C46116 push ecx; ret 16_2_02C46129
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C46A47 push eax; ret 16_2_02C46A65
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C05EC9 push edi; ret 16_2_02C05ECA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C05C73 push esp; ret 16_2_02C05C74
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C922B9 push esi; iretd 16_2_02C922BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C920DD push esi; iretd 16_2_02C9210A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C92078 push esi; iretd 16_2_02C9210A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C98B32 pushfd ; ret 16_2_02C98B33
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C95CBD push es; ret 16_2_02C95CCA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004567E0 push eax; ret 17_2_004567FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0045B9DD push esi; ret 17_2_0045B9E6
              Source: NujUXO42Rg.exeStatic PE information: section name: .text entropy: 7.6964710810725245
              Source: yavascript.exe.0.drStatic PE information: section name: .text entropy: 7.6964710810725245
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00406128 ShellExecuteW,URLDownloadToFileW,0_2_00406128
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeFile created: C:\Users\user\AppData\Roaming\xenor\yavascript.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983Jump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00419BC4
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983Jump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983Jump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCE3
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0040E54F Sleep,ExitProcess,0_2_0040E54F
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482E7B6 Sleep,ExitProcess,0_2_0482E7B6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0040E54F Sleep,ExitProcess,16_2_0040E54F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BFE7B6 Sleep,ExitProcess,16_2_02BFE7B6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040E54F Sleep,ExitProcess,17_2_0040E54F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CFE7B6 Sleep,ExitProcess,17_2_02CFE7B6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0040E54F Sleep,ExitProcess,26_2_0040E54F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E0E7B6 Sleep,ExitProcess,26_2_02E0E7B6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_004198C2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_04839B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,16_2_004198C2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,16_2_02C09B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,17_2_004198C2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,17_2_02D09B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,26_2_004198C2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,26_2_02E19B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeWindow / User API: threadDelayed 6297
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeWindow / User API: threadDelayed 3576
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeEvaded block: after key decisiongraph_0-85776
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeEvaded block: after key decisiongraph_0-85748
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeAPI coverage: 3.5 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI coverage: 5.3 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI coverage: 3.0 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI coverage: 3.2 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 5260Thread sleep count: 6297 > 30
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 5260Thread sleep time: -18891000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 5260Thread sleep count: 3576 > 30
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 5260Thread sleep time: -10728000s >= -30000s
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040B335
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0041B42F
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040B53A
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,0_2_004089A9
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00406AC2 FindFirstFileW,FindNextFileW,0_2_00406AC2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_00407A8C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00418C69
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,0_2_00408DA7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0482B59C
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0483B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0483B696
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0482900E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04827CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_04827CF3
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04826D29 FindFirstFileW,FindNextFileW,0_2_04826D29
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04838ED0 FindFirstFileW,0_2_04838ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,16_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,16_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,16_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00406AC2 FindFirstFileW,FindNextFileW,16_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,16_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,16_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,16_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,16_2_02BF900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C0B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,16_2_02C0B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BFB59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_02BFB59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C08ED0 FindFirstFileW,16_2_02C08ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF7CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,16_2_02BF7CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF6D29 FindFirstFileW,FindNextFileW,16_2_02BF6D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,17_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,17_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00406AC2 FindFirstFileW,FindNextFileW,17_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,17_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,17_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_02CF900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D0B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_02D0B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CFB59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_02CFB59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D08ED0 FindFirstFileW,17_2_02D08ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF7CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_02CF7CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF6D29 FindFirstFileW,FindNextFileW,17_2_02CF6D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,26_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,26_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,26_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,26_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00406AC2 FindFirstFileW,FindNextFileW,26_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,26_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,26_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,26_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E0900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,26_2_02E0900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E1B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,26_2_02E1B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E0B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,26_2_02E0B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E18ED0 FindFirstFileW,26_2_02E18ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E07CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,26_2_02E07CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E06D29 FindFirstFileW,FindNextFileW,26_2_02E06D29
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406F06
              Source: Amcache.hve.3.drBinary or memory string: VMware
              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: yavascript.exe, 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.3.drBinary or memory string: vmci.sys
              Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.3.drBinary or memory string: VMware20,1
              Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI call chain: ExitProcess graph end nodegraph_16-85800
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043A65D
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCE3
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00442554 mov eax, dword ptr fs:[00000030h]0_2_00442554
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_02D9374B push dword ptr fs:[00000030h]0_2_02D9374B
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048627BB mov eax, dword ptr fs:[00000030h]0_2_048627BB
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04820D90 mov eax, dword ptr fs:[00000030h]0_2_04820D90
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0482092B mov eax, dword ptr fs:[00000030h]0_2_0482092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00442554 mov eax, dword ptr fs:[00000030h]16_2_00442554
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C327BB mov eax, dword ptr fs:[00000030h]16_2_02C327BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF092B mov eax, dword ptr fs:[00000030h]16_2_02BF092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02BF0D90 mov eax, dword ptr fs:[00000030h]16_2_02BF0D90
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C9304B push dword ptr fs:[00000030h]16_2_02C9304B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00442554 mov eax, dword ptr fs:[00000030h]17_2_00442554
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D327BB mov eax, dword ptr fs:[00000030h]17_2_02D327BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF092B mov eax, dword ptr fs:[00000030h]17_2_02CF092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02CF0D90 mov eax, dword ptr fs:[00000030h]17_2_02CF0D90
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02DC477B push dword ptr fs:[00000030h]17_2_02DC477B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00442554 mov eax, dword ptr fs:[00000030h]26_2_00442554
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02CC4743 push dword ptr fs:[00000030h]26_2_02CC4743
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E427BB mov eax, dword ptr fs:[00000030h]26_2_02E427BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E0092B mov eax, dword ptr fs:[00000030h]26_2_02E0092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E00D90 mov eax, dword ptr fs:[00000030h]26_2_02E00D90
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0044E92E GetProcessHeap,0_2_0044E92E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00434168
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043A65D
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00433B44
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00433CD7 SetUnhandledExceptionFilter,0_2_00433CD7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_048543CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_048543CF
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_04853DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_04853DAB
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0485A8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0485A8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00434168
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0043A65D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00433B44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_00433CD7 SetUnhandledExceptionFilter,16_2_00433CD7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C243CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_02C243CF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C2A8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_02C2A8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 16_2_02C23DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_02C23DAB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_00434168
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0043A65D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00433B44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00433CD7 SetUnhandledExceptionFilter,17_2_00433CD7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D243CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_02D243CF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D2A8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_02D2A8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_02D23DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_02D23DAB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_00434168
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_0043A65D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00433B44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_00433CD7 SetUnhandledExceptionFilter,26_2_00433CD7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E343CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_02E343CF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E3A8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_02E3A8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 26_2_02E33DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_02E33DAB
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00410F36
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe16_2_00410F36
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe17_2_00410F36
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe26_2_00410F36
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00418754 mouse_event,0_2_00418754
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" Jump to behavior
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00433E0A cpuid 0_2_00433E0A
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_004470AE
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,0_2_004510BA
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004511E3
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,0_2_004512EA
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004513B7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,0_2_00447597
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoA,0_2_0040E679
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00450A7F
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_00450CF7
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_00450D42
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_00450DDD
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00450E6A
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0487144A
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,0_2_04871551
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0487161E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,0_2_048677FE
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_04871044
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_04867315
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoW,0_2_04871321
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_04870CE6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_04870FA9
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: EnumSystemLocalesW,0_2_04870F5E
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: GetLocaleInfoA,0_2_0482E8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_004470AE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,16_2_004510BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,16_2_004511E3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,16_2_004512EA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,16_2_004513B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,16_2_00447597
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,16_2_0040E679
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,16_2_00450A7F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_00450CF7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_00450D42
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_00450DDD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,16_2_00450E6A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_02C37315
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,16_2_02C41321
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_02C41044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,16_2_02C4161E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,16_2_02C377FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,16_2_02C4144A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,16_2_02C41551
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,16_2_02BFE8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_02C40FA9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,16_2_02C40F5E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,16_2_02C40CE6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_004470AE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_004510BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_004511E3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_004512EA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_004513B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_00447597
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,17_2_0040E679
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,17_2_00450A7F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00450CF7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00450D42
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00450DDD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,17_2_00450E6A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_02D37315
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_02D41321
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_02D41044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_02D4161E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_02D377FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_02D4144A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_02D41551
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,17_2_02CFE8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_02D40FA9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_02D40F5E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,17_2_02D40CE6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_004470AE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,26_2_004510BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,26_2_004511E3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,26_2_004512EA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,26_2_004513B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,26_2_00447597
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,26_2_0040E679
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,26_2_00450A7F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_00450CF7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_00450D42
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_00450DDD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,26_2_00450E6A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,26_2_02E51321
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_02E47315
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_02E51044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,26_2_02E5161E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,26_2_02E477FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,26_2_02E5144A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,26_2_02E51551
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,26_2_02E0E8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_02E50FA9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,26_2_02E50F5E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,26_2_02E50CE6
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434010
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_0041A7A2 GetComputerNameExW,GetUserNameW,0_2_0041A7A2
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: 0_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00448057
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000001A.00000002.2104228554.0000000002D0B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087932850.0000000002E1D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2074993782.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTR
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040B21B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data16_2_0040B21B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data17_2_0040B21B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data26_2_0040B21B
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040B335
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: \key3.db0_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\16_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \key3.db16_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \key3.db17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\26_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \key3.db26_2_0040B335

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983Jump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.2e00e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.4820e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.NujUXO42Rg.exe.48a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.yavascript.exe.4830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.yavascript.exe.4720000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.2cf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NujUXO42Rg.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.yavascript.exe.2bf0e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.4760000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000001A.00000002.2104228554.0000000002D0B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087932850.0000000002E1D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2074993782.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NujUXO42Rg.exe PID: 7468, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 8044, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1868, type: MEMORYSTR
              Source: C:\Users\user\Desktop\NujUXO42Rg.exeCode function: cmd.exe0_2_00405042
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: cmd.exe16_2_00405042
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: cmd.exe17_2_00405042
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: cmd.exe26_2_00405042
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              11
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts12
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Bypass User Account Control
              3
              Obfuscated Files or Information
              111
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol111
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts2
              Service Execution
              11
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              12
              Software Packing
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Windows Service
              1
              DLL Side-Loading
              NTDS3
              File and Directory Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
              Process Injection
              1
              Bypass User Account Control
              LSA Secrets23
              System Information Discovery
              SSHKeylogging1
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
              Registry Run Keys / Startup Folder
              1
              Masquerading
              Cached Domain Credentials141
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Virtualization/Sandbox Evasion
              DCSync2
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Process Injection
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1549861 Sample: NujUXO42Rg.exe Startdate: 06/11/2024 Architecture: WINDOWS Score: 100 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 8 other signatures 2->64 7 NujUXO42Rg.exe 1 4 2->7         started        11 yavascript.exe 2->11         started        14 yavascript.exe 2->14         started        process3 dnsIp4 50 C:\Users\user\AppData\...\yavascript.exe, PE32 7->50 dropped 52 C:\Users\...\yavascript.exe:Zone.Identifier, ASCII 7->52 dropped 66 Contains functionality to bypass UAC (CMSTPLUA) 7->66 68 Detected unpacking (changes PE section rights) 7->68 70 Detected Remcos RAT 7->70 78 4 other signatures 7->78 16 yavascript.exe 7->16         started        19 WerFault.exe 16 7->19         started        22 WerFault.exe 16 7->22         started        32 6 other processes 7->32 54 198.23.227.212, 32583, 49735, 49742 AS-COLOCROSSINGUS United States 11->54 72 Multi AV Scanner detection for dropped file 11->72 74 Contains functionalty to change the wallpaper 11->74 76 Contains functionality to steal Chrome passwords or cookies 11->76 24 WerFault.exe 11->24         started        26 WerFault.exe 11->26         started        28 WerFault.exe 11->28         started        34 3 other processes 11->34 30 WerFault.exe 14->30         started        file5 signatures6 process7 file8 56 Detected Remcos RAT 16->56 36 WerFault.exe 16->36         started        38 C:\ProgramData\Microsoft\...\Report.wer, Unicode 19->38 dropped 40 C:\ProgramData\Microsoft\...\Report.wer, Unicode 22->40 dropped 42 C:\ProgramData\Microsoft\...\Report.wer, Unicode 32->42 dropped 44 C:\ProgramData\Microsoft\...\Report.wer, Unicode 32->44 dropped 46 C:\ProgramData\Microsoft\...\Report.wer, Unicode 32->46 dropped 48 3 other malicious files 32->48 dropped signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              NujUXO42Rg.exe66%ReversingLabsWin32.Trojan.Leonem
              NujUXO42Rg.exe71%VirustotalBrowse
              NujUXO42Rg.exe100%AviraHEUR/AGEN.1312571
              NujUXO42Rg.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\xenor\yavascript.exe66%ReversingLabsWin32.Trojan.Leonem
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpyavascript.exefalse
                high
                http://upx.sf.netAmcache.hve.3.drfalse
                  high
                  http://geoplugin.net/json.gp/CNujUXO42Rg.exe, 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, NujUXO42Rg.exe, 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, NujUXO42Rg.exe, 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, yavascript.exe, 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, yavascript.exe, 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    198.23.227.212
                    unknownUnited States
                    36352AS-COLOCROSSINGUStrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1549861
                    Start date and time:2024-11-06 07:43:07 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 17s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:41
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:NujUXO42Rg.exe
                    renamed because original name is a hash value
                    Original Sample Name:10e19f80d967ab7d4a8ed10f674df5c5.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.expl.evad.winEXE@19/67@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 41
                    • Number of non-executed functions: 374
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.182.143.212
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report creation exceeded maximum time and may have missing disassembly code information.
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    01:44:38API Interceptor3x Sleep call for process: WerFault.exe modified
                    01:45:08API Interceptor97505x Sleep call for process: yavascript.exe modified
                    06:44:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983 "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                    06:44:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983 "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    198.23.227.212ZeaS4nUxg4.exeGet hashmaliciousRemcosBrowse
                      documents-pdf.exeGet hashmaliciousRemcosBrowse
                        1kZ9olJiaG.exeGet hashmaliciousRemcosBrowse
                          ltlbVjClX9.exeGet hashmaliciousRemcosBrowse
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AS-COLOCROSSINGUSNew_Order_#070824_Order_November-2024_.exeGet hashmaliciousRemcosBrowse
                            • 198.46.178.148
                            ZeaS4nUxg4.exeGet hashmaliciousRemcosBrowse
                            • 198.23.227.212
                            6Ctc0o7vhqKgjU7.exeGet hashmaliciousRemcosBrowse
                            • 192.3.64.152
                            bestgreetingwithbestthingsevermadewithgreatthigns.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                            • 104.168.7.52
                            orden de compra_.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                            • 23.95.60.88
                            Scan docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                            • 104.168.7.52
                            bin.x86.elfGet hashmaliciousMiraiBrowse
                            • 198.12.107.126
                            givingbestthignswithgreatheatcaptialthingstodo.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                            • 107.173.4.23
                            Payment Advice-Ref[A22D4YdWsbE4].xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                            • 107.173.4.23
                            ORDER-24110394.PDF.jsGet hashmaliciousUnknownBrowse
                            • 192.3.220.6
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9229496009289199
                            Encrypted:false
                            SSDEEP:96:GfmZP7MOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnZ:LMOE056rojsAZrErzuiFZZ24IO8ns
                            MD5:9BFB999AF820ED7F4E410382B164BDCA
                            SHA1:990C78753F4D2D33F5A08C39521C921DC7385983
                            SHA-256:06E4B53A458A7B14D71B9036270F0E91AC6B649683D5640A09B312C06FDC7F44
                            SHA-512:E222631D4F753500ED7BFE64022EC71EB690ED988BA2472C737C0B8AC90EB50F11F3D93BB875752E5091E64266EC0D66B6C88DCF014A38C61F3ACEAA02FC4009
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.6.4.6.3.3.8.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.c.6.7.2.0.1.4.-.c.7.1.e.-.4.3.0.9.-.a.4.0.2.-.b.e.6.5.6.d.a.0.e.b.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.b.c.2.b.1.2.f.-.2.2.3.a.-.4.4.4.9.-.a.2.6.5.-.b.d.3.e.2.b.9.d.4.0.8.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9157610547581695
                            Encrypted:false
                            SSDEEP:96:mA7lOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnmET7:/lOE056rojsAZrEFzuiFZZ24IO8ns
                            MD5:9F0CC55C172C13E2646C6A849C41E2DA
                            SHA1:0A95FCFB4D66BE7255C44E33EA4463CF0AD06E21
                            SHA-256:533D70595AB73290DA7BF69ED7AB9624D5F7AD7BA90A845C4D3DA412004BFFE8
                            SHA-512:9879CD8641F168A860BDB15D6D3C5775FDFCBE36C23278004527656273463A788AF706B3774E4A5BCDD753610AE2911072AB68A061E5AD21B5854C4B02C5666E
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.1.3.4.2.5.4.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.d.1.c.e.1.8.4.-.7.a.2.b.-.4.3.4.a.-.b.1.f.4.-.7.1.b.e.1.0.1.3.4.a.9.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.7.d.7.a.d.e.-.9.1.d.4.-.4.9.9.b.-.8.a.d.5.-.9.c.9.f.c.3.7.8.9.e.b.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9228511366751188
                            Encrypted:false
                            SSDEEP:96:kli5ay7FOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOP:k8FOE056rojsAZrErzuiFZZ24IO8ns
                            MD5:BB2DF46FB4AE32DA39ED5ADC6A7B4955
                            SHA1:55BB66598638CE1B516A58550079E13423CD77F1
                            SHA-256:4EBB3E1754F9DB84438C65E0BD537E28DECB0B77C8478526ADB8779B3EBAB38C
                            SHA-512:E5FFEAD94992BBC59C9BE3BFBD8EB5010245CA295768563764ECD2F5A66D063BDE5C5A445DEBE39F77CD75614D788D882A8E079B3CA51530F5B27C439711CD2E
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.5.6.5.2.1.9.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.7.2.9.b.3.f.1.-.2.5.0.6.-.4.b.2.f.-.8.7.5.c.-.8.8.0.1.e.5.9.2.2.e.1.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.2.0.d.a.2.8.-.3.4.d.c.-.4.3.9.5.-.8.2.d.e.-.a.a.6.e.a.3.c.0.e.d.0.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:modified
                            Size (bytes):65536
                            Entropy (8bit):0.9231589934898112
                            Encrypted:false
                            SSDEEP:96:PLB7lOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnmEh:DNlOE056rojsAZrErzuiFZZ24IO8ns
                            MD5:B28529556E77182327CDB34E12D8A998
                            SHA1:7837898E334A4B2149BFA8C4BB7F04D4DEBF7C1E
                            SHA-256:4BBC408B498D0BBB55195C0F8C33836771BA102F80AB828FF75A68E2C5FCDBD1
                            SHA-512:AFFCCFBDB723F1EE45E62532F9DF18D41BE60E624402956EEED5C125DDB0621156ECB9EEC47BE4F938A2A22D5102A6769CA93B14A9D65FA2BBB75B1909BFB13B
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.2.2.0.2.8.6.6.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.6.0.8.c.9.b.5.-.b.5.f.a.-.4.8.8.f.-.b.c.2.e.-.e.7.4.e.9.b.4.7.6.6.3.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.d.7.9.b.c.d.3.-.4.8.d.f.-.4.d.7.c.-.9.e.0.4.-.6.1.0.b.9.d.0.d.8.8.d.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9228808727658576
                            Encrypted:false
                            SSDEEP:96:Q88xj7ZOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOno:IxHZOE056rojsAZrErzuiFZZ24IO8ns
                            MD5:DA8D9931D01D4671645F9C7F4447361E
                            SHA1:A2316DF2B4493BEE4879538A1771B1EC231C42A5
                            SHA-256:FA33C48B3746A0EAC3184D05DF1B3AD44ED6E306C1E1F0D1A3BE5387F14A4048
                            SHA-512:E56F454167FE8799211CB5B3EC9ECBD864A048576962D9F66F1B5529FD50FBD8D58A724046C4DDFF643DD74F430F1923A1BB1D82D6E94DFE215BA8FCC9591AC1
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.3.5.2.0.1.6.8.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.9.9.4.b.b.1.-.e.4.e.4.-.4.8.b.f.-.9.7.f.3.-.d.6.b.4.b.3.4.1.a.e.d.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.0.0.4.c.a.9.-.1.1.8.c.-.4.2.1.a.-.b.9.3.a.-.b.d.0.3.f.2.6.7.f.4.d.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9159681568563313
                            Encrypted:false
                            SSDEEP:96:lY7GOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnmET7:kGOE056rojsAZrEFzuiFZZ24IO8ns
                            MD5:933F8DD93DE95423C84006E33B5963D6
                            SHA1:8ED451A2567B2A2B089874618D260F7BEB4ADF36
                            SHA-256:08BE6A989406BC50B83C60A73B117DAEB2E224BE472F93144B90A1251E29EF61
                            SHA-512:4F60D3D675B58C1D1EFC7CF090E973FE80D9008D5D0155F328C134ACA67F5E1801D745EF4CFE73824E28F1436BC10C660F241A9CB6DDB8C11DB53EF9856FCF8A
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.4.9.5.7.5.2.6.5.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.2.9.f.9.2.b.a.-.1.e.1.7.-.4.a.b.6.-.9.2.a.0.-.5.0.6.e.5.2.9.5.5.4.0.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.c.5.c.1.8.9.-.f.e.e.5.-.4.f.a.7.-.b.a.e.0.-.d.0.4.8.d.a.4.2.c.2.e.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9231359929538794
                            Encrypted:false
                            SSDEEP:96:lNmLW7aOs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnZ:YsaOE056rojsAZrErzuiFZZ24IO8ns
                            MD5:6B34B51B4494DE06647BA5D10936D493
                            SHA1:BC6FD23CE2348D13645FD7127C0ED8EFA8FC314B
                            SHA-256:CCF9247D65561656FA13FE7BE301FF6CF58E15A6151C120609AA3E7DC5AA31BA
                            SHA-512:608128E70EFAFD11F8BBDC3371D297F8275138CBC5BA963681875204F0F67054A0B867394545FC22DB3CB79E9C8E00866C5A17BF4682A798213F45937D9FFA01
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.4.3.7.9.1.7.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.6.a.8.8.c.9.a.-.8.9.a.e.-.4.2.b.8.-.b.b.6.8.-.b.2.3.0.f.4.2.0.1.7.c.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.8.5.b.8.b.0.-.5.7.8.9.-.4.4.c.7.-.9.d.9.e.-.a.d.c.3.6.3.d.5.8.6.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0024636444353408
                            Encrypted:false
                            SSDEEP:192:3h1pOF0vq7fjsAZrEbedzuiF+Z24IO8ns:3Dwmvq7fjjzuiF+Y4IO8n
                            MD5:B510BABC4A6476884FE267EEA1DA623E
                            SHA1:ED4C758890567B3863B03301AC3EAAECE2E9B3F3
                            SHA-256:59A82965FB92A935BC9EE7CD58DBE5021DC627F7AEE668B38065C7E6D14300C7
                            SHA-512:76F465B776EAAD4B5F72F5E9ED3666C3D98046576E5C5A3D8A4C6D2E47ACA3D3351850B4C35078CE5A710935ACD17BA78F9EC6B2D1851EFDF25ACFAB2C6CC084
                            Malicious:true
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.5.8.7.5.3.6.8.3.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.3.4.9.0.6.0.2.0.6.8.0.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.5.f.b.3.c.7.-.e.1.7.5.-.4.6.1.7.-.a.1.7.f.-.0.f.a.0.e.1.3.5.0.5.0.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.f.f.5.5.2.5.-.a.1.5.a.-.4.d.9.a.-.9.8.a.f.-.9.8.7.d.1.3.a.c.2.9.2.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.u.j.U.X.O.4.2.R.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.2.5.a.d.-.1.e.4.4.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.7.1.0.7.e.6.3.f.d.6.6.1.a.c.3.9.5.0.0.e.6.d.0.3.e.0.0.9.1.3.7.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.N.u.j.U.X.O.4.2.R.g...e.x.e.....T.a.r.g.e.t.A.p.p.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8913709651418861
                            Encrypted:false
                            SSDEEP:192:uhE0JsAnbcAnjsAZrbrzuiF+Z24IO8z8:uh/JsAnbcAnj7zuiF+Y4IO8z
                            MD5:634015FCD8DB250A60D2F2692BB5D42B
                            SHA1:4702EA51313121331706F9AEA9037F9CE45D9B49
                            SHA-256:D59CF599CB2093428CACB41F76FDF294C8AAC050739B26FF648A9F4AFC1676EB
                            SHA-512:04596E66A00D63A7179640F44C64E2F5CE87308F3AF3EF49C20739ADDDE2F1AA9C7AE4DC4096A6698F07DD806849ED0C16A46DC5D63C57627FA090214390D468
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.2.5.4.9.2.1.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.3.8.a.8.0.c.-.6.d.9.9.-.4.6.3.4.-.b.9.0.c.-.7.7.9.2.e.d.2.5.b.0.f.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.3.1.e.a.b.2.7.-.c.5.3.4.-.4.b.b.3.-.8.3.0.7.-.d.b.f.6.0.a.5.7.e.1.a.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.f.5.c.-.7.e.4.c.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8917615869138859
                            Encrypted:false
                            SSDEEP:96:SvqoXxus1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnmg:S5BuE056rIjsAZrbrzuiF+Z24IO8z8
                            MD5:FA25BF8A6897FB02DBBC7064C0F90F50
                            SHA1:A001BA304E280463A479E7E357FBA15A3094D127
                            SHA-256:3FEDEBE8B5D0A5CF9F660C70BECB3BE3E429576A21190E7D9CCD61A387DECD81
                            SHA-512:C7E675E96358AEDC2A8F97DBBD459A6706DDC75F7835DFB908DB15743FE4D10A9A5F933495F9B5079949246720A2F01CE27AA4767891885051D3CC46A4E4EE0B
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.7.9.6.2.2.3.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.b.6.d.5.2.4.b.-.f.3.3.a.-.4.8.c.c.-.a.0.1.f.-.2.2.0.b.4.c.6.0.3.1.1.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.c.8.0.0.5.7.-.e.3.2.e.-.4.3.f.d.-.9.c.4.f.-.5.2.9.5.f.4.0.8.6.1.4.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.f.5.c.-.7.e.4.c.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8639758561005526
                            Encrypted:false
                            SSDEEP:96:iQxNYxous1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnm:i0NOxE056rIjsAZr0zuiF+Z24IO8z8
                            MD5:D483CC22A2E364C02869A2C7E23F8F33
                            SHA1:31B8623A6C67D81B21A489211DA4B2B1FCB116A0
                            SHA-256:F80690C7D48706A0E415CD64FC223FCE534420ACCD0DBF26585F7325CB0FF612
                            SHA-512:F419BFC1A20A6FB53505315921C456B148611EF58E35F5705C105B62239EEC8C12431D7515AFCF9AC53FADA62F8DE7E48F7A3643EE838B0C6E80ED72CA5BFC6B
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.6.5.7.2.0.5.5.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.d.5.6.0.8.a.-.3.6.e.0.-.4.3.1.c.-.9.d.8.f.-.f.a.f.2.3.6.7.4.3.f.3.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.5.a.1.6.d.8.3.-.c.b.0.c.-.4.c.d.f.-.8.b.7.b.-.8.8.4.5.b.8.1.9.a.e.6.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.f.5.c.-.7.e.4.c.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8709042488073596
                            Encrypted:false
                            SSDEEP:96:eALBxXs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnmEP:brXE056rIjsAZrbzuiF+Z24IO8z8
                            MD5:FCEED9C147977A9E22B2F17C4097684A
                            SHA1:52A86ACBB39CEBEA890B3BC88468E42FD6F71352
                            SHA-256:2FF9F54E8A562C0EA8B57419AED3E920E74160B088E47027DE1B7AB8264598A7
                            SHA-512:717E1A1AB7DF468686EB9222686383B786D2D3C77B88E3E158492C31E7D2FE2440DF8F096FE6BC3597DAFD06D8EC973619418CB8ADE46CBA32D4F0B8AEAEDA79
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.0.0.9.8.0.5.3.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.2.d.b.e.8.4.-.2.a.e.1.-.4.5.7.a.-.9.b.d.2.-.6.8.e.2.3.d.5.9.9.e.e.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.0.f.8.0.0.5.c.-.6.1.9.a.-.4.4.1.d.-.a.e.5.2.-.2.f.2.3.0.5.f.6.d.b.8.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.f.5.c.-.7.e.4.c.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.891540547190811
                            Encrypted:false
                            SSDEEP:96:GKxUs1h/EyCf/QXIDcQnc6rCcEhcw3rz+HbHg/wWGTf3hOycoqzIPtZrXOnmETki:dUE056rIjsAZrbrzuiF+Z24IO8z8
                            MD5:916C25007E8078908F888CE3D862410F
                            SHA1:98FF7A779917FF9BACD160833E4D5AF81F553B90
                            SHA-256:9FB6E4515D3B445C2C5036ECF6E0084643F7DA09D1678A0CEC479388FF8768CE
                            SHA-512:26F00D4C76DDA3B9D6BB2E6C0510ECDDAE92344BD59495244D5FC3DC729FBCDBF2BCF0DB386653A473E885599C7DBB99E33C5FCB803879963D68E8A9330CFA88
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.5.3.3.5.1.0.6.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.4.2.e.c.0.9.1.-.f.b.f.2.-.4.9.3.7.-.a.8.5.9.-.f.7.5.6.3.0.4.a.9.d.d.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.8.7.8.9.f.5.e.-.2.d.6.e.-.4.d.3.8.-.9.c.c.2.-.b.f.6.0.a.5.3.4.5.a.2.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.f.5.c.-.7.e.4.c.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8915203632334437
                            Encrypted:false
                            SSDEEP:192:nD3E0JsAnbcAnjsAZrbrzuiF+Z24IO8z8:nD3/JsAnbcAnj7zuiF+Y4IO8z
                            MD5:45AE28ABDEAA8FD29BA5E357BF09FED2
                            SHA1:2E39374E531AEA2B3541A28AAB3C85BD6B4306DC
                            SHA-256:5B5BD525AE92C5FE78FA243CEC646AA3609D2CF55B429D0EF4F2C935BC55902F
                            SHA-512:F464776C9F0E8546BCD3BDAB9C3067A06CE3DFA7E96BE12D528DCB1EB06781E787397549A9CCCBD54BD49849F01A42855AC4253C0C16CC910DA6C36E22AC7947
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.6.4.6.1.2.6.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.8.1.8.9.3.f.-.9.7.2.d.-.4.f.8.5.-.b.e.2.c.-.e.5.0.5.6.9.f.7.8.3.8.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.1.5.c.8.f.f.4.-.f.5.d.0.-.4.9.6.4.-.b.0.1.e.-.0.6.e.2.4.3.2.a.d.c.5.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.f.5.c.-.7.e.4.c.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8495940169008243
                            Encrypted:false
                            SSDEEP:96:YxuusxQs1h/H7if2bQXIDcQmc6BcEocw39+HbHg7PB6HeaOy1oVazWtZrwnVfEo6:Bu6QF0YFi+jC3ZrqzuiF+Z24IO8z8
                            MD5:8D098BFFC48434327DA7FE229771C812
                            SHA1:7787ECAB817F69294054E7D4BD26E1C5A4E5E83D
                            SHA-256:25E4BB657904E7810FC45F13E182999226B5AB0D74587F8F6059B10CEEFF3C9E
                            SHA-512:810B7F28579813A63C197D3E6AC2F21062F78D67D1FEC8136E5A702EDA23D4DEA12E980C529E7FB40A8A8EF21195B065D6E0276D67B53D004EEDCA006778E8AA
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.6.7.6.5.4.5.0.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.3.4.9.0.6.9.6.5.4.4.9.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.d.4.9.3.6.2.8.-.3.7.6.d.-.4.6.a.7.-.8.4.5.c.-.6.4.a.c.7.1.5.e.6.4.d.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.0.a.7.2.5.b.-.0.a.5.f.-.4.b.1.6.-.a.8.6.c.-.a.d.e.7.c.4.4.b.5.c.d.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.6.c.-.0.0.0.1.-.0.0.1.4.-.2.9.9.0.-.1.0.4.d.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8498821467647186
                            Encrypted:false
                            SSDEEP:96:reHG5lxls1h/H7if2bQXIDcQmc6BcEocw39+HbHg7PB6HeaOy1oVazWtZrwnVfEL:iqlF0YFi+jC3ZrqzuiF+Z24IO8z8
                            MD5:7AF45DE04B1342DD1D3659D452FF1DC1
                            SHA1:EDF07D29CA81421027E9C6CB8BBAF5AFF560719E
                            SHA-256:E446670569BCD7D681957F89764C22AC5E5D3E9E4B977FE411398E67C197467D
                            SHA-512:276A3697A65B4A91921732376EC5B76E2F0FB93A5FD12925A6CB00D13C5F3A3D89E8810A6E0D0DEB1928A004F8BAEB8D4D26B5E20EEB3FDD6FF70D083E76C554
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.4.1.4.8.6.3.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.3.4.9.0.7.5.8.5.1.7.6.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.7.4.c.9.a.a.5.-.5.8.6.0.-.4.5.5.0.-.9.8.8.d.-.c.6.0.7.7.f.d.a.c.d.7.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.9.d.c.4.9.9.-.e.f.e.8.-.4.2.e.3.-.a.5.7.c.-.6.8.5.4.6.3.8.f.d.6.5.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.4.c.-.0.0.0.1.-.0.0.1.4.-.f.6.4.6.-.d.4.5.1.1.7.3.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.5.f.d.b.3.3.1.8.b.0.4.1.5.0.6.c.9.9.5.7.b.4.2.6.e.5.f.f.e.7.9.7.a.5.7.c.7.f.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:19 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):37744
                            Entropy (8bit):2.539773061594819
                            Encrypted:false
                            SSDEEP:192:HSpXWHXy9d/dfEXHeOLXLt2JQp9rpmeO4/rwp4AXypXUcQcke/LyWjD8e:yr9d/FiZXrrplzmgHQGge
                            MD5:8CC47BF4D49A96EED84B1CB29BACB3B1
                            SHA1:42C33EE8F8A2FB2A4E0FAD5932F8EC9A7344BA4D
                            SHA-256:27D8D1AD08167EE9BF186046484CF8CD2D5439A62EDE7735515F76ECDCA0CEB9
                            SHA-512:590EE99ADA56C6CFF585D6B3E471B49B83231188054256B2880F624C08A1BFA1A4FDF5967F2811F843D800ABE272B2703AC6E5D4304510651187BE4C3A2DC3DC
                            Malicious:false
                            Preview:MDMP..a..... .......C.+g............4...............<.......t....-..........T.......8...........T...........H1..(b....................... ..............................................................................eJ......d!......GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8330
                            Entropy (8bit):3.699176047333186
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEN6z6Y9dSU3OmgmfHsMpDj89becsfKqm:R6lXJm6z6YnSU3OmgmfH2evfe
                            MD5:68D204240FE58AA44B1A1BB208E03669
                            SHA1:4169C2A0D50A0898D4AE6B70F5AC7130C38C01DC
                            SHA-256:CDF1B02D17E0BE2D6D78202348519229576BB9C044B3FA77426DD3FD29E785B0
                            SHA-512:1F5F21C487FFF2A189D7B08F70EDC0E26E743E7A2979A1744502C58BA1D519C912552DDDD9BF2D4C274896BEFA31A50E6FC190F1B7ABBF3504837EFAA4F48ED9
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4579
                            Entropy (8bit):4.483062462439202
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYKPYm8M4JQXbXmFYP8++q87XwJwP2U5Ubd:uIjf6I79i47VzSJ/+nWxibd
                            MD5:81C35CCF651E0463D33188F77FA1D45F
                            SHA1:1F10F5B914BE93B4AD5BF26D1DA9732A18C1EF81
                            SHA-256:745E9DA615E74B47173A840F049AC955EDAF8ED1C19656A487C007217D618F22
                            SHA-512:8AD4A4D9546579200B9C9AFE4BC484AC21777BD0FA7314B846C1C131A898F5D0868A73F90A5E8B25C6DC4A90EF68F04A8DEEB70ACB348BE430EAE2D877FFBB6B
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:14 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):94238
                            Entropy (8bit):2.0252539710460082
                            Encrypted:false
                            SSDEEP:384:k4ep8kwebe7RGX4yNqjasIdKxwczBeJfhgnx/ZFZEhU8hF84hghRRhx7xhhBRhhB:k4emk7begX4yNqencVWhacTg
                            MD5:9E46F90AD43FB5AC0F91FD9865A68C2A
                            SHA1:6532853C4B27A9B689F1F01DC61D584D69FEC815
                            SHA-256:883E7B3FEF0204A353258C6DF4CDC31857A79EB7FC90BD79DE0DD58BCCE899D2
                            SHA-512:3CE2ABCBF21907406D77F6AA0BD6F1DF71C540D3FCD15630F50C552B8B4D12CCAACAE7A2EF8E615B73BDA15D7AA80DD64DC8D648827069774F6672D70E42FDB8
                            Malicious:false
                            Preview:MDMP..a..... .......>.+g........................l................B..........T.......8...........T............+..vD..........X...........D...............................................................................eJ..............GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:27 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):58270
                            Entropy (8bit):2.1368835201765526
                            Encrypted:false
                            SSDEEP:384:oiHb7hRgFnFhonvZnTDwsmP79ZIhyPvrjZ+GX:ooJ+nFhovd8tT9t/Z+GX
                            MD5:EA46DBF5B6B4A0E1A396B45F7348E0F8
                            SHA1:66E71929D1985215684D0B014F2D12E6C39448D0
                            SHA-256:4C563D06B9EC17F4D5700E2B303F4087CA01DDA7584D8189B6A1E21039B1E2A7
                            SHA-512:14DFC8ADBCE5042A300F31F965A081A6D1E4908E579699D0E0371280D86089302753B6EC0C86566E7F8E12C48193B15E5C3B348ADDEF85D41F4B5EFA6323C41C
                            Malicious:false
                            Preview:MDMP..a..... .......K.+g........................................./..........T.......8...........T.......................................................................................................................eJ...... .......GenuineIntel............T.......P...@.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8340
                            Entropy (8bit):3.6960698665497147
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJmI6G6Y9vSUpRgmfgDcpBR489bzHsf94Rm:R6lXJR6G6YlSUpRgmfgDYFzMf5
                            MD5:6A0A4169D8FF851C4F5AF81EA7139D6E
                            SHA1:A4579BC2704F7DB0F5E92A9C0D657F89A2B14B3A
                            SHA-256:5FACE5C416B1AF1660F5A6DDAE0682E7DC7B20B3A8A939DB807E751C6719EA13
                            SHA-512:0E7D3DDEA4A0FEDF46A6ACAE45A790D831E56820E92E95B03228673886888EFBF587588C24A06CAFA0D13D85E778E288D7D7BC9B7EFEC2E8C2DC28EC38B8979A
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.4621729399631045
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYe4Ym8M4JSHFZw+q84t8Tpqid:uIjf6I79i47VP1J1x8Tpqid
                            MD5:C44285DA3C8E7489EC00EDBFF383BB50
                            SHA1:92731E7B9C97E6D51EC65AA6F402772485B9C928
                            SHA-256:6069F49BE4B02527A66088834048B12C37D05129AD7E5EDDFD7F39668F66058B
                            SHA-512:9AC78D70BF4D1DF85F3464D8674512E6EC9BB1F89E39DF79DD1A6E302904D79A86AD8F3AF6640342988EA885DF2AF8E675184504E9F6C5482141BEA8EE333692
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:28 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):23466
                            Entropy (8bit):2.4349972688071087
                            Encrypted:false
                            SSDEEP:192:8qnBVXh1ErXehMnOPXMRpz3wIkYjP/ioD:9BJE6hMOI35FD
                            MD5:A15315B1AC15208C22D554A91D70F8E9
                            SHA1:6890A442A991DB99149CB70B82A745C35D3DBB2C
                            SHA-256:50B541497F5715E4A1A7170C1134E5BA2D84902E1C811281D97BAC976C2E436F
                            SHA-512:4D88C57E95AC22073315E4F4644DD5BCA63FCD7C3058FA7B3533800A270B2516B60C09BE293B2AA83B9B0FABA70EFC974424DB3B1A856C1B0A22707E3BB035C8
                            Malicious:false
                            Preview:MDMP..a..... .......L.+g............4...........\...<.......d...|!..........T.......8...........T................F......................................................................................................eJ..............GenuineIntel............T.......l...A.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8324
                            Entropy (8bit):3.6947671573154373
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJxR60U6Ykb6LgmfnBpDt89bkysf63Mm:R6lXJ36P6YQ6Lgmfn+kxfI
                            MD5:E58A0474EFE60EDF2D9511714FD613C0
                            SHA1:2BE61D1DB3EF201009DB9CAE5F1EA6D2DD9CF7A7
                            SHA-256:19957D31E384C49F41F1787E12C7E1B39FDC68FBDF882DA88EA8958553F56300
                            SHA-512:D2369E666354B60BAE3727562850F1A4BA34542984136E59DB8F9ACA15C7BB4EDB7619C5BCD8D0ACAF4B2E8600127C842FF65095EF86C7A08B7D7CDB87EDB8C4
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.4.4.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4579
                            Entropy (8bit):4.439331467196244
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYWYm8M4JS+FjZ+q8UCf8TpqSd:uIjf6I79i47VWJ1q8TpqSd
                            MD5:96E589CA4855B77BE3DC88836F0A2409
                            SHA1:B8788F79D8BA621BC30C606A331EC7FF5E1F98A2
                            SHA-256:EE469F7E866E05F07B7B85A1D14423CC4AD4E9CAE9682D8031B973547D75B3FF
                            SHA-512:0506F8EC54937397E69951F6A65EDC48F7A9686B30D9EAA3BE938E0350EEEAB00E4B7D1F1689BA6BB15E679B23DCD6D071C865CBF861BA7DAE7C4C73FA0BBD89
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.7040479826064683
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEg6N86Y9CSUD2wkgmfADcpBt89bLcsfG5m:R6lXJb6N86Y4SUD2wkgmfADBLvfJ
                            MD5:13B2FDCF1F92FE45BF578CB42979110B
                            SHA1:19D3D6125455D99D1805ECD3377CE193AD2B5C39
                            SHA-256:5386811A0584E9A2F9669F184998110B671447974BD755D8912D693871DF6346
                            SHA-512:D3EF5F08DB6B2EE7D578EDEAF9283379ED5B6FE340C5684454CDE9A240D4EE356B2E12DB8E91E45F0CEFDC0884E6D6E621926B8E50442767C604C69DFE439609
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:30 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):57106
                            Entropy (8bit):2.139907710246466
                            Encrypted:false
                            SSDEEP:192:mgiXqtXBBlycuOLXtiffxtQ9q4sf/Oxw6ZnT7NdLMIrhnyQSzyyRx3O3mbDyU:TVBly+hiffssXGvZnNdLMChyPpRxy/U
                            MD5:6E84AF5C14C43D2F984C2A77B7472A1B
                            SHA1:58D7A46A98A0F30B0DD59B1F4E19FB9E949C15E6
                            SHA-256:B62211045E4C318EAD425184D5FAEFE5FFD9B882212DC27A8694A01F87F7AEB3
                            SHA-512:9F5F7D346D6EB174ED91A66224F6D4DEF13B5D40897D9D9430EEEB31947E721094D1DCDA0A24CFA667232964AEB7DFDEFC3A0EFE8C23E6DC493246B4F0FD8EEA
                            Malicious:false
                            Preview:MDMP..a..... .......N.+g........................................./..........T.......8...........T...............".......................................................................................................eJ..............GenuineIntel............T.......P...@.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.493622107391939
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VYa0Ym8M4JQXbHFc2Do+q87EUwP2U5Ubd:uIjflI79i47VbBJ0ooWxibd
                            MD5:5DFC6B029771328B238694F20C3A818A
                            SHA1:AD4CD74E8AE8D4EC64BD45D71CEF7D87FB8CA5BA
                            SHA-256:4071555847E7EB95B95BB2E41ED14DF4EBB4DB618385B06324374E65C0DD8632
                            SHA-512:C57C4DC1F52EE3B1376F7247D93E417DF850BC89614C053D44A68797AEF5BEB63BD8C161E3859E36711CC24C10A9E7544E333E362B3C384404DA60B892939DE4
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.6942267650231675
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJmi6+6Y9RSUB8gmfgDcpBv89bNHsf0dcvm:R6lXJb6+6YrSUB8gmfgDbNMfM5
                            MD5:B0F7602F9B794DF67DB9FB83403120C7
                            SHA1:1A4CF620DE8724C1C7E2545B61CD7FF30ADE44CB
                            SHA-256:23508D18C166D843084538CB23556CE749CAFD112B13A10BAE6DEED85758E541
                            SHA-512:92361F4AB737FEE3C503D70AE2E16C3D824C654D6942FEC67FBFCB1EC6B5ADBACE12EC7CD1740E7179E193156B93F5337706EFDDBC1D0F49A357A9E1BE723C7D
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.46019647449571
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYkYm8M4JSHFmo+q84t8Tpqid:uIjf6I79i47VAJxox8Tpqid
                            MD5:457B3E48CE6585DF15DA6F0802AF0636
                            SHA1:00967EE2F97CD75F7DB69CFFC939AE78A8F71724
                            SHA-256:B640B14701D99C657F6C46BC0D16598CB1BE62917BA50D8593672E67449AF0D5
                            SHA-512:7EEAAD0D1914468F8E1C5AA6AE6695D0BB9D3C4B97A434FE3476E989C578BCC18865C302D4BEF16A3C62E80C31174798FACF83D2C4D63EDE15F9F71BDF8F7C14
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:32 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):56176
                            Entropy (8bit):2.13415275205976
                            Encrypted:false
                            SSDEEP:384:oAvBufK2c0hgIsrvw9uCZnBhyPvPeZtDp:VvSV7hgI0whoU
                            MD5:2EC7E499C052AF95B4F853AEC2E6573E
                            SHA1:9DF46680BCFB06B7B14CA259031D8E9CC0272889
                            SHA-256:6105E2B8182C54DD5716D11C58570F2BAF4563C0F10951E872C0E064F44102DA
                            SHA-512:C26F963B41928EE2F1B4DEBCD630DFC34848E103F6A4A81586A43B9C976F8B991C3BE2B198C5945D09232458C51AE02221635C0E06DA3EB68F65A58FDB377834
                            Malicious:false
                            Preview:MDMP..a..... .......P.+g........................P...............(1..........T.......8...........T...............h...........L...........8...............................................................................eJ..............GenuineIntel............T.......P...@.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.6954863736013794
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJmQ6P6Y9+SUBCgmfgDaAjADpBa89b2HsfjSm:R6lXJJ6P6YUSUBCgmfgDaAjA/2MfH
                            MD5:A6979125F457E6287F3BC8E8BA2F9479
                            SHA1:6097DF304AC5F7AA0EDFD7A113C8346D2221A156
                            SHA-256:3B3A0AD5440EDCDBE4AF919481CC6810CAC680894D3CC2CDAAD1908A5E9E960D
                            SHA-512:3A700783AB3E08AA9E9743C9F4E22012FAA6C0AE21B1FF5C371A411FF1ECC8D63C2919D058D3C2B8BDA20A64703FE0A40DAB2565911CAFEC5D0BFDC4C062A55F
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.460573900514576
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYlYm8M4JSHFfFZHA+q84t8Tpqid:uIjf6I79i47V1JYAx8Tpqid
                            MD5:FC6EA7E6FC7D0978F66DC020F16291FC
                            SHA1:BA9AFC22189A64429B703D69F0732AF17519DE13
                            SHA-256:FD31826F9CA5D5841BAFDC7BC42849130B6C324CECC1188AB83F6C867BC541FD
                            SHA-512:AA24CB54E9C0AA06BC4E7489EF3C837457A9FAD5354215BF3AB0208F4E4BF4968BC51F57C010C12303B28F82FDD0F28FE4B4DDD88097AA42D57FECBB02DF0E36
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:35 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):23646
                            Entropy (8bit):2.434274175720532
                            Encrypted:false
                            SSDEEP:192:XqcjlVXh1ErXehMZpOPXN9pPpqG9Sp56/e:6EJE6hMZsFrrUae
                            MD5:A97A4628E2FBC40CDEA5392E67DA2A98
                            SHA1:78F647D8094E75F063D8EC84627E997D464D10E1
                            SHA-256:6112B6D99801E8A3DEE3CB646BE0E52671F03307D06FFD0A67F15C20DBAE21CE
                            SHA-512:B42C0288C9D987AB32534A1764AFC8DB522A062D865FF98E6CA7031B348551A414CFB0F3E9B22E8A769623FCF45927E14B88D94F8CD81C317338DDC70B803CC5
                            Malicious:false
                            Preview:MDMP..a..... .......S.+g............4...........\...<.......d...|!..........T.......8...........T...........(...6G......................................................................................................eJ..............GenuineIntel............T.......L...I.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:35 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):57290
                            Entropy (8bit):2.133955844927157
                            Encrypted:false
                            SSDEEP:192:XXaXd1beXiBufKUorXTOLXtgQpxtQ9qbxwHss80Zn4Rh6yQSRyNOXNPP6Zn:nAvBufKUC6hgQp5Ls80ZnOhvPkONk
                            MD5:32F8D6C803E89164F9E945585E8C3335
                            SHA1:C3DA2B09EFD65E1E4FBCEA947200F1B953242E80
                            SHA-256:E4C364212E2D44D5FB40B823599A5043DF941EC5DB8491691AEA65EB6510E0C5
                            SHA-512:8192E3AC3ED2D0F4B76F63BB3B2B9F8980FD1EA9D171023EA3221405B7242E67B198A0ABA9B0EAB968AA2AB9B2438D6F2E942A6EB8DFE87852ABFE8398389201
                            Malicious:false
                            Preview:MDMP..a..... .......S.+g........................P...............(1..........T.......8...........T..............."...........L...........8...............................................................................eJ..............GenuineIntel............T.......P...@.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8328
                            Entropy (8bit):3.694445970764379
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJej2696Y9fLSUxxgmfnBpD189bgWsfNgm:R6lXJw2696YZSUxxgmfnWg1ff
                            MD5:D6C99D9A21CB3E85CCABDE80ADEAC11E
                            SHA1:7635B97F4D6135B38F3B8CE2EC3C7C4399C1A6CD
                            SHA-256:2C5CD01F2602D97F34226219FDCFA5A858BB34EDB80E4FDC3675DA9121C69864
                            SHA-512:423293052E48D4736400B4731F4F8519C52B50AF3CE8091465D377971E097E78972BECF67060D28E0414DC50B80536960D6C6BD72AAC868F11ADEC4EAA7A0F44
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.8.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4579
                            Entropy (8bit):4.443657599499349
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYuYm8M4JS+Fq+q8Uh8Tpql9d:uIjf6I79i47VGJCn8Tpql9d
                            MD5:80B79D4225835161E2F8F6BDBA1880AA
                            SHA1:5EED7C18F84F6869D607876FC36267771CB03C79
                            SHA-256:13E5BCD11F31B1E55E3A1AC9535AE4219A29C73EB74EDF6B4EA6DCD87FE28462
                            SHA-512:B2F92D4C34A1924C069FBF40C899C47237A17BF2E2BBE1E0893766481E8773F1B970C67643BC474C0148F671852F1F409D8871F84B330840E2BF989EEABF721F
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.6974662638052274
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJmf6cfiT6Y9RSUxxgmfgDcpBq89bgHsf3gm:R6lXJm6siT6Y7SUxxgmfgDYgMfV
                            MD5:F41D89176C22080F870957A1D37A308B
                            SHA1:190EA0F6C971EC8D45D660973F5A262986E75935
                            SHA-256:E85C9A71756E1396B885BE8AC9C67A492AFEE99417B62B23491FD2BB4595C36D
                            SHA-512:56B252F7CF1F5CA219625B411F5480B186F5F39D93007142B304470E5DECF09B548B21A53CC77F93F28DEE9F9E1B8F0FD22B87CC5C21263183D8B9B366E1926C
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.4617120040578655
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYQYm8M4JSHF7ZR+q84t8Tpqid:uIjf6I79i47VYJi7x8Tpqid
                            MD5:75F38ACA5387E82C490FD73ED8CA29C3
                            SHA1:ECFF0B87E1EA489772B69959A7B700A0F6653EF4
                            SHA-256:3A9592D489A91F7CCFB5488E197C208806290A4C6704A706522E952E031D6CDF
                            SHA-512:112F72C212825FEE60C9B9FFA058E54E8DC1559B0931A2E613F90A2F2B9FC6D6FF18D220DB3B0BAAA3178E15D9433198FA3B73CE895850908148E081249CE09D
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:36 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):56254
                            Entropy (8bit):2.1340376061995063
                            Encrypted:false
                            SSDEEP:192:EZaXd1beXiBufKIYOLXtgG7tQ9qbxwYsD/Gw1ZZnPlh6yQSRy6qfDKxSBY:0AvBufKIfhgGvsywvZnthvPfqg
                            MD5:D51903FDBA3BDA3C0023F1186557214F
                            SHA1:726108810BA7036B5E375647803F3481EA951B3C
                            SHA-256:6CBCF9B11FA0A5947BA9000D4AA0EE03886146DBCD7431A4BD0B0C8057FC4192
                            SHA-512:C1C213DF4BC8B48C96DE9D689AFA8336DA3511200886AB94173221A23C31C7969DFD6EDEBCABF7349F1DB2DDFEF04AC1542F8D01A975067E42CB5B9C1776E93D
                            Malicious:false
                            Preview:MDMP..a..... .......T.+g........................P...........t...(1..........T.......8...........T...........0...............L...........8...............................................................................eJ..............GenuineIntel............T.......P...@.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.6964090226428525
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJmv6xeiT6Y9YSUphgmfgDaAjADpBH89bbHsfUYJm:R6lXJ264iT6YSSUphgmfgDaAjA0bMfUb
                            MD5:045AA64A0356F39CAD341593AAC23B41
                            SHA1:F8CA1D847029B632246B84ECA3E30A3CD09071D9
                            SHA-256:538456168FD0ADF6D2C0962452B98FED0052FDD37C42457097551E5DE4BDBA0F
                            SHA-512:7EEA9140B39B658D7F4437ABBFE3BD36F7B13D1D0148A62BD22F627EBFDE88996B68E5E33B792B8D045378F6D6F95755094AC05647700F2F0E3DE7D9D3EF38F6
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.460397325810546
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYNYm8M4JSHFWO+q84t8Tpqid:uIjf6I79i47VJJgx8Tpqid
                            MD5:110557F42EB135589CAD64EB9BC449A2
                            SHA1:B1FE17BDD8DAD394BF90326D60DF5858A0B8A04B
                            SHA-256:762D56C34572467CD04084D6AD9D5B7385B7A85AFFB54A6F218D6FE51878F2BF
                            SHA-512:912911538457E49B129F98D74CD0C9371CC505F806963319FCBD9033A1CB18B6D272776DA74763FB86D1F46394B9697BFBE94B4F55BA8EA711866CA73FACB69A
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:38 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):57388
                            Entropy (8bit):2.134713427772631
                            Encrypted:false
                            SSDEEP:192:O12aXd1beXiBufKae2OLXtgDqxtQ9q1sf/DxwXZn6oAh6yQSRyw/8NwPLpZniE:/AvBufKaIhgDqBsHlCZnBAhvPh/JLniE
                            MD5:65FC32865BA47C06DD640593CCF0AC65
                            SHA1:E146A2E836096C574B00E93390A9046923276096
                            SHA-256:A7BAA587A7C5479E9149139204BD0E3324D683950F9040C94941A0096194810C
                            SHA-512:C08F798A706C29A7AF94B6457B155132F89D5F55389C9D3DEE54EDBD9A99E30032B684581814548A84D8A09DDAE42BC88B0216891871B6EB7BAB2440121882B4
                            Malicious:false
                            Preview:MDMP..a..... .......V.+g........................P...............(1..........T.......8...........T...............\...........L...........8...............................................................................eJ..............GenuineIntel............T.......P...@.+g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.695215562915752
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJmi6Zqs6Y97SUt3gmfgDcpBU89bFHsfdjXm:R6lXJL6v6YhSUt3gmfgDaFMfk
                            MD5:87ADB8093155BE69BBF34E824DB2686B
                            SHA1:2E634E38A76E83675F014337339F53EA7F2B4D8F
                            SHA-256:181F092A9C9E68DDE55C708DEAD73563A7F8B21694EB866AF3F9F7C318D87116
                            SHA-512:AC9E7A489751E091CE4DE18E34E0B02496077A9F67BC56C726BF559BA10AD835EF0E065BF45FCFBCA4F3A46952446549BD9DAB17A8DE7E1B1B00FE8A5CFE6C04
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.461767471342832
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs8Jg77aI9DiJWpW8VYhYm8M4JSHFNib+q84t8Tpqid:uIjf6I79i47VJJLx8Tpqid
                            MD5:4E7D4C00BB771EC474664C32E907DE6D
                            SHA1:ED0FCA1933E44810E8DC287395402A485F2F1AB2
                            SHA-256:2B642B332C94B6AE048487A43D5BEE008080E877FF39066517EE0E90FB0D8EF2
                            SHA-512:DAAC361E0EC70F71F6F694051972EBB1C20B959C50F8E2DD7807435B7714D587CD8D1E6A27E1D85D2985E8D9B5322A6E9DCFEA8C075DC2B7331E0D15D76FBA17
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575867" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.7046135098050925
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEN6Z6Y9TSUD2wkgmfADcpBB89b0csf7Gcm:R6lXJW6Z6YJSUD2wkgmfADl0vf7U
                            MD5:372D9F9B802795C07D6FA6BEDC3BC647
                            SHA1:EA5F2C2E0D901B5AD212C7D302368D481ABB7806
                            SHA-256:B94F8D5BAD98124EAEBCA2777B4D48A5FCD39BD7ADDEB456AD8A6CC1F7C3EC62
                            SHA-512:A30C607D8ECCAC053209ADE522E3058EEE1A4AAE56CB77D7B3211B64C42A40E83FBE9167B3DA3738B465E04FA8F79CE776C6900DE64A4C88BA1446422A78EF28
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:15 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):93814
                            Entropy (8bit):2.0354017607312813
                            Encrypted:false
                            SSDEEP:384:8o8kwebe7YUXWrHqs9fDmRzBeFfhgnwj5uxWjndOMlkkuWcscM8s6EzDJ3V:8fk7beVXWrHqUfCRWhDegd
                            MD5:C7F203FC51C4D561B4C953EEEEDB8455
                            SHA1:22392CAF9E887CD0F7B5B9DA0415015529E808F6
                            SHA-256:88C285A697B44A65B808E8C3DB08D6563E49DBB7524345A214CD4F55E7D83FE1
                            SHA-512:6D3C7BF324DE320D08718CEE1EA5C2C8825B574EEDE5F2F3D5745F00DACCD5E2D3656F97F03E68B0FC490E5CB76EBCFAF3C26DD9F8D48155164A9BD14C6E7626
                            Malicious:false
                            Preview:MDMP..a..... .......?.+g........................l...........$....B..........T.......8...........T............+...B..........X...........D...............................................................................eJ..............GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.703254000286866
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEY6M6Y9SSUD2wkgmfADcpB+89bCcsfD2m:R6lXJT6M6Y4SUD2wkgmfADcCvfL
                            MD5:830C3F7C6D878A4472162DEE75B1630B
                            SHA1:108DD5DBA438A54B7E730A164D0B084E54BC359F
                            SHA-256:997B9AEE9099DF3784D6C315FF8183166064C2CBBF34D423FFB1BDF7DB87C4D2
                            SHA-512:0C7E338EB77752C08EE65332AE94E4A07ECFB064449723F89F35A6E1565C32947749D01673745647F9EC640F04B15CD6D36E764733B742CAFBE7DD2FA67D59E3
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.49005569866045
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VYQnYm8M4JQXbHF6lo+q87EUwP2U5Ubd:uIjflI79i47VwJhooWxibd
                            MD5:E346B25487EE31064890C475AA22D8A2
                            SHA1:ABFBB27D590818B83A6B15BB85B7835F9B2375C6
                            SHA-256:0466C942DFDEA704B0B3F1A5C33A49C0D8E283DF5CF02B36531F1A019D62B3D7
                            SHA-512:977BF60B3BEA3D4A229C0CC36443870A7B6DD585BFC78B21E37FFA71F80F9F071A61BC4A14A90DC188BC836A5D3D2ABC17BE910238463CC7FE0656F58894E093
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.49172050393356
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VYfYm8M4JQXbHFk+q87EUwP2U5Ubd:uIjflI79i47VXJzoWxibd
                            MD5:9D2FC9FDD20B39B723B3A09DE32CAFDB
                            SHA1:E1A58B06F02301E7B8B78F434035CCADEF448098
                            SHA-256:7B6D70D50F32ED41E9D44FF871B2433919AFBA54D83D141A6BA395EEA90338E6
                            SHA-512:2C7E823E42E7294C8428814C1CD1BA472DE99FC5F5DD51A78544CEA5BF5025B297128D5EF2CD43A028BA2EBAD476843841467CAA9BC33CEB9F4701F544BBE151
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:16 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):102588
                            Entropy (8bit):2.225559794566618
                            Encrypted:false
                            SSDEEP:384:v8kwebe7J+X7I9Q4seHRBXP80fC1x6NzBeFfhgn8kOTqHdvaKdV:Ek7bed+XM9Q47xBXP8sWx61WhpqHhd
                            MD5:8A9AB7996DEF31E6C561DE67F05A02C4
                            SHA1:BB2F0736E032421320FBE8C3D63839F63237A96A
                            SHA-256:EA7752A53C95619BA2E86EA73ADEE8D2682994BE95507B35184A69E2B6B06562
                            SHA-512:68477CC215EBFD0258FA50A9DB55D61AEF85C4878A6FED90CEA927D39E99899622BDBAFD3DB6A0C2940B2204DE15C0F10151C3B04DB56546868CD2946917F0D1
                            Malicious:false
                            Preview:MDMP..a..... .......@.+g........................l................B..........T.......8...........T...........`-..\c..........X...........D...............................................................................eJ..............GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.701574213469684
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEsA6V6Y9+mSU6kDZgmfADcpBM89bZcsfcTm:R6lXJY6V6YVSU6kDZgmfADSZvf1
                            MD5:A6833B4A8C838C898BD404892EB7061D
                            SHA1:C908FD1C48625390F04A014CE2E1A3E575E52EC7
                            SHA-256:B007F2EB93A0902DB7DE33A8223D1979E24F5EA71D4CFF9E232FC772A8401B73
                            SHA-512:B633BBE813893B98966BFB2A592F9ED5C8256D0B52F6D5C839634F2F96ADF2E5B5AE3ECBE0E21AE466948BEB9E74690F727FF0B4567C3C571FD1820BC766400E
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.4921304823856225
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VYzYm8M4JQXbHFsQj+q87EUwP2U5Ubd:uIjflI79i47V7J+joWxibd
                            MD5:829F3C0F4F27CDA809F237F066534BE0
                            SHA1:DF51FD38A90735F6093CFE0142F37CB1BE3DA98D
                            SHA-256:3A92FE49F714DB38D7E9AB771915387CB205696E1681B04FF69BE970FB372538
                            SHA-512:A1AE69BD0BE2442DE08AEC8134B263A881FEEB517CAB5856CA124BFBABAFB4D5B31B9B3E8F332D7170AAA229C0009F4E692ED2B326DBEE713F2FFDAE389802DE
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:10 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):76116
                            Entropy (8bit):2.3589080486794485
                            Encrypted:false
                            SSDEEP:384:l5kCx4+OxsX8INfEvspq0u/n7Ckxe/hzrfhgfh056J/Rq:l5wJxsX8INIL0u/Wee57hkPT
                            MD5:802CB81CB2B366945E7F36A1C3C3917B
                            SHA1:BBB1F4C9C10CA4EDC0E4DD27410464D15E231912
                            SHA-256:511A796938AC73CE52556040AB458C14F24F7C22138620B36C9835C0385CE828
                            SHA-512:FA50C3C992C1980F87369EFA4DE397538BE974EE274478C0B8D136CC85B74318427F7DB0E6D8BE2355DCC8F1556E598CBA701C4E67D93454600F695BC299EDB2
                            Malicious:false
                            Preview:MDMP..a..... .......:.+g............$...............,...........^6..........T.......8...........T............*..<...........,...........................................................................................eJ..............GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.7015464758334526
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEj6Y6Y93SUe2nYgmfADcpBT89bvcsfdFm:R6lXJg6Y6YNSUe2nYgmfADnvvf+
                            MD5:FDA2D22FC626D055260229F06727DF75
                            SHA1:4A47701B5455F8D826B72AAC4D4C0A56F366D9E4
                            SHA-256:7FAF2A8472F47ED7E1A27D3860C8AC985A9C1EBB69100A8DDB4CD08DB5ECCC6E
                            SHA-512:C7C37FFC9AAD55A93AA452F2D9C77A64DE9C280858AD71C906E96F7CD180DE409DF863ECD9D751CE3EB364776C0B8A38073D07C81305550205A901391CB3757D
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.490745037327933
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VY7/Ym8M4JQXbHFU+q87EUwP2U5Ubd:uIjflI79i47VrJzoWxibd
                            MD5:3CF685450C8E3422A553914C455BC58A
                            SHA1:55668309361F146AF5704C0538190C64625C688D
                            SHA-256:CED01D4E74C02A84F2A90E9A3C1399258C59BABFB62DEF0AD08F0218CA13E2AD
                            SHA-512:6B4CEA54DAE3B427AF440558DA9DFFB309A6F0CF3B692B754F31797F94E38615AF92BCF3872E0963CA5C9D2333DCFB1C34741C33BC3FAFDC1DE5807CEF0A3934
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:11 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):77748
                            Entropy (8bit):2.399154374932599
                            Encrypted:false
                            SSDEEP:384:xkCx4+OxU7XtNfRsxCYu/nrCkxe/hzrfhgfrAJfpv81Ri0D:xwJxU7XtNZhYu/Gee57huYNYl
                            MD5:532D89691AB10B1192C06A11DB64679D
                            SHA1:539D573C5FBACA653A4CF0C275CA6B49BEAABE7A
                            SHA-256:048480B78DEADA4D6A8FB58FE1997193221FF3E3B7290E0D080940B3A5738AC3
                            SHA-512:790DBB57AE3A40EA411D6437DC0AA13D4D050845905845920280A91977CF8F0224A7F76E9CE9040550D94170B87AE7426F78378166CE57E244BA6438356FD5A5
                            Malicious:false
                            Preview:MDMP..a..... .......;.+g............$...............,.......4...^6..........T.......8...........T............*..............,...........................................................................................eJ..............GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8336
                            Entropy (8bit):3.702032527019843
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEf6H6Y9jSUe2nYgmfADcpB089bmcsfhCm:R6lXJ86H6YpSUe2nYgmfAD6mvfl
                            MD5:E0EBB80600CE6299F3EF6648602419E7
                            SHA1:E048CB515B70869D9786B2147F852A4C17C1799C
                            SHA-256:F9ADC6358618C18D3DBCF482CDEE055EA921A16E388CF204286460D5D06E10A3
                            SHA-512:F967A6FB0E61A8EC6FDC63B96D99A752071C8AD386398C1BFECEEE280D2D482CD00FC603D42C970415511A7615EFD8BBEC86613ACD33A50952FE7B3FC3687100
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.492849253860222
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VYDYm8M4JQXbHF/0+q87EUwP2U5Ubd:uIjflI79i47V/J7oWxibd
                            MD5:3C1AF803EEF26DC57CE0090484263217
                            SHA1:4268E0D2FAC1077F84CCD477DFDA9D653974A067
                            SHA-256:B2317E24B95447420BFB7470194DC552B057E876C988F823FC436D6B5A4ACFDF
                            SHA-512:38460CFF8E9AAADC28ECE8137016DEDE6369E5D4BAB1357F58ADD008CF11B415F0006C25BBFA937D173EA19D38ED52CABB35C0AE44E6B6CF528B162903F08650
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:12 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):83268
                            Entropy (8bit):2.3834154430905374
                            Encrypted:false
                            SSDEEP:384:ud+hmB/IXzq/Nf8s5PBsMou/nrCkxe/hzrfhgfrOdCxdjab:uUoB/IXzQNkyJs1u/Gee57huhxw
                            MD5:C459757C26A633C0B2E24E4CDA79856E
                            SHA1:3B2EE2F33E088488B494DA81DFE0D12B143652E4
                            SHA-256:FFA13F9D22267D2466B7FFA05B09E56F8A77271A45602F7943994163A552FC22
                            SHA-512:BA94D2968BAD556A8C619E7961589E9AB73FD70AD7E0E1250D88AD3D6358B8343142CDCC09136F7D112CE197D3241EA395363B92F48CF4A415282EABED3AA2F8
                            Malicious:false
                            Preview:MDMP..a..... .......<.+g............T...........l...\.......d....9..........T.......8...........T............+..<.......................................................................................................eJ......L.......GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.702012558477814
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJEjO6M6Y9HSUV2mCgmfADcpBB89b9csfgfm:R6lXJ+O6M6YdSUV2mCgmfADl9vfl
                            MD5:693C672142A2887AC4F1DB73B6FA3D0C
                            SHA1:8E47229E2249CE5BAB79FFFAD252C6A3220FEB29
                            SHA-256:B48081F3C0225F58E5EA7A9B082972BF8DD480947734492C3B61E0C291101E0B
                            SHA-512:E630FEB07E37E1AEEE06D0A2B38589980BDDD41EBC1E17A937300211E265F655DF2A98324A52F3D62523F530F142CD9C09B79FE13B3F5FE303E4CC9DDC6F6E78
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4589
                            Entropy (8bit):4.492135941702969
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLJg77aI9DiJWpW8VYdYm8M4JQXbHFy+q87EUwP2U5Ubd:uIjflI79i47VxJRoWxibd
                            MD5:6BB2F20E9A3CC0FFFF22E89F8A0B6FC1
                            SHA1:E988847B52FADE75001332C51A9F3B0E8E0B9357
                            SHA-256:DBBC69D536F74D2F45E15F7B9413D92E20F426E5955910D0C464811BFD5BDEF5
                            SHA-512:2521CFF938C266D116328BC5ACAF854C060F19870E2351488130FBD70A2078213DBDD4CBB54AEFFB334020134D6D7145B27A1E618037106152F9880D37F9E775
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="575866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Nov 6 06:44:13 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):90102
                            Entropy (8bit):2.1157353043261007
                            Encrypted:false
                            SSDEEP:384:mu3jXo+xoPSdXnW4pwEMJzBeJfhgnisUWyQmbmDRnbg:muTXzKKdXnW4pXIWhV6F
                            MD5:737BAB2B73BFC3ACBFF516801B42A41F
                            SHA1:B4FDF2FB04638F0BD35E0CF74A2ED2EAA855EE57
                            SHA-256:FB60A0435FD358B8931CEFAF097E263B87E60227A0BCF73A477E5EEBBF972CBF
                            SHA-512:96559810C05F858AE5E17725864712089C7C743A6A7D0915AEB9C32F33E8667510216C382D33710D498263DC4D593B42D3A449C7032A6D7EABFF87DB733B1E2E
                            Malicious:false
                            Preview:MDMP..a..... .......=.+g........................l................?..........T.......8...........T........... ,...3..........(...........................................................................................eJ..............GenuineIntel............T.......,...2.+g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\NujUXO42Rg.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):506880
                            Entropy (8bit):6.643516914355047
                            Encrypted:false
                            SSDEEP:6144:AKeM0W0Fw5E+NASQHCqfbFqJYGah3GWlx36GvoL8Lsu/hRj00Ln4HHZa52:3eM9Z0pMval9x/v+8LsuZ0Za
                            MD5:10E19F80D967AB7D4A8ED10F674DF5C5
                            SHA1:895FDB3318B041506C9957B426E5FFE797A57C7F
                            SHA-256:034B31656266AD9F80490A4FC983AC53BB3224AC88084069080EE2BA0A91FC20
                            SHA-512:CD6562C7CF3536F148AD3B14A6ADE93E662534AF81B9EC60DB6F9F44E936D91572C4A5477BCE9CF487B0BCC99BDF12CD48916ED76A293E38092A86963E83AF2E
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 66%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W}..6.Z.6.Z.6.Z4y.Z.6.Z.d.Z.6.Z.d.Z.6.Z.d.Z.6.Z..hZ.6.Z.6.Z.6.Z.d.Z.6.Z.d.Z.6.Z.d.Z.6.ZRich.6.Z........PE..L....V.e.................L...hr..............`....@...........................w......r......................................Ly..(.....v.......................w.............................0u.......t..@............`...............................text....J.......L.................. ..`.rdata..."...`...$...P..............@..@.data.....p..........t..............@....tls....=.....u.....................@....rsrc.........v......^..............@..@.reloc..H]....w..^...^..............@..B........................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\NujUXO42Rg.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.468199917155459
                            Encrypted:false
                            SSDEEP:6144:PIXfpi67eLPU9skLmb0b4YWSPKaJG8nAgejZMMhA2gX4WABl0uNRdwBCswSbs:gXD94YWlLZMM6YFH/+s
                            MD5:94D6FF9D7AAC3DD9F706EBA620F89D3F
                            SHA1:B4CE96C92F923C57ED9DC0F3B97A2B0D09A9E427
                            SHA-256:84EB493024F0C345E675ED6C3F354CECA30444A5F2C39EA927849765D4B3BD02
                            SHA-512:F60EA8BE07572F382F520969259741CEBD3F032347D3AAB859FE441A803786EB10CB358C8870E2CF42E6967B0A679E315D6AE6E0F09593A7E5C75CA366FA5F96
                            Malicious:false
                            Preview:regf=...=....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..UH.0..............................................................................................................................................................................................................................................................................................................................................[.C|........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.643516914355047
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:NujUXO42Rg.exe
                            File size:506'880 bytes
                            MD5:10e19f80d967ab7d4a8ed10f674df5c5
                            SHA1:895fdb3318b041506c9957b426e5ffe797a57c7f
                            SHA256:034b31656266ad9f80490a4fc983ac53bb3224ac88084069080ee2ba0a91fc20
                            SHA512:cd6562c7cf3536f148ad3b14a6ade93e662534af81b9ec60db6f9f44e936d91572c4a5477bce9cf487b0bcc99bdf12cd48916ed76a293e38092a86963e83af2e
                            SSDEEP:6144:AKeM0W0Fw5E+NASQHCqfbFqJYGah3GWlx36GvoL8Lsu/hRj00Ln4HHZa52:3eM9Z0pMval9x/v+8LsuZ0Za
                            TLSH:9FB4F061F6F25421F7F38A349874AA845AFBB8637970808E256C325F1E323D24E76717
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W}..6.Z.6.Z.6.Z4y.Z.6.Z.d.Z.6.Z.d.Z.6.Z.d.Z.6.Z..hZ.6.Z.6.Z.6.Z.d.Z.6.Z.d.Z.6.Z.d.Z.6.ZRich.6.Z........PE..L....V.e...........
                            Icon Hash:20601a1a182a5160
                            Entrypoint:0x4017d1
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x65E95690 [Thu Mar 7 05:54:24 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:78a88d0d1513199add7eadb9781f8ed9
                            Instruction
                            call 00007F0409140489h
                            jmp 00007F040913C90Dh
                            mov edi, edi
                            push ebp
                            mov ebp, esp
                            sub esp, 00000328h
                            mov dword ptr [0045A798h], eax
                            mov dword ptr [0045A794h], ecx
                            mov dword ptr [0045A790h], edx
                            mov dword ptr [0045A78Ch], ebx
                            mov dword ptr [0045A788h], esi
                            mov dword ptr [0045A784h], edi
                            mov word ptr [0045A7B0h], ss
                            mov word ptr [0045A7A4h], cs
                            mov word ptr [0045A780h], ds
                            mov word ptr [0045A77Ch], es
                            mov word ptr [0045A778h], fs
                            mov word ptr [0045A774h], gs
                            pushfd
                            pop dword ptr [0045A7A8h]
                            mov eax, dword ptr [ebp+00h]
                            mov dword ptr [0045A79Ch], eax
                            mov eax, dword ptr [ebp+04h]
                            mov dword ptr [0045A7A0h], eax
                            lea eax, dword ptr [ebp+08h]
                            mov dword ptr [0045A7ACh], eax
                            mov eax, dword ptr [ebp-00000320h]
                            mov dword ptr [0045A6E8h], 00010001h
                            mov eax, dword ptr [0045A7A0h]
                            mov dword ptr [0045A69Ch], eax
                            mov dword ptr [0045A690h], C0000409h
                            mov dword ptr [0045A694h], 00000001h
                            mov eax, dword ptr [00459004h]
                            mov dword ptr [ebp-00000328h], eax
                            mov eax, dword ptr [00459008h]
                            mov dword ptr [ebp-00000324h], eax
                            call dword ptr [000000ECh]
                            Programming Language:
                            • [C++] VS2008 build 21022
                            • [ASM] VS2008 build 21022
                            • [ C ] VS2008 build 21022
                            • [IMP] VS2005 build 50727
                            • [RES] VS2008 build 21022
                            • [LNK] VS2008 build 21022
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x5794c0x28.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x27690000xffe0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x27790000x9c4.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x575300x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x574e80x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x560000x1a0.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x54a0c0x54c00be93ecc1a255ac617ab753b2b0e48a6aFalse0.8781860711651918data7.6964710810725245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x560000x22be0x24001afd5e6c7a939c4cb966ad6992c8a119False0.3575303819444444data5.461253813095271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x590000x27013980x18007b983a33a70227a0ed50d7110d0dedd4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0x275b0000xd03d0xd2004ac08b57fd7f0ac437782e5df4402ac7False0.0014508928571428572data0.0003191392697274087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x27690000xffe00x10000a8c60d8e8f9430710b5dcd82a4ad3477False0.51812744140625data5.489040104346979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x27790000x5d480x5e00e706418360e6acfbc235b594efe1b0bbFalse0.0934591090425532data1.1282349681175015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            JUPILAMADUSAGIGIXOYANEXUF0x27731400x3faASCII text, with very long lines (1018), with no line terminatorsTurkishTurkey0.6237721021611002
                            RT_ICON0x27697400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.7214818763326226
                            RT_ICON0x276a5e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.7152527075812274
                            RT_ICON0x276ae900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6330645161290323
                            RT_ICON0x276b5580x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.6640173410404624
                            RT_ICON0x276bac00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.6494813278008299
                            RT_ICON0x276e0680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6979508196721311
                            RT_ICON0x276e9f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.724290780141844
                            RT_ICON0x276eec00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.38646055437100213
                            RT_ICON0x276fd680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5392599277978339
                            RT_ICON0x27706100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6094470046082949
                            RT_ICON0x2770cd80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6380057803468208
                            RT_ICON0x27712400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.40126641651031897
                            RT_ICON0x27722e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.39344262295081966
                            RT_ICON0x2772c700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4370567375886525
                            RT_STRING0x27737100x140data0.521875
                            RT_STRING0x27738500x850AmigaOS bitmap font "e", fc_YSize 26880, 20480 elements, 2nd "i", 3rd "v"0.4149436090225564
                            RT_STRING0x27740a00x3e0data0.4637096774193548
                            RT_STRING0x27744800x31edata0.4799498746867168
                            RT_STRING0x27747a00x598data0.4483240223463687
                            RT_STRING0x2774d380x680data0.4387019230769231
                            RT_STRING0x27753b80x5eadata0.43593130779392336
                            RT_STRING0x27759a80x7f0data0.4237204724409449
                            RT_STRING0x27761980x69cdata0.43498817966903075
                            RT_STRING0x27768380x6f0data0.42849099099099097
                            RT_STRING0x2776f280x5e6data0.44437086092715233
                            RT_STRING0x27775100x7ecdata0.4176528599605523
                            RT_STRING0x2777d000x60cdata0.43733850129198965
                            RT_STRING0x27783100x680data0.43209134615384615
                            RT_STRING0x27789900x64cdata0.4280397022332506
                            RT_ACCELERATOR0x27735400x28data1.025
                            RT_GROUP_ICON0x276ee580x68dataTurkishTurkey0.7115384615384616
                            RT_GROUP_ICON0x27730d80x68dataTurkishTurkey0.7115384615384616
                            RT_VERSION0x27735680x1a4data0.5785714285714286
                            DLLImport
                            KERNEL32.dllDebugActiveProcess, SetProcessAffinityMask, SetDefaultCommConfigA, GetNumaProcessorNode, GetLocaleInfoA, GetConsoleAliasExesLengthA, CallNamedPipeA, InterlockedIncrement, MoveFileExW, GetConsoleAliasA, GlobalSize, GetEnvironmentStringsW, GlobalLock, FreeEnvironmentStringsA, GetModuleHandleW, GetTickCount, FormatMessageA, GetConsoleMode, GetSystemWow64DirectoryW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, GetTimeFormatW, SetConsoleCursorPosition, GetModuleFileNameW, GetACP, GetStartupInfoW, GetStdHandle, GetLogicalDriveStringsA, ReadConsoleOutputCharacterA, GetProcAddress, SetVolumeLabelW, MoveFileW, VirtualAllocEx, BuildCommDCBW, LoadLibraryA, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCommMask, FindAtomA, SetNamedPipeHandleState, GetModuleHandleA, OpenFileMappingW, PurgeComm, GetVersionExA, LocalFileTimeToFileTime, CloseHandle, WriteConsoleW, MultiByteToWideChar, GetLastError, HeapReAlloc, HeapAlloc, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedDecrement, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, Sleep, HeapSize, ExitProcess, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapCreate, VirtualFree, HeapFree, VirtualAlloc, WriteFile, GetModuleFileNameA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, RtlUnwind, SetFilePointer, GetConsoleCP, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CreateFileA
                            Language of compilation systemCountry where language is spokenMap
                            TurkishTurkey
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-11-06T07:43:57.816353+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449735198.23.227.21232583TCP
                            2024-11-06T07:44:28.652885+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.449732TCP
                            2024-11-06T07:44:35.026676+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449742198.23.227.21232583TCP
                            2024-11-06T07:44:38.556950+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449746198.23.227.21232583TCP
                            2024-11-06T07:44:40.991185+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449749198.23.227.21232583TCP
                            2024-11-06T07:44:42.838468+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449751198.23.227.21232583TCP
                            2024-11-06T07:44:44.368393+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449752198.23.227.21232583TCP
                            2024-11-06T07:44:45.917615+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449753198.23.227.21232583TCP
                            2024-11-06T07:44:47.446899+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449754198.23.227.21232583TCP
                            2024-11-06T07:44:48.975123+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449755198.23.227.21232583TCP
                            2024-11-06T07:44:50.719321+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449756198.23.227.21232583TCP
                            2024-11-06T07:44:52.246626+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449757198.23.227.21232583TCP
                            2024-11-06T07:44:53.767317+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449758198.23.227.21232583TCP
                            2024-11-06T07:44:55.276021+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449759198.23.227.21232583TCP
                            2024-11-06T07:44:56.825571+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449760198.23.227.21232583TCP
                            2024-11-06T07:44:58.344094+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449762198.23.227.21232583TCP
                            2024-11-06T07:44:59.866866+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449768198.23.227.21232583TCP
                            2024-11-06T07:45:01.415991+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449779198.23.227.21232583TCP
                            2024-11-06T07:45:02.933709+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449785198.23.227.21232583TCP
                            2024-11-06T07:45:04.459109+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449796198.23.227.21232583TCP
                            2024-11-06T07:45:06.281224+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449807198.23.227.21232583TCP
                            2024-11-06T07:45:07.796557+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449814198.23.227.21232583TCP
                            2024-11-06T07:45:10.247962+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449825198.23.227.21232583TCP
                            2024-11-06T07:45:10.745749+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.449820TCP
                            2024-11-06T07:45:11.769746+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449836198.23.227.21232583TCP
                            2024-11-06T07:45:13.704236+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449847198.23.227.21232583TCP
                            2024-11-06T07:45:15.219609+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449858198.23.227.21232583TCP
                            2024-11-06T07:45:16.761856+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449866198.23.227.21232583TCP
                            2024-11-06T07:45:18.358675+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449876198.23.227.21232583TCP
                            2024-11-06T07:45:19.928819+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449886198.23.227.21232583TCP
                            2024-11-06T07:45:21.475963+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449897198.23.227.21232583TCP
                            2024-11-06T07:45:23.011677+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449905198.23.227.21232583TCP
                            2024-11-06T07:45:24.535030+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449914198.23.227.21232583TCP
                            2024-11-06T07:45:26.583510+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449927198.23.227.21232583TCP
                            2024-11-06T07:45:28.130469+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449934198.23.227.21232583TCP
                            2024-11-06T07:45:29.611446+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449944198.23.227.21232583TCP
                            2024-11-06T07:45:31.073895+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449955198.23.227.21232583TCP
                            2024-11-06T07:45:32.502999+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449963198.23.227.21232583TCP
                            2024-11-06T07:45:34.156193+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449972198.23.227.21232583TCP
                            2024-11-06T07:45:35.858728+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449983198.23.227.21232583TCP
                            2024-11-06T07:45:37.303985+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449994198.23.227.21232583TCP
                            2024-11-06T07:45:38.609693+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450000198.23.227.21232583TCP
                            2024-11-06T07:45:39.892930+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450011198.23.227.21232583TCP
                            2024-11-06T07:45:41.240816+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450017198.23.227.21232583TCP
                            2024-11-06T07:45:42.462206+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450025198.23.227.21232583TCP
                            2024-11-06T07:45:43.909906+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450034198.23.227.21232583TCP
                            2024-11-06T07:45:45.110198+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450042198.23.227.21232583TCP
                            2024-11-06T07:45:46.306006+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450048198.23.227.21232583TCP
                            2024-11-06T07:45:47.732283+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450058198.23.227.21232583TCP
                            2024-11-06T07:45:48.912870+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450060198.23.227.21232583TCP
                            2024-11-06T07:45:50.249920+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450061198.23.227.21232583TCP
                            2024-11-06T07:45:51.341145+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450062198.23.227.21232583TCP
                            2024-11-06T07:45:52.825738+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450063198.23.227.21232583TCP
                            2024-11-06T07:45:53.887784+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450064198.23.227.21232583TCP
                            2024-11-06T07:45:54.929691+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450065198.23.227.21232583TCP
                            2024-11-06T07:45:56.160651+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450066198.23.227.21232583TCP
                            2024-11-06T07:45:57.506931+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450067198.23.227.21232583TCP
                            2024-11-06T07:45:58.501721+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450068198.23.227.21232583TCP
                            2024-11-06T07:45:59.957100+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450069198.23.227.21232583TCP
                            2024-11-06T07:46:00.930062+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450070198.23.227.21232583TCP
                            2024-11-06T07:46:02.323937+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450071198.23.227.21232583TCP
                            2024-11-06T07:46:03.283592+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450072198.23.227.21232583TCP
                            2024-11-06T07:46:04.617461+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450073198.23.227.21232583TCP
                            2024-11-06T07:46:05.552215+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450074198.23.227.21232583TCP
                            2024-11-06T07:46:07.320124+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450075198.23.227.21232583TCP
                            2024-11-06T07:46:08.333386+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450076198.23.227.21232583TCP
                            2024-11-06T07:46:09.491899+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450077198.23.227.21232583TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 6, 2024 07:44:25.409018040 CET4973532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:25.413866043 CET3258349735198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:25.413952112 CET4973532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:25.927484035 CET3258349735198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:25.927556038 CET4973532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:31.716068983 CET4973532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:31.716111898 CET4973532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:31.720850945 CET3258349735198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:31.721044064 CET3258349735198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:34.521748066 CET4974232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:34.526576042 CET3258349742198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:34.526667118 CET4974232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:34.531013966 CET4974232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:34.535828114 CET3258349742198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:35.026586056 CET3258349742198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:35.026675940 CET4974232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:35.027445078 CET4974232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:35.032164097 CET3258349742198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:38.020029068 CET4974632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:38.024848938 CET3258349746198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:38.025125027 CET4974632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:38.059660912 CET4974632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:38.064449072 CET3258349746198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:38.556027889 CET3258349746198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:38.556950092 CET4974632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:38.558171988 CET4974632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:38.562901020 CET3258349746198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:40.457740068 CET4974932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:40.462536097 CET3258349749198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:40.462632895 CET4974932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:40.466226101 CET4974932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:40.471004009 CET3258349749198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:40.989281893 CET3258349749198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:40.991184950 CET4974932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:41.295619011 CET4974932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:41.434103012 CET3258349749198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:42.301156044 CET4975132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:42.306011915 CET3258349751198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:42.306087971 CET4975132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:42.309567928 CET4975132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:42.314358950 CET3258349751198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:42.838318110 CET3258349751198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:42.838468075 CET4975132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:42.838591099 CET4975132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:42.843303919 CET3258349751198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:43.848903894 CET4975232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:43.853964090 CET3258349752198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:43.854021072 CET4975232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:43.857024908 CET4975232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:43.862029076 CET3258349752198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:44.368280888 CET3258349752198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:44.368392944 CET4975232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:44.368518114 CET4975232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:44.373246908 CET3258349752198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:45.379470110 CET4975332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:45.384289026 CET3258349753198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:45.384358883 CET4975332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:45.387777090 CET4975332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:45.392543077 CET3258349753198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:45.917421103 CET3258349753198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:45.917614937 CET4975332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:45.917728901 CET4975332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:45.922533989 CET3258349753198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:46.926358938 CET4975432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:46.931200981 CET3258349754198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:46.931301117 CET4975432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:46.934742928 CET4975432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:46.939439058 CET3258349754198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:47.446825027 CET3258349754198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:47.446898937 CET4975432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:47.447010040 CET4975432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:47.452552080 CET3258349754198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:48.457617998 CET4975532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:48.463715076 CET3258349755198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:48.463810921 CET4975532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:48.467777967 CET4975532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:48.473607063 CET3258349755198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:48.972006083 CET3258349755198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:48.975122929 CET4975532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:49.188642979 CET4975532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:49.193367004 CET3258349755198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:50.208081961 CET4975632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:50.212878942 CET3258349756198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:50.212953091 CET4975632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:50.216752052 CET4975632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:50.221465111 CET3258349756198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:50.719244003 CET3258349756198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:50.719321012 CET4975632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:50.719422102 CET4975632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:50.724627972 CET3258349756198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:51.724313021 CET4975732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:51.729233980 CET3258349757198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:51.729355097 CET4975732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:51.734908104 CET4975732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:51.739664078 CET3258349757198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:52.246490955 CET3258349757198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:52.246625900 CET4975732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:52.246743917 CET4975732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:52.251452923 CET3258349757198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:53.254357100 CET4975832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:53.259383917 CET3258349758198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:53.259495020 CET4975832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:53.263082981 CET4975832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:53.267889023 CET3258349758198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:53.767234087 CET3258349758198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:53.767317057 CET4975832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:53.767456055 CET4975832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:53.772336006 CET3258349758198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:54.771476030 CET4975932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:54.776299953 CET3258349759198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:54.776576996 CET4975932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:54.780225992 CET4975932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:54.784980059 CET3258349759198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:55.275940895 CET3258349759198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:55.276021004 CET4975932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:55.276141882 CET4975932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:55.281033039 CET3258349759198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:56.285881996 CET4976032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:56.293803930 CET3258349760198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:56.293894053 CET4976032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:56.297451973 CET4976032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:56.302263975 CET3258349760198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:56.825512886 CET3258349760198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:56.825571060 CET4976032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:56.825695992 CET4976032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:56.830482006 CET3258349760198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:57.832525969 CET4976232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:57.837393999 CET3258349762198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:57.837475061 CET4976232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:57.841042995 CET4976232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:57.846731901 CET3258349762198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:58.344012976 CET3258349762198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:58.344094038 CET4976232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:58.344206095 CET4976232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:58.349106073 CET3258349762198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:59.348419905 CET4976832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:59.353214979 CET3258349768198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:59.353297949 CET4976832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:59.356882095 CET4976832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:59.361614943 CET3258349768198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:59.866802931 CET3258349768198.23.227.212192.168.2.4
                            Nov 6, 2024 07:44:59.866866112 CET4976832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:59.866975069 CET4976832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:44:59.871925116 CET3258349768198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:00.879610062 CET4977932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:00.884447098 CET3258349779198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:00.884540081 CET4977932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:00.888813972 CET4977932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:00.893570900 CET3258349779198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:01.415874958 CET3258349779198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:01.415991068 CET4977932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:01.416167974 CET4977932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:01.420957088 CET3258349779198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:02.429714918 CET4978532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:02.434503078 CET3258349785198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:02.434581041 CET4978532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:02.438853979 CET4978532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:02.443707943 CET3258349785198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:02.933634996 CET3258349785198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:02.933708906 CET4978532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:02.933851957 CET4978532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:02.938608885 CET3258349785198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:03.943115950 CET4979632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:03.948075056 CET3258349796198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:03.949023008 CET4979632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:03.954278946 CET4979632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:03.959181070 CET3258349796198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:04.454976082 CET3258349796198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:04.459109068 CET4979632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:04.758096933 CET4979632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:04.762864113 CET3258349796198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:05.770400047 CET4980732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:05.775290012 CET3258349807198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:05.775372028 CET4980732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:05.779297113 CET4980732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:05.785630941 CET3258349807198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:06.280953884 CET3258349807198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:06.281224012 CET4980732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:06.281539917 CET4980732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:06.286286116 CET3258349807198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:07.287136078 CET4981432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:07.291917086 CET3258349814198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:07.292038918 CET4981432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:07.295953035 CET4981432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:07.300736904 CET3258349814198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:07.796497107 CET3258349814198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:07.796556950 CET4981432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:07.796705961 CET4981432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:07.801685095 CET3258349814198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:08.801501036 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:08.808753014 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:08.808929920 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:08.812782049 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:08.817838907 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:10.247749090 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:10.247961998 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:10.248646975 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:10.248672962 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:10.248855114 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:10.248878002 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:10.249397993 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:10.249459982 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:10.249459982 CET4982532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:10.253623009 CET3258349825198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:11.255763054 CET4983632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:11.260926008 CET3258349836198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:11.261059999 CET4983632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:11.265115023 CET4983632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:11.270531893 CET3258349836198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:11.769629002 CET3258349836198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:11.769746065 CET4983632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:12.175266027 CET4983632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:12.180161953 CET3258349836198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:13.191854000 CET4984732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:13.196732998 CET3258349847198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:13.196825027 CET4984732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:13.200639963 CET4984732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:13.205410957 CET3258349847198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:13.704154968 CET3258349847198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:13.704236031 CET4984732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:13.704423904 CET4984732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:13.709131956 CET3258349847198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:14.708116055 CET4985832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:14.713052034 CET3258349858198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:14.713119984 CET4985832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:14.717058897 CET4985832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:14.721853018 CET3258349858198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:15.219553947 CET3258349858198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:15.219609022 CET4985832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:15.219736099 CET4985832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:15.224467993 CET3258349858198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:16.224942923 CET4986632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:16.229710102 CET3258349866198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:16.229852915 CET4986632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:16.233530045 CET4986632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:16.238300085 CET3258349866198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:16.761785030 CET3258349866198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:16.761856079 CET4986632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:16.764313936 CET4986632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:16.769138098 CET3258349866198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:17.841356993 CET4987632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:17.847245932 CET3258349876198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:17.847340107 CET4987632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:17.851964951 CET4987632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:17.856777906 CET3258349876198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:18.358604908 CET3258349876198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:18.358675003 CET4987632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:18.393284082 CET4987632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:18.398092031 CET3258349876198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:19.414621115 CET4988632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:19.419481993 CET3258349886198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:19.419852018 CET4988632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:19.423561096 CET4988632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:19.428317070 CET3258349886198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:19.928728104 CET3258349886198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:19.928818941 CET4988632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:19.950294971 CET4988632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:19.955107927 CET3258349886198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:20.957627058 CET4989732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:20.962376118 CET3258349897198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:20.962477922 CET4989732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:20.966595888 CET4989732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:20.971453905 CET3258349897198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:21.475864887 CET3258349897198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:21.475963116 CET4989732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:21.476092100 CET4989732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:21.480940104 CET3258349897198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:22.488811016 CET4990532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:22.493592978 CET3258349905198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:22.493763924 CET4990532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:22.497401953 CET4990532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:22.502629042 CET3258349905198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:23.011605978 CET3258349905198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:23.011677027 CET4990532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:23.011799097 CET4990532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:23.016516924 CET3258349905198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:24.020395994 CET4991432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:24.025245905 CET3258349914198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:24.025324106 CET4991432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:24.029148102 CET4991432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:24.034040928 CET3258349914198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:24.533011913 CET3258349914198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:24.535029888 CET4991432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:25.057648897 CET4991432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:25.062480927 CET3258349914198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:26.068392038 CET4992732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:26.073265076 CET3258349927198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:26.073355913 CET4992732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:26.085299969 CET4992732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:26.090136051 CET3258349927198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:26.583399057 CET3258349927198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:26.583509922 CET4992732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:26.583766937 CET4992732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:26.588593960 CET3258349927198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:27.598517895 CET4993432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:27.603327036 CET3258349934198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:27.603406906 CET4993432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:27.607625961 CET4993432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:27.612406969 CET3258349934198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:28.130393982 CET3258349934198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:28.130469084 CET4993432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:28.130795002 CET4993432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:28.135665894 CET3258349934198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:29.098175049 CET4994432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:29.103022099 CET3258349944198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:29.103117943 CET4994432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:29.107006073 CET4994432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:29.111798048 CET3258349944198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:29.611356974 CET3258349944198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:29.611445904 CET4994432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:29.611705065 CET4994432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:29.616456985 CET3258349944198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:30.551399946 CET4995532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:30.556780100 CET3258349955198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:30.556866884 CET4995532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:30.560766935 CET4995532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:30.565742016 CET3258349955198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:31.073826075 CET3258349955198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:31.073894978 CET4995532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:31.074049950 CET4995532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:31.078840971 CET3258349955198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:31.988828897 CET4996332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:31.993613005 CET3258349963198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:31.993685007 CET4996332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:31.997674942 CET4996332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:32.002404928 CET3258349963198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:32.500022888 CET3258349963198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:32.502999067 CET4996332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:32.758295059 CET4996332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:32.763185024 CET3258349963198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:33.645545006 CET4997232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:33.650410891 CET3258349972198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:33.650505066 CET4997232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:33.656586885 CET4997232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:33.661448002 CET3258349972198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:34.156120062 CET3258349972198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:34.156193018 CET4997232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:34.156339884 CET4997232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:34.161163092 CET3258349972198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:35.346666098 CET4998332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:35.351974010 CET3258349983198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:35.352087021 CET4998332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:35.377866030 CET4998332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:35.382711887 CET3258349983198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:35.858644962 CET3258349983198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:35.858727932 CET4998332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:35.955225945 CET4998332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:35.960086107 CET3258349983198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:36.786695957 CET4999432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:36.791515112 CET3258349994198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:36.791615963 CET4999432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:36.800127983 CET4999432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:36.805047035 CET3258349994198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:37.303915024 CET3258349994198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:37.303985119 CET4999432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:37.304126978 CET4999432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:37.308897972 CET3258349994198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:38.098531961 CET5000032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:38.103400946 CET3258350000198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:38.103591919 CET5000032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:38.107408047 CET5000032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:38.112318039 CET3258350000198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:38.609631062 CET3258350000198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:38.609693050 CET5000032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:38.609821081 CET5000032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:38.614581108 CET3258350000198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:39.380971909 CET5001132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:39.385705948 CET3258350011198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:39.385808945 CET5001132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:39.389352083 CET5001132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:39.394171953 CET3258350011198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:39.892731905 CET3258350011198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:39.892930031 CET5001132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:39.893074036 CET5001132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:39.897797108 CET3258350011198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:40.721818924 CET5001732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:40.726656914 CET3258350017198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:40.726758003 CET5001732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:40.730691910 CET5001732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:40.735841036 CET3258350017198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:41.240742922 CET3258350017198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:41.240816116 CET5001732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:41.240991116 CET5001732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:41.245826006 CET3258350017198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:41.957890987 CET5002532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:41.962730885 CET3258350025198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:41.962831020 CET5002532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:41.967084885 CET5002532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:41.972033978 CET3258350025198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:42.462135077 CET3258350025198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:42.462205887 CET5002532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:42.462337971 CET5002532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:42.467120886 CET3258350025198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:43.395184994 CET5003432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:43.399976969 CET3258350034198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:43.400055885 CET5003432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:43.403995037 CET5003432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:43.408797026 CET3258350034198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:43.909841061 CET3258350034198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:43.909905910 CET5003432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:43.916062117 CET5003432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:43.920875072 CET3258350034198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:44.598510027 CET5004232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:44.603369951 CET3258350042198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:44.603579044 CET5004232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:44.608701944 CET5004232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:44.613523006 CET3258350042198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:45.110129118 CET3258350042198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:45.110198021 CET5004232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:45.110392094 CET5004232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:45.115123987 CET3258350042198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:45.795010090 CET5004832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:45.799890995 CET3258350048198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:45.801024914 CET5004832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:45.827593088 CET5004832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:45.832489014 CET3258350048198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:46.305941105 CET3258350048198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:46.306005955 CET5004832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:46.474761009 CET5004832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:46.479590893 CET3258350048198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:47.117609024 CET5005832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:47.122585058 CET3258350058198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:47.122659922 CET5005832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:47.127399921 CET5005832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:47.132210970 CET3258350058198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:47.732219934 CET3258350058198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:47.732283115 CET5005832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:47.732423067 CET5005832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:47.737339973 CET3258350058198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:48.404462099 CET5006032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:48.409290075 CET3258350060198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:48.413045883 CET5006032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:48.456993103 CET5006032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:48.461932898 CET3258350060198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:48.912774086 CET3258350060198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:48.912869930 CET5006032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:49.149019957 CET5006032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:49.153932095 CET3258350060198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:49.739044905 CET5006132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:49.743853092 CET3258350061198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:49.743937969 CET5006132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:49.747544050 CET5006132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:49.752454042 CET3258350061198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:50.249830961 CET3258350061198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:50.249919891 CET5006132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:50.250107050 CET5006132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:50.254894018 CET3258350061198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:50.817131042 CET5006232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:50.822005033 CET3258350062198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:50.822092056 CET5006232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:50.826802969 CET5006232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:50.831710100 CET3258350062198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:51.337892056 CET3258350062198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:51.341145039 CET5006232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:51.746021986 CET5006232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:51.751087904 CET3258350062198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:52.301454067 CET5006332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:52.306257010 CET3258350063198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:52.306359053 CET5006332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:52.310013056 CET5006332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:52.315043926 CET3258350063198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:52.825618029 CET3258350063198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:52.825737953 CET5006332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:52.825879097 CET5006332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:52.830924988 CET3258350063198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:53.366549969 CET5006432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:53.371298075 CET3258350064198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:53.371648073 CET5006432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:53.376526117 CET5006432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:53.381331921 CET3258350064198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:53.887710094 CET3258350064198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:53.887784004 CET5006432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:53.887926102 CET5006432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:53.892688036 CET3258350064198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:54.411169052 CET5006532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:54.417104006 CET3258350065198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:54.417263031 CET5006532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:54.425064087 CET5006532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:54.430632114 CET3258350065198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:54.929615021 CET3258350065198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:54.929691076 CET5006532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:54.929824114 CET5006532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:54.934616089 CET3258350065198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:55.648487091 CET5006632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:55.653961897 CET3258350066198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:55.654036999 CET5006632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:55.687186003 CET5006632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:55.692145109 CET3258350066198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:56.160588026 CET3258350066198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:56.160650969 CET5006632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:56.160832882 CET5006632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:56.165541887 CET3258350066198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:56.989355087 CET5006732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:56.994229078 CET3258350067198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:56.994339943 CET5006732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:56.998260021 CET5006732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:57.003096104 CET3258350067198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:57.506858110 CET3258350067198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:57.506931067 CET5006732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:57.507056952 CET5006732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:57.511816978 CET3258350067198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:57.989803076 CET5006832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:57.994646072 CET3258350068198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:57.994748116 CET5006832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:57.999140978 CET5006832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:58.003886938 CET3258350068198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:58.501625061 CET3258350068198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:58.501720905 CET5006832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:58.973900080 CET5006832583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:58.978714943 CET3258350068198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:59.426337957 CET5006932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:59.431185961 CET3258350069198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:59.431279898 CET5006932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:59.435225010 CET5006932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:59.440092087 CET3258350069198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:59.956134081 CET3258350069198.23.227.212192.168.2.4
                            Nov 6, 2024 07:45:59.957099915 CET5006932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:59.957292080 CET5006932583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:45:59.962102890 CET3258350069198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:00.418232918 CET5007032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:00.423249960 CET3258350070198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:00.423368931 CET5007032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:00.427229881 CET5007032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:00.432126045 CET3258350070198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:00.929976940 CET3258350070198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:00.930062056 CET5007032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:00.930247068 CET5007032583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:00.935131073 CET3258350070198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:01.804339886 CET5007132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:01.809145927 CET3258350071198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:01.809237957 CET5007132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:01.814651966 CET5007132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:01.819432020 CET3258350071198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:02.323801041 CET3258350071198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:02.323936939 CET5007132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:02.324078083 CET5007132583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:02.328844070 CET3258350071198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:02.747410059 CET5007232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:02.752216101 CET3258350072198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:02.752564907 CET5007232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:02.757750988 CET5007232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:02.762522936 CET3258350072198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:03.283456087 CET3258350072198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:03.283591986 CET5007232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:03.283766985 CET5007232583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:03.288544893 CET3258350072198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:04.111907959 CET5007332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:04.116827011 CET3258350073198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:04.116944075 CET5007332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:04.120702028 CET5007332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:04.125617027 CET3258350073198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:04.617325068 CET3258350073198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:04.617460966 CET5007332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:04.617640018 CET5007332583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:04.622504950 CET3258350073198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:05.040330887 CET5007432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:05.045233965 CET3258350074198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:05.045347929 CET5007432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:05.049001932 CET5007432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:05.053946018 CET3258350074198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:05.552139044 CET3258350074198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:05.552215099 CET5007432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:05.552354097 CET5007432583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:05.557183981 CET3258350074198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:06.805001020 CET5007532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:06.809896946 CET3258350075198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:06.813047886 CET5007532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:06.855530977 CET5007532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:06.860373020 CET3258350075198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:07.320045948 CET3258350075198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:07.320123911 CET5007532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:07.359114885 CET5007532583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:07.364152908 CET3258350075198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:07.812896967 CET5007632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:07.817742109 CET3258350076198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:07.818825006 CET5007632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:07.823775053 CET5007632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:07.828582048 CET3258350076198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:08.333323002 CET3258350076198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:08.333385944 CET5007632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:08.333519936 CET5007632583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:08.338274002 CET3258350076198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:08.799962997 CET5007732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:08.976778984 CET3258350077198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:08.976867914 CET5007732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:09.289721012 CET5007732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:09.294615984 CET3258350077198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:09.491805077 CET3258350077198.23.227.212192.168.2.4
                            Nov 6, 2024 07:46:09.491899014 CET5007732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:09.927768946 CET5007732583192.168.2.4198.23.227.212
                            Nov 6, 2024 07:46:09.932564974 CET3258350077198.23.227.212192.168.2.4

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:01:44:02
                            Start date:06/11/2024
                            Path:C:\Users\user\Desktop\NujUXO42Rg.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\NujUXO42Rg.exe"
                            Imagebase:0x400000
                            File size:506'880 bytes
                            MD5 hash:10E19F80D967AB7D4A8ED10F674DF5C5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2074953120.0000000002D93000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000003.1764979263.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2074993782.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:01:44:09
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:01:44:11
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1088
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:01:44:12
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1120
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:01:44:13
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1028
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:11
                            Start time:01:44:14
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1128
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:01:44:15
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1160
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:15
                            Start time:01:44:16
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1020
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:16
                            Start time:01:44:16
                            Start date:06/11/2024
                            Path:C:\Users\user\AppData\Roaming\xenor\yavascript.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                            Imagebase:0x400000
                            File size:506'880 bytes
                            MD5 hash:10E19F80D967AB7D4A8ED10F674DF5C5
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000010.00000002.2976585478.0000000002C92000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2976626550.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000010.00000003.1932621525.0000000004720000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000010.00000002.2976445656.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: ditekSHen
                            Antivirus matches:
                            • Detection: 66%, ReversingLabs
                            Reputation:low
                            Has exited:false

                            Target ID:17
                            Start time:01:44:17
                            Start date:06/11/2024
                            Path:C:\Users\user\AppData\Roaming\xenor\yavascript.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                            Imagebase:0x400000
                            File size:506'880 bytes
                            MD5 hash:10E19F80D967AB7D4A8ED10F674DF5C5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.2087932850.0000000002E1D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000011.00000002.2087828491.0000000002DC4000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000011.00000002.2087703864.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000011.00000003.1940837988.0000000004760000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000011.00000002.2086249475.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:19
                            Start time:01:44:18
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 1304
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:25
                            Start time:01:44:25
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 668
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:26
                            Start time:01:44:25
                            Start date:06/11/2024
                            Path:C:\Users\user\AppData\Roaming\xenor\yavascript.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                            Imagebase:0x7ff7699e0000
                            File size:506'880 bytes
                            MD5 hash:10E19F80D967AB7D4A8ED10F674DF5C5
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.2104228554.0000000002D0B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001A.00000002.2104198203.0000000002CC4000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000001A.00000002.2104289998.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000001A.00000003.2026422349.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000001A.00000002.2102900709.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:27
                            Start time:01:44:25
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8044 -s 520
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:29
                            Start time:01:44:29
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 676
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:31
                            Start time:01:44:31
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 648
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:34
                            Start time:01:44:33
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 532
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:35
                            Start time:01:44:34
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 688
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:37
                            Start time:01:44:36
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 740
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:39
                            Start time:01:44:37
                            Start date:06/11/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 748
                            Imagebase:0x710000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:1.3%
                              Dynamic/Decrypted Code Coverage:4.1%
                              Signature Coverage:32.2%
                              Total number of Nodes:702
                              Total number of Limit Nodes:24
                              execution_graph 85173 43a998 85175 43a9a4 _swprintf ___DestructExceptionObject 85173->85175 85174 43a9b2 85189 445354 20 API calls __dosmaperr 85174->85189 85175->85174 85178 43a9dc 85175->85178 85177 43a9b7 ___std_exception_copy __wsopen_s 85184 444acc RtlEnterCriticalSection 85178->85184 85180 43a9e7 85185 43aa88 85180->85185 85184->85180 85186 43aa96 85185->85186 85186->85186 85188 43a9f2 85186->85188 85191 448416 36 API calls 2 library calls 85186->85191 85190 43aa0f RtlLeaveCriticalSection std::_Lockit::~_Lockit 85188->85190 85189->85177 85190->85177 85191->85186 85192 402bcc 85193 402bd7 85192->85193 85194 402bdf 85192->85194 85210 403315 28 API calls __Getctype 85193->85210 85196 402beb 85194->85196 85200 4015d3 85194->85200 85197 402bdd 85204 43360d 85200->85204 85202 402be9 85204->85202 85206 43362e std::_Facet_Register 85204->85206 85211 43a88c 85204->85211 85218 442200 7 API calls 2 library calls 85204->85218 85205 433dec std::_Facet_Register 85220 437bd7 RaiseException 85205->85220 85206->85205 85219 437bd7 RaiseException 85206->85219 85209 433e09 85210->85197 85216 446aff _strftime 85211->85216 85212 446b3d 85222 445354 20 API calls __dosmaperr 85212->85222 85213 446b28 RtlAllocateHeap 85215 446b3b 85213->85215 85213->85216 85215->85204 85216->85212 85216->85213 85221 442200 7 API calls 2 library calls 85216->85221 85218->85204 85219->85205 85220->85209 85221->85216 85222->85215 85223 4339be 85224 4339ca ___DestructExceptionObject 85223->85224 85255 4336b3 85224->85255 85226 4339d1 85227 433b24 85226->85227 85231 4339fb 85226->85231 85546 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 85227->85546 85229 433b2b 85547 4426be 28 API calls _Atexit 85229->85547 85242 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 85231->85242 85540 4434d1 5 API calls CatchGuardHandler 85231->85540 85232 433b31 85548 442670 28 API calls _Atexit 85232->85548 85235 433a14 85237 433a1a 85235->85237 85541 443475 5 API calls CatchGuardHandler 85235->85541 85236 433b39 85239 433a9b 85266 433c5e 85239->85266 85242->85239 85542 43edf4 35 API calls 4 library calls 85242->85542 85249 433abd 85249->85229 85250 433ac1 85249->85250 85251 433aca 85250->85251 85544 442661 28 API calls _Atexit 85250->85544 85545 433842 13 API calls 2 library calls 85251->85545 85254 433ad2 85254->85237 85256 4336bc 85255->85256 85549 433e0a IsProcessorFeaturePresent 85256->85549 85258 4336c8 85550 4379ee 10 API calls 3 library calls 85258->85550 85260 4336cd 85261 4336d1 85260->85261 85551 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 85260->85551 85261->85226 85263 4336da 85264 4336e8 85263->85264 85552 437a17 8 API calls 3 library calls 85263->85552 85264->85226 85553 436050 85266->85553 85268 433c71 GetStartupInfoW 85269 433aa1 85268->85269 85270 443422 85269->85270 85554 44ddc9 85270->85554 85272 44342b 85273 433aaa 85272->85273 85558 44e0d3 35 API calls 85272->85558 85275 40d767 85273->85275 85560 41bce3 LoadLibraryA GetProcAddress 85275->85560 85277 40d783 GetModuleFileNameW 85565 40e168 85277->85565 85279 40d79f 85580 401fbd 85279->85580 85282 401fbd 28 API calls 85283 40d7bd 85282->85283 85584 41afc3 85283->85584 85287 40d7cf 85609 401d8c 85287->85609 85289 40d7d8 85290 40d835 85289->85290 85291 40d7eb 85289->85291 85615 401d64 85290->85615 85802 40e986 90 API calls 85291->85802 85294 40d845 85297 401d64 22 API calls 85294->85297 85295 40d7fd 85296 401d64 22 API calls 85295->85296 85300 40d809 85296->85300 85298 40d864 85297->85298 85620 404cbf 85298->85620 85803 40e937 65 API calls 85300->85803 85301 40d873 85624 405ce6 85301->85624 85304 40d87f 85627 401eef 85304->85627 85305 40d824 85804 40e155 65 API calls 85305->85804 85308 40d88b 85631 401eea 85308->85631 85310 40d894 85313 401eea 11 API calls 85310->85313 85311 401eea 11 API calls 85312 40dc9f 85311->85312 85543 433c94 GetModuleHandleW 85312->85543 85314 40d89d 85313->85314 85315 401d64 22 API calls 85314->85315 85316 40d8a6 85315->85316 85635 401ebd 85316->85635 85318 40d8b1 85319 401d64 22 API calls 85318->85319 85320 40d8ca 85319->85320 85321 401d64 22 API calls 85320->85321 85323 40d8e5 85321->85323 85322 40d946 85324 401d64 22 API calls 85322->85324 85340 40e134 85322->85340 85323->85322 85805 4085b4 28 API calls 85323->85805 85331 40d95d 85324->85331 85326 40d912 85327 401eef 11 API calls 85326->85327 85328 40d91e 85327->85328 85329 401eea 11 API calls 85328->85329 85332 40d927 85329->85332 85330 40d9a4 85639 40bed7 85330->85639 85331->85330 85335 4124b7 3 API calls 85331->85335 85806 4124b7 RegOpenKeyExA 85332->85806 85334 40d9aa 85336 40d82d 85334->85336 85642 41a463 85334->85642 85341 40d988 85335->85341 85336->85311 85339 40d9c5 85342 40da18 85339->85342 85659 40697b 85339->85659 85840 412902 30 API calls 85340->85840 85341->85330 85809 412902 30 API calls 85341->85809 85344 401d64 22 API calls 85342->85344 85347 40da21 85344->85347 85356 40da32 85347->85356 85357 40da2d 85347->85357 85349 40e14a 85841 4112b5 64 API calls ___scrt_fastfail 85349->85841 85350 40d9e4 85810 40699d 30 API calls 85350->85810 85351 40d9ee 85355 401d64 22 API calls 85351->85355 85364 40d9f7 85355->85364 85361 401d64 22 API calls 85356->85361 85813 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 85357->85813 85358 40d9e9 85811 4064d0 97 API calls 85358->85811 85362 40da3b 85361->85362 85663 41ae08 85362->85663 85364->85342 85367 40da13 85364->85367 85365 40da46 85667 401e18 85365->85667 85812 4064d0 97 API calls 85367->85812 85368 40da51 85671 401e13 85368->85671 85371 40da5a 85372 401d64 22 API calls 85371->85372 85373 40da63 85372->85373 85374 401d64 22 API calls 85373->85374 85375 40da7d 85374->85375 85376 401d64 22 API calls 85375->85376 85377 40da97 85376->85377 85378 401d64 22 API calls 85377->85378 85379 40dab0 85378->85379 85380 401d64 22 API calls 85379->85380 85411 40db1d 85379->85411 85384 40dac5 _wcslen 85380->85384 85381 40db2c 85382 401d64 22 API calls 85381->85382 85387 40dbb1 85381->85387 85383 40db3e 85382->85383 85385 401d64 22 API calls 85383->85385 85388 401d64 22 API calls 85384->85388 85384->85411 85389 40db50 85385->85389 85386 40dcaa ___scrt_fastfail 85816 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 85386->85816 85409 40dbac ___scrt_fastfail 85387->85409 85391 40dae0 85388->85391 85392 401d64 22 API calls 85389->85392 85393 401d64 22 API calls 85391->85393 85394 40db62 85392->85394 85395 40daf5 85393->85395 85397 401d64 22 API calls 85394->85397 85675 40c89e 85395->85675 85396 40dcef 85398 401d64 22 API calls 85396->85398 85401 40db8b 85397->85401 85399 40dd16 85398->85399 85817 401f66 85399->85817 85406 401d64 22 API calls 85401->85406 85403 401e18 11 API calls 85405 40db14 85403->85405 85410 401e13 11 API calls 85405->85410 85407 40db9c 85406->85407 85732 40bc67 85407->85732 85408 40dd25 85821 4126d2 14 API calls 85408->85821 85409->85387 85814 4128a2 31 API calls 85409->85814 85410->85411 85411->85381 85411->85386 85415 40dd3b 85417 401d64 22 API calls 85415->85417 85416 40dc45 ctype 85419 401d64 22 API calls 85416->85419 85418 40dd47 85417->85418 85822 43a5e7 39 API calls _swprintf 85418->85822 85422 40dc5c 85419->85422 85421 40dd54 85423 40dd81 85421->85423 85823 41beb0 87 API calls ___scrt_fastfail 85421->85823 85422->85396 85424 401d64 22 API calls 85422->85424 85428 401f66 28 API calls 85423->85428 85426 40dc7e 85424->85426 85429 41ae08 28 API calls 85426->85429 85427 40dd65 CreateThread 85427->85423 86001 41c96f 10 API calls 85427->86001 85430 40dd96 85428->85430 85431 40dc87 85429->85431 85432 401f66 28 API calls 85430->85432 85815 40e219 112 API calls 85431->85815 85434 40dda5 85432->85434 85824 41a686 79 API calls 85434->85824 85435 40dc8c 85435->85396 85437 40dc93 85435->85437 85437->85336 85438 40ddaa 85439 401d64 22 API calls 85438->85439 85440 40ddb6 85439->85440 85441 401d64 22 API calls 85440->85441 85442 40ddcb 85441->85442 85443 401d64 22 API calls 85442->85443 85444 40ddeb 85443->85444 85825 43a5e7 39 API calls _swprintf 85444->85825 85446 40ddf8 85447 401d64 22 API calls 85446->85447 85448 40de03 85447->85448 85449 401d64 22 API calls 85448->85449 85450 40de14 85449->85450 85451 401d64 22 API calls 85450->85451 85452 40de29 85451->85452 85453 401d64 22 API calls 85452->85453 85454 40de3a 85453->85454 85455 40de41 StrToIntA 85454->85455 85826 409517 144 API calls _wcslen 85455->85826 85457 40de53 85458 401d64 22 API calls 85457->85458 85460 40de5c 85458->85460 85459 40dea1 85463 401d64 22 API calls 85459->85463 85460->85459 85827 43360d 22 API calls 3 library calls 85460->85827 85462 40de71 85464 401d64 22 API calls 85462->85464 85468 40deb1 85463->85468 85465 40de84 85464->85465 85466 40de8b CreateThread 85465->85466 85466->85459 86004 419128 109 API calls __EH_prolog 85466->86004 85467 40def9 85469 401d64 22 API calls 85467->85469 85468->85467 85828 43360d 22 API calls 3 library calls 85468->85828 85475 40df02 85469->85475 85471 40dec6 85472 401d64 22 API calls 85471->85472 85473 40ded8 85472->85473 85476 40dedf CreateThread 85473->85476 85474 40df6c 85477 401d64 22 API calls 85474->85477 85475->85474 85478 401d64 22 API calls 85475->85478 85476->85467 86002 419128 109 API calls __EH_prolog 85476->86002 85480 40df75 85477->85480 85479 40df1e 85478->85479 85482 401d64 22 API calls 85479->85482 85481 40dfba 85480->85481 85485 401d64 22 API calls 85480->85485 85832 41a7a2 30 API calls 85481->85832 85483 40df33 85482->85483 85829 40c854 32 API calls 85483->85829 85486 40df8a 85485->85486 85491 401d64 22 API calls 85486->85491 85487 40dfc3 85488 401e18 11 API calls 85487->85488 85490 40dfce 85488->85490 85493 401e13 11 API calls 85490->85493 85495 40df9f 85491->85495 85492 40df46 85496 401e18 11 API calls 85492->85496 85494 40dfd7 CreateThread 85493->85494 85499 40e004 85494->85499 85500 40dff8 CreateThread 85494->85500 86003 40e54f 82 API calls 85494->86003 85830 43a5e7 39 API calls _swprintf 85495->85830 85498 40df52 85496->85498 85501 401e13 11 API calls 85498->85501 85502 40e019 85499->85502 85503 40e00d CreateThread 85499->85503 85500->85499 86005 410f36 139 API calls 85500->86005 85505 40df5b CreateThread 85501->85505 85507 40e073 85502->85507 85509 401f66 28 API calls 85502->85509 85503->85502 86006 411524 38 API calls ___scrt_fastfail 85503->86006 85505->85474 86000 40196b 49 API calls 85505->86000 85506 40dfac 85831 40b95c 7 API calls 85506->85831 85835 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 85507->85835 85510 40e046 85509->85510 85833 404c9e 28 API calls 85510->85833 85513 40e08b 85516 40e12a 85513->85516 85519 41ae08 28 API calls 85513->85519 85514 40e053 85515 401f66 28 API calls 85514->85515 85517 40e062 85515->85517 85838 40cbac 27 API calls 85516->85838 85834 41a686 79 API calls 85517->85834 85522 40e0a4 85519->85522 85521 40e12f 85839 413fd4 170 API calls 85521->85839 85836 412584 31 API calls 85522->85836 85523 40e067 85525 401eea 11 API calls 85523->85525 85525->85507 85527 40e0ba 85528 401e13 11 API calls 85527->85528 85531 40e0c5 85528->85531 85529 40e0ed DeleteFileW 85530 40e0f4 85529->85530 85529->85531 85533 41ae08 28 API calls 85530->85533 85531->85529 85531->85530 85532 40e0db Sleep 85531->85532 85532->85531 85534 40e104 85533->85534 85837 41297a RegOpenKeyExW RegDeleteValueW 85534->85837 85536 40e117 85537 401e13 11 API calls 85536->85537 85538 40e121 85537->85538 85539 401e13 11 API calls 85538->85539 85539->85516 85540->85235 85541->85242 85542->85239 85543->85249 85544->85251 85545->85254 85546->85229 85547->85232 85548->85236 85549->85258 85550->85260 85551->85263 85552->85261 85553->85268 85555 44ddd2 85554->85555 85557 44dddb 85554->85557 85559 44dcc8 48 API calls 4 library calls 85555->85559 85557->85272 85558->85272 85559->85557 85561 41bd22 LoadLibraryA GetProcAddress 85560->85561 85562 41bd12 GetModuleHandleA GetProcAddress 85560->85562 85563 41bd4b 32 API calls 85561->85563 85564 41bd3b LoadLibraryA GetProcAddress 85561->85564 85562->85561 85563->85277 85564->85563 85842 41a63f FindResourceA 85565->85842 85568 43a88c ___std_exception_copy 21 API calls 85569 40e192 _Yarn 85568->85569 85845 401f86 85569->85845 85572 401eef 11 API calls 85573 40e1b8 85572->85573 85574 401eea 11 API calls 85573->85574 85575 40e1c1 85574->85575 85576 43a88c ___std_exception_copy 21 API calls 85575->85576 85577 40e1d2 _Yarn 85576->85577 85849 406052 85577->85849 85579 40e205 85579->85279 85581 401fcc 85580->85581 85857 402501 85581->85857 85583 401fea 85583->85282 85585 41afd6 85584->85585 85588 41b048 85585->85588 85597 401eef 11 API calls 85585->85597 85600 401eea 11 API calls 85585->85600 85604 41b046 85585->85604 85862 403b60 28 API calls 85585->85862 85863 41bfa9 28 API calls 85585->85863 85586 401eea 11 API calls 85587 41b078 85586->85587 85589 401eea 11 API calls 85587->85589 85864 403b60 28 API calls 85588->85864 85592 41b080 85589->85592 85594 401eea 11 API calls 85592->85594 85593 41b054 85596 401eef 11 API calls 85593->85596 85595 40d7c6 85594->85595 85605 40e8bd 85595->85605 85598 41b05d 85596->85598 85597->85585 85599 401eea 11 API calls 85598->85599 85601 41b065 85599->85601 85600->85585 85865 41bfa9 28 API calls 85601->85865 85604->85586 85606 40e8ca 85605->85606 85608 40e8da 85606->85608 85866 40200a 11 API calls 85606->85866 85608->85287 85610 40200a 85609->85610 85614 40203a 85610->85614 85867 402654 11 API calls 85610->85867 85612 40202b 85868 4026ba 11 API calls _Deallocate 85612->85868 85614->85289 85616 401d6c 85615->85616 85617 401d74 85616->85617 85869 401fff 22 API calls 85616->85869 85617->85294 85621 404ccb 85620->85621 85870 402e78 85621->85870 85623 404cee 85623->85301 85879 404bc4 85624->85879 85626 405cf4 85626->85304 85628 401efe 85627->85628 85630 401f0a 85628->85630 85888 4021b9 11 API calls 85628->85888 85630->85308 85633 4021b9 85631->85633 85632 4021e8 85632->85310 85633->85632 85889 40262e 11 API calls _Deallocate 85633->85889 85637 401ec9 85635->85637 85636 401ee4 85636->85318 85637->85636 85638 402325 28 API calls 85637->85638 85638->85636 85890 401e8f 85639->85890 85641 40bee1 CreateMutexA GetLastError 85641->85334 85892 41b15b 85642->85892 85644 41a471 85896 412513 RegOpenKeyExA 85644->85896 85647 401eef 11 API calls 85648 41a49f 85647->85648 85649 401eea 11 API calls 85648->85649 85650 41a4a7 85649->85650 85651 41a4fa 85650->85651 85652 412513 31 API calls 85650->85652 85651->85339 85653 41a4cd 85652->85653 85654 41a4d8 StrToIntA 85653->85654 85655 41a4ef 85654->85655 85656 41a4e6 85654->85656 85658 401eea 11 API calls 85655->85658 85901 41c102 22 API calls 85656->85901 85658->85651 85660 40698f 85659->85660 85661 4124b7 3 API calls 85660->85661 85662 406996 85661->85662 85662->85350 85662->85351 85664 41ae1c 85663->85664 85902 40b027 85664->85902 85666 41ae24 85666->85365 85668 401e27 85667->85668 85670 401e33 85668->85670 85911 402121 11 API calls 85668->85911 85670->85368 85672 402121 85671->85672 85673 402150 85672->85673 85912 402718 11 API calls _Deallocate 85672->85912 85673->85371 85676 40c8ba 85675->85676 85677 40c8da 85676->85677 85678 40c90f 85676->85678 85680 40c8d0 85676->85680 85917 41a74b 29 API calls 85677->85917 85681 41b15b 2 API calls 85678->85681 85679 40ca03 GetLongPathNameW 85913 403b40 85679->85913 85680->85679 85684 40c914 85681->85684 85688 40c918 85684->85688 85689 40c96a 85684->85689 85685 40c8e3 85686 401e18 11 API calls 85685->85686 85727 40c8ed 85686->85727 85692 403b40 28 API calls 85688->85692 85691 403b40 28 API calls 85689->85691 85690 403b40 28 API calls 85693 40ca27 85690->85693 85694 40c978 85691->85694 85695 40c926 85692->85695 85920 40cc37 28 API calls 85693->85920 85700 403b40 28 API calls 85694->85700 85701 403b40 28 API calls 85695->85701 85696 401e13 11 API calls 85696->85680 85698 40ca3a 85921 402860 28 API calls 85698->85921 85704 40c98e 85700->85704 85702 40c93c 85701->85702 85918 402860 28 API calls 85702->85918 85703 40ca45 85922 402860 28 API calls 85703->85922 85919 402860 28 API calls 85704->85919 85708 40c999 85712 401e18 11 API calls 85708->85712 85709 40c947 85713 401e18 11 API calls 85709->85713 85710 40ca4f 85711 401e13 11 API calls 85710->85711 85714 40ca59 85711->85714 85715 40c9a4 85712->85715 85716 40c952 85713->85716 85717 401e13 11 API calls 85714->85717 85718 401e13 11 API calls 85715->85718 85719 401e13 11 API calls 85716->85719 85720 40ca62 85717->85720 85721 40c9ad 85718->85721 85722 40c95b 85719->85722 85723 401e13 11 API calls 85720->85723 85724 401e13 11 API calls 85721->85724 85725 401e13 11 API calls 85722->85725 85726 40ca6b 85723->85726 85724->85727 85725->85727 85728 401e13 11 API calls 85726->85728 85727->85696 85729 40ca74 85728->85729 85730 401e13 11 API calls 85729->85730 85731 40ca7d 85730->85731 85731->85403 85733 40bc7a _wcslen 85732->85733 85734 40bc84 85733->85734 85735 40bcce 85733->85735 85738 40bc8d CreateDirectoryW 85734->85738 85736 40c89e 32 API calls 85735->85736 85737 40bce0 85736->85737 85739 401e18 11 API calls 85737->85739 85924 40856b 85738->85924 85741 40bccc 85739->85741 85743 401e13 11 API calls 85741->85743 85742 40bca9 85958 4028cf 85742->85958 85748 40bcf7 85743->85748 85745 40bcb5 85746 401e18 11 API calls 85745->85746 85747 40bcc3 85746->85747 85749 401e13 11 API calls 85747->85749 85750 40bd10 85748->85750 85751 40bd2d 85748->85751 85749->85741 85754 40bb7b 31 API calls 85750->85754 85752 40bd36 CopyFileW 85751->85752 85753 40be07 85752->85753 85756 40bd48 _wcslen 85752->85756 85930 40bb7b 85753->85930 85755 40bd21 85754->85755 85755->85409 85756->85753 85758 40bd64 85756->85758 85759 40bdb7 85756->85759 85762 40c89e 32 API calls 85758->85762 85761 40c89e 32 API calls 85759->85761 85766 40bdbd 85761->85766 85765 40bd6a 85762->85765 85763 40be4d 85764 40be95 CloseHandle 85763->85764 85768 403b40 28 API calls 85763->85768 85956 401e07 85764->85956 85770 401e18 11 API calls 85765->85770 85769 401e18 11 API calls 85766->85769 85767 40be21 85771 40be2a SetFileAttributesW 85767->85771 85773 40be63 85768->85773 85775 40bdb1 85769->85775 85774 40bd76 85770->85774 85785 40be39 _wcslen 85771->85785 85779 41ae08 28 API calls 85773->85779 85780 401e13 11 API calls 85774->85780 85784 401e13 11 API calls 85775->85784 85776 40beb1 ShellExecuteW 85777 40bec4 85776->85777 85778 40bece ExitProcess 85776->85778 85781 40bed7 CreateMutexA GetLastError 85777->85781 85782 40be76 85779->85782 85783 40bd7f 85780->85783 85781->85755 85961 412774 RegCreateKeyW 85782->85961 85787 40856b 28 API calls 85783->85787 85786 40bdcf 85784->85786 85785->85763 85788 40be4a SetFileAttributesW 85785->85788 85792 40bddb CreateDirectoryW 85786->85792 85789 40bd93 85787->85789 85788->85763 85790 4028cf 28 API calls 85789->85790 85793 40bd9f 85790->85793 85794 401e07 85792->85794 85797 401e18 11 API calls 85793->85797 85796 40bdeb CopyFileW 85794->85796 85796->85753 85800 40bdf8 85796->85800 85799 40bda8 85797->85799 85798 401e13 11 API calls 85798->85764 85801 401e13 11 API calls 85799->85801 85800->85755 85801->85775 85802->85295 85803->85305 85805->85326 85807 4124e1 RegQueryValueExA RegCloseKey 85806->85807 85808 41250b 85806->85808 85807->85808 85808->85322 85809->85330 85810->85358 85811->85351 85812->85342 85813->85356 85814->85416 85815->85435 85816->85396 85818 401f6e 85817->85818 85995 402301 85818->85995 85821->85415 85822->85421 85823->85427 85824->85438 85825->85446 85826->85457 85827->85462 85828->85471 85829->85492 85830->85506 85831->85481 85832->85487 85833->85514 85834->85523 85835->85513 85836->85527 85837->85536 85838->85521 85999 419e89 105 API calls 85839->85999 85840->85349 85843 40e183 85842->85843 85844 41a65c LoadResource LockResource SizeofResource 85842->85844 85843->85568 85844->85843 85846 401f8e 85845->85846 85852 402325 85846->85852 85848 401fa4 85848->85572 85850 401f86 28 API calls 85849->85850 85851 406066 85850->85851 85851->85579 85853 40232f 85852->85853 85855 40233a 85853->85855 85856 40294a 28 API calls 85853->85856 85855->85848 85856->85855 85858 40250d 85857->85858 85860 40252b 85858->85860 85861 40261a 28 API calls 85858->85861 85860->85583 85861->85860 85862->85585 85863->85585 85864->85593 85865->85604 85866->85608 85867->85612 85868->85614 85872 402e85 85870->85872 85871 402ea9 85871->85623 85872->85871 85873 402e98 85872->85873 85875 402eae 85872->85875 85877 403445 28 API calls 85873->85877 85875->85871 85878 40225b 11 API calls 85875->85878 85877->85871 85878->85871 85880 404bd0 85879->85880 85883 40245c 85880->85883 85882 404be4 85882->85626 85884 402469 85883->85884 85886 402478 85884->85886 85887 402ad3 28 API calls 85884->85887 85886->85882 85887->85886 85888->85630 85889->85632 85891 401e94 85890->85891 85893 41b183 85892->85893 85894 41b168 GetCurrentProcess IsWow64Process 85892->85894 85893->85644 85894->85893 85895 41b17f 85894->85895 85895->85644 85897 412541 RegQueryValueExA RegCloseKey 85896->85897 85898 412569 85896->85898 85897->85898 85899 401f66 28 API calls 85898->85899 85900 41257e 85899->85900 85900->85647 85901->85655 85903 40b02f 85902->85903 85906 40b04b 85903->85906 85905 40b045 85905->85666 85907 40b055 85906->85907 85909 40b060 85907->85909 85910 40b138 28 API calls 85907->85910 85909->85905 85910->85909 85911->85670 85912->85673 85914 403b48 85913->85914 85923 403b7a 28 API calls 85914->85923 85916 403b5a 85916->85690 85917->85685 85918->85709 85919->85708 85920->85698 85921->85703 85922->85710 85923->85916 85925 408577 85924->85925 85967 402ca8 85925->85967 85929 4085a3 85929->85742 85931 40bba1 85930->85931 85932 40bbdd 85930->85932 85985 40b0dd 85931->85985 85935 40bc1e 85932->85935 85937 40b0dd 28 API calls 85932->85937 85936 40bc5f 85935->85936 85939 40b0dd 28 API calls 85935->85939 85936->85763 85936->85767 85940 40bbf4 85937->85940 85938 4028cf 28 API calls 85942 40bbbd 85938->85942 85943 40bc35 85939->85943 85941 4028cf 28 API calls 85940->85941 85944 40bbfe 85941->85944 85945 412774 14 API calls 85942->85945 85946 4028cf 28 API calls 85943->85946 85947 412774 14 API calls 85944->85947 85948 40bbd1 85945->85948 85949 40bc3f 85946->85949 85950 40bc12 85947->85950 85951 401e13 11 API calls 85948->85951 85952 412774 14 API calls 85949->85952 85953 401e13 11 API calls 85950->85953 85951->85932 85954 40bc53 85952->85954 85953->85935 85955 401e13 11 API calls 85954->85955 85955->85936 85957 401e0c 85956->85957 85991 402d8b 85958->85991 85960 4028dd 85960->85745 85962 4127c6 85961->85962 85963 412789 85961->85963 85964 401e13 11 API calls 85962->85964 85966 4127a2 RegSetValueExW RegCloseKey 85963->85966 85965 40be89 85964->85965 85965->85798 85966->85962 85968 402cb5 85967->85968 85969 402cc8 85968->85969 85971 402cd9 85968->85971 85972 402cde 85968->85972 85978 403374 28 API calls 85969->85978 85974 402de3 85971->85974 85972->85971 85979 402f21 11 API calls 85972->85979 85975 402daf 85974->85975 85980 4030f7 85975->85980 85977 402dcd 85977->85929 85978->85971 85979->85971 85981 403101 85980->85981 85983 403115 85981->85983 85984 4036c2 28 API calls 85981->85984 85983->85977 85984->85983 85986 40b0e9 85985->85986 85987 402ca8 28 API calls 85986->85987 85988 40b10c 85987->85988 85989 402de3 28 API calls 85988->85989 85990 40b11f 85989->85990 85990->85938 85992 402d97 85991->85992 85993 4030f7 28 API calls 85992->85993 85994 402dab 85993->85994 85994->85960 85996 40230d 85995->85996 85997 402325 28 API calls 85996->85997 85998 401f80 85997->85998 85998->85408 86007 411637 62 API calls 86005->86007 86008 482003c 86009 4820049 86008->86009 86023 4820e0f SetErrorMode SetErrorMode 86009->86023 86014 4820265 86015 48202ce VirtualProtect 86014->86015 86017 482030b 86015->86017 86016 4820439 VirtualFree 86021 48205f4 LoadLibraryA 86016->86021 86022 48204be 86016->86022 86017->86016 86018 48204e3 LoadLibraryA 86018->86022 86020 48208c7 86021->86020 86022->86018 86022->86021 86024 4820223 86023->86024 86025 4820d90 86024->86025 86026 4820dad 86025->86026 86027 4820dbb GetPEB 86026->86027 86028 4820238 VirtualAlloc 86026->86028 86027->86028 86028->86014 86029 2d93427 86030 2d93439 86029->86030 86031 2d936ef 86030->86031 86034 2d936ce 86030->86034 86035 2d936dd 86034->86035 86038 2d93e6e 86035->86038 86039 2d93e89 86038->86039 86040 2d93e92 CreateToolhelp32Snapshot 86039->86040 86041 2d93eae Module32First 86039->86041 86040->86039 86040->86041 86042 2d93ebd 86041->86042 86043 2d936cd 86041->86043 86045 2d93b2d 86042->86045 86046 2d93b58 86045->86046 86047 2d93b69 VirtualAlloc 86046->86047 86048 2d93ba1 86046->86048 86047->86048 86048->86048

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 384173800-625181639
                              • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                              • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 80 40d9a5-40d9ac call 40bed7 69->80 81 40d96d-40d98c call 401e8f call 4124b7 69->81 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 90 40d9b5-40d9bc 80->90 91 40d9ae-40d9b0 80->91 81->80 98 40d98e-40d9a4 call 401e8f call 412902 81->98 95 40d9c0-40d9cc call 41a463 90->95 96 40d9be 90->96 94 40dc95 91->94 94->49 103 40d9d5-40d9d9 95->103 104 40d9ce-40d9d0 95->104 96->95 98->80 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 117 40d9e0-40d9e2 108->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->107 138 40da03-40da09 121->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 166 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->166 167 40db2c-40db33 163->167 164->163 191 40dad7-40db03 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e 164->191 222 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 166->222 170 40dbb1-40dbbb call 4082d7 167->170 171 40db35-40dba7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 167->171 178 40dbc0-40dbe4 call 4022f8 call 4338c8 170->178 257 40dbac-40dbaf 171->257 198 40dbf3 178->198 199 40dbe6-40dbf1 call 436050 178->199 233 40db08-40db1d call 401e18 call 401e13 191->233 201 40dbf5-40dc6a call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 call 4338d1 call 401d64 call 40b125 198->201 199->201 201->222 272 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 201->272 273 40dd79-40dd7b 222->273 274 40dd5e 222->274 233->163 257->178 272->222 292 40dc93 272->292 276 40dd81 273->276 277 40dd7d-40dd7f 273->277 275 40dd60-40dd77 call 41beb0 CreateThread 274->275 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->94 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 343 40def9-40df0c call 401d64 call 401e8f 333->343 344 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->344 354 40df6c-40df7f call 401d64 call 401e8f 343->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 343->355 344->343 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                              APIs
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NujUXO42Rg.exe,00000104), ref: 0040D790
                                • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\NujUXO42Rg.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-I7G983$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                              • API String ID: 2830904901-2991491432
                              • Opcode ID: a1ff15d9cc6946923e3fd07c3e593f6ffd83a08701dcc982745cd88903272122
                              • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                              • Opcode Fuzzy Hash: a1ff15d9cc6946923e3fd07c3e593f6ffd83a08701dcc982745cd88903272122
                              • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                              Control-flow Graph

                              APIs
                              • _wcslen.LIBCMT ref: 0040BC75
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\NujUXO42Rg.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                              • _wcslen.LIBCMT ref: 0040BD54
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\NujUXO42Rg.exe,00000000,00000000), ref: 0040BDF2
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                              • _wcslen.LIBCMT ref: 0040BE34
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                              • ExitProcess.KERNEL32 ref: 0040BED0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\Desktop\NujUXO42Rg.exe$del$open$BG$BG
                              • API String ID: 1579085052-1283478889
                              • Opcode ID: 1dfc8a95e9f2fa8f15eef755b153a8034996a407d8c67b2864cbd51f99b60f53
                              • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                              • Opcode Fuzzy Hash: 1dfc8a95e9f2fa8f15eef755b153a8034996a407d8c67b2864cbd51f99b60f53
                              • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE

                              Control-flow Graph

                              APIs
                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                              • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                              • Opcode Fuzzy Hash: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                              • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 628 482003c-4820047 629 4820049 628->629 630 482004c-4820263 call 4820a3f call 4820e0f call 4820d90 VirtualAlloc 628->630 629->630 645 4820265-4820289 call 4820a69 630->645 646 482028b-4820292 630->646 651 48202ce-48203c2 VirtualProtect call 4820cce call 4820ce7 645->651 648 48202a1-48202b0 646->648 650 48202b2-48202cc 648->650 648->651 650->648 657 48203d1-48203e0 651->657 658 48203e2-4820437 call 4820ce7 657->658 659 4820439-48204b8 VirtualFree 657->659 658->657 661 48205f4-48205fe 659->661 662 48204be-48204cd 659->662 665 4820604-482060d 661->665 666 482077f-4820789 661->666 664 48204d3-48204dd 662->664 664->661 670 48204e3-4820505 LoadLibraryA 664->670 665->666 671 4820613-4820637 665->671 668 48207a6-48207b0 666->668 669 482078b-48207a3 666->669 672 48207b6-48207cb 668->672 673 482086e-48208be LoadLibraryA 668->673 669->668 674 4820517-4820520 670->674 675 4820507-4820515 670->675 676 482063e-4820648 671->676 677 48207d2-48207d5 672->677 680 48208c7-48208f9 673->680 678 4820526-4820547 674->678 675->678 676->666 679 482064e-482065a 676->679 681 48207d7-48207e0 677->681 682 4820824-4820833 677->682 683 482054d-4820550 678->683 679->666 684 4820660-482066a 679->684 685 4820902-482091d 680->685 686 48208fb-4820901 680->686 687 48207e2 681->687 688 48207e4-4820822 681->688 692 4820839-482083c 682->692 689 48205e0-48205ef 683->689 690 4820556-482056b 683->690 691 482067a-4820689 684->691 686->685 687->682 688->677 689->664 693 482056f-482057a 690->693 694 482056d 690->694 695 4820750-482077a 691->695 696 482068f-48206b2 691->696 692->673 697 482083e-4820847 692->697 699 482059b-48205bb 693->699 700 482057c-4820599 693->700 694->689 695->676 701 48206b4-48206ed 696->701 702 48206ef-48206fc 696->702 703 482084b-482086c 697->703 704 4820849 697->704 711 48205bd-48205db 699->711 700->711 701->702 705 482074b 702->705 706 48206fe-4820748 702->706 703->692 704->673 705->691 706->705 711->683
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0482024D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID: cess$kernel32.dll
                              • API String ID: 4275171209-1230238691
                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                              • Instruction ID: ae520b6acdc796ed282428cabec774cde4f4bd6a622a884b2d9b5b383059f3a5
                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                              • Instruction Fuzzy Hash: FB527974A01229DFDB64CF58C984BACBBB1BF09304F1485D9E90DAB351DB30AA84DF15

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 782494840-2070987746
                              • Opcode ID: e88cb0da0b8ed985f6c34966d645900f0d711e7af45109d797330bb8a4b17811
                              • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                              • Opcode Fuzzy Hash: e88cb0da0b8ed985f6c34966d645900f0d711e7af45109d797330bb8a4b17811
                              • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 736 412774-412787 RegCreateKeyW 737 4127c6 736->737 738 412789-4127c4 call 4022f8 call 401e07 RegSetValueExW RegCloseKey 736->738 739 4127c8-4127d4 call 401e13 737->739 738->739
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                              • RegSetValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,74DF37E0,?), ref: 004127AD
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,74DF37E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 1818849710-1051519024
                              • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                              • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                              • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                              • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 746 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                              • GetLastError.KERNEL32 ref: 0040BEF1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: Rmc-I7G983
                              • API String ID: 1925916568-3173645232
                              • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                              • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 749 412513-41253f RegOpenKeyExA 750 412541-412567 RegQueryValueExA RegCloseKey 749->750 751 412572 749->751 750->751 752 412569-412570 750->752 753 412577-412583 call 401f66 751->753 752->753
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                              • RegCloseKey.ADVAPI32(?), ref: 0041255F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 1596a47d3a3a9d7b824bf65cdf317066f9d5dabbc4d5e1023ecf94da71e9672a
                              • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                              • Opcode Fuzzy Hash: 1596a47d3a3a9d7b824bf65cdf317066f9d5dabbc4d5e1023ecf94da71e9672a
                              • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 756 4124b7-4124df RegOpenKeyExA 757 4124e1-412509 RegQueryValueExA RegCloseKey 756->757 758 41250f-412512 756->758 757->758 759 41250b-41250e 757->759
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                              • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                              • RegCloseKey.ADVAPI32(00000000), ref: 00412500
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                              • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                              • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                              • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 788 2d93e6e-2d93e87 789 2d93e89-2d93e8b 788->789 790 2d93e8d 789->790 791 2d93e92-2d93e9e CreateToolhelp32Snapshot 789->791 790->791 792 2d93eae-2d93ebb Module32First 791->792 793 2d93ea0-2d93ea6 791->793 794 2d93ebd-2d93ebe call 2d93b2d 792->794 795 2d93ec4-2d93ecc 792->795 793->792 798 2d93ea8-2d93eac 793->798 799 2d93ec3 794->799 798->789 798->792 799->795
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02D93E96
                              • Module32First.KERNEL32(00000000,00000224), ref: 02D93EB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2074953120.0000000002D93000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D93000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2d93000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFirstModule32SnapshotToolhelp32
                              • String ID:
                              • API String ID: 3833638111-0
                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                              • Instruction ID: 27d9ce6fcea5873443de6cd40abb749fd2488c22e134e259a10cbfad58a32330
                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                              • Instruction Fuzzy Hash: 00F096315007157BDB603BF9988DB6FB6EDEF49628F100668F656D11C0DB70EC458A61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 801 43360d-433610 802 43361f-433622 call 43a88c 801->802 804 433627-43362a 802->804 805 433612-43361d call 442200 804->805 806 43362c-43362d 804->806 805->802 809 43362e-433632 805->809 810 433638-433dec call 433d58 call 437bd7 809->810 811 433ded-433e09 call 433d8b call 437bd7 809->811 810->811
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,1DC,?,00475B70,00473D54,00000000,?,?,?,?,00434431,?,0046D680,?), ref: 00437C37
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw$ExceptionRaise
                              • String ID:
                              • API String ID: 3476068407-0
                              • Opcode ID: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                              • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                              • Opcode Fuzzy Hash: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                              • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 821 4820e0f-4820e24 SetErrorMode * 2 822 4820e26 821->822 823 4820e2b-4820e2c 821->823 822->823
                              APIs
                              • SetErrorMode.KERNEL32(00000400,?,?,04820223,?,?), ref: 04820E19
                              • SetErrorMode.KERNEL32(00000000,?,?,04820223,?,?), ref: 04820E1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                              • Instruction ID: c305c479093041c3bdcac86e1ef893677768c67fdbd7ad2a11b9be042c951924
                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                              • Instruction Fuzzy Hash: BFD0123554512877D7402A94DC09BCD7B1CDF05B62F008411FB0DD9080C770958046E5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 824 446aff-446b0b 825 446b3d-446b48 call 445354 824->825 826 446b0d-446b0f 824->826 834 446b4a-446b4c 825->834 827 446b11-446b12 826->827 828 446b28-446b39 RtlAllocateHeap 826->828 827->828 830 446b14-446b1b call 4447c5 828->830 831 446b3b 828->831 830->825 836 446b1d-446b26 call 442200 830->836 831->834 836->825 836->828
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                              • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                              • Opcode Fuzzy Hash: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                              • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02D93B7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2074953120.0000000002D93000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D93000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2d93000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                              • Instruction ID: 2725922849fdd1271dfd5950b7119a76562023d47cf8705611557ca4db276e5a
                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                              • Instruction Fuzzy Hash: 0C112A79A00208EFDB01DF98C985E99BBF5AB08751F0580A4F9489B361D771EE50DF90
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00406F28
                              • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                              • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                              • DeleteFileA.KERNEL32(?), ref: 004078CC
                                • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                              • Sleep.KERNEL32(000007D0), ref: 00407976
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                              • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                              • API String ID: 2918587301-599666313
                              • Opcode ID: 9a15827bd24817051f436399961fd68acc86d8e2997dd34e00856f413e44d905
                              • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                              • Opcode Fuzzy Hash: 9a15827bd24817051f436399961fd68acc86d8e2997dd34e00856f413e44d905
                              • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040508E
                                • Part of subcall function 004334CF: RtlEnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                • Part of subcall function 004334CF: RtlLeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • __Init_thread_footer.LIBCMT ref: 004050CB
                              • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                              • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                • Part of subcall function 00433519: RtlEnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                • Part of subcall function 00433519: RtlLeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                              • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                              • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                              • CloseHandle.KERNEL32 ref: 004053CD
                              • CloseHandle.KERNEL32 ref: 004053D5
                              • CloseHandle.KERNEL32 ref: 004053E7
                              • CloseHandle.KERNEL32 ref: 004053EF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                              • API String ID: 3815868655-81343324
                              • Opcode ID: c5c09687d3ce8ba3b19f17c738b5b17e725b4404aabd455067d64443beff36a9
                              • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                              • Opcode Fuzzy Hash: c5c09687d3ce8ba3b19f17c738b5b17e725b4404aabd455067d64443beff36a9
                              • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                              • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                              • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                              • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                              • API String ID: 65172268-860466531
                              • Opcode ID: adaa9fb169fe2fe8fa98b09ed0668446b58a4a76235086f53fe23a7376718d8f
                              • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                              • Opcode Fuzzy Hash: adaa9fb169fe2fe8fa98b09ed0668446b58a4a76235086f53fe23a7376718d8f
                              • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                              • FindClose.KERNEL32(00000000), ref: 0040B3CE
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                              • FindClose.KERNEL32(00000000), ref: 0040B517
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: 78a4f7fb66d787970a0bf18600c8ccb88fdf8ed5ac5b584e140d8ddb0ed06a7c
                              • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                              • Opcode Fuzzy Hash: 78a4f7fb66d787970a0bf18600c8ccb88fdf8ed5ac5b584e140d8ddb0ed06a7c
                              • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                              APIs
                              • NtdllDefWindowProc_A.USER32(?,00000401,?,?), ref: 0041CAE9
                              • GetCursorPos.USER32(?), ref: 0041CAF8
                              • SetForegroundWindow.USER32(?), ref: 0041CB01
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                              • Shell_NotifyIcon.SHELL32(00000002,00473B50), ref: 0041CB6C
                              • ExitProcess.KERNEL32 ref: 0041CB74
                              • CreatePopupMenu.USER32 ref: 0041CB7A
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyNtdllProc_ProcessShell_Track
                              • String ID: Close
                              • API String ID: 1665278180-3535843008
                              • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                              • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                              • FindClose.KERNEL32(00000000), ref: 0040B5CC
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                              • FindClose.KERNEL32(00000000), ref: 0040B6B2
                              • FindClose.KERNEL32(00000000), ref: 0040B6D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: dfda46c9da88e5f5c7af2569cc6d00432efb1fda1eafbf05cf9aa8478aed5afa
                              • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                              • Opcode Fuzzy Hash: dfda46c9da88e5f5c7af2569cc6d00432efb1fda1eafbf05cf9aa8478aed5afa
                              • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                              • API String ID: 726551946-3025026198
                              • Opcode ID: 4fda8678cbac27d1af90533ff54506dffeaab509ab256e2c325817d36ac92b7c
                              • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                              • Opcode Fuzzy Hash: 4fda8678cbac27d1af90533ff54506dffeaab509ab256e2c325817d36ac92b7c
                              • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                              APIs
                              • OpenClipboard.USER32 ref: 004159C7
                              • EmptyClipboard.USER32 ref: 004159D5
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                              • GlobalLock.KERNEL32(00000000), ref: 004159FE
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                              • CloseClipboard.USER32 ref: 00415A5A
                              • OpenClipboard.USER32 ref: 00415A61
                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                              • CloseClipboard.USER32 ref: 00415A89
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID:
                              • API String ID: 3520204547-0
                              • Opcode ID: 38b11ad5bd757e53a43aea6c220e1f39fd1244b007b880f1396c9413ffd5f7bd
                              • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                              • Opcode Fuzzy Hash: 38b11ad5bd757e53a43aea6c220e1f39fd1244b007b880f1396c9413ffd5f7bd
                              • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                              APIs
                              • NtdllDefWindowProc_A.NTDLL(?,00000401,?,?), ref: 0483CD50
                              • GetCursorPos.USER32(?), ref: 0483CD5F
                              • SetForegroundWindow.USER32(?), ref: 0483CD68
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0483CD82
                              • Shell_NotifyIcon.SHELL32(00000002,00473B50), ref: 0483CDD3
                              • ExitProcess.KERNEL32 ref: 0483CDDB
                              • CreatePopupMenu.USER32 ref: 0483CDE1
                              • AppendMenuA.USER32(00000000,00000000,00000000,0046C11C), ref: 0483CDF6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyNtdllProc_ProcessShell_Track
                              • String ID:
                              • API String ID: 1665278180-0
                              • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction ID: 6831358c5a7a680409209246e151745a83f3e562dbfc652681d34e1190c59827
                              • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction Fuzzy Hash: DA21C932104209EFDB155F64ED0EAA93F65EB04343F044634F906E5072D7B5EA60FB58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7
                              • API String ID: 0-3177665633
                              • Opcode ID: 9d1ee28b009df54e83312a71c1eb77ee70c0996eb461e0f881c0dd81708dd983
                              • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                              • Opcode Fuzzy Hash: 9d1ee28b009df54e83312a71c1eb77ee70c0996eb461e0f881c0dd81708dd983
                              • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                              APIs
                              • GetForegroundWindow.USER32 ref: 00409B3F
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                              • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                              • GetKeyState.USER32(00000010), ref: 00409B5C
                              • GetKeyboardState.USER32(?), ref: 00409B67
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID: 8[G
                              • API String ID: 1888522110-1691237782
                              • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                              • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                              • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                              • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                              APIs
                              • _wcslen.LIBCMT ref: 00406788
                              • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                              • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                              • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                              • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                              • GetLastError.KERNEL32 ref: 00419935
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                              • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                              • Opcode Fuzzy Hash: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                              • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 04839B3F
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 04839B8E
                              • GetLastError.KERNEL32 ref: 04839B9C
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 04839BD4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: e61e99f355a85b792043c415c774071641b882a3dc166781f1924c38db1b4eec
                              • Instruction ID: d70ea16e270f9001afa3caf0556054bcc48b747970bdc02844fdc614a3ff2785
                              • Opcode Fuzzy Hash: e61e99f355a85b792043c415c774071641b882a3dc166781f1924c38db1b4eec
                              • Instruction Fuzzy Hash: 73812D71108354ABD314FB25DD90AAFB7A8BF94709F504E2DF582C2190EEB4BA45CB93
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                              • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                              • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                              • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0483B6F0
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0483B722
                              • SetFileAttributesW.KERNEL32(?,00000080), ref: 0483B790
                              • DeleteFileW.KERNEL32(?), ref: 0483B79D
                                • Part of subcall function 0483B696: RemoveDirectoryW.KERNEL32(?), ref: 0483B773
                              • FindClose.KERNEL32(00000000), ref: 0483B7C8
                              • RemoveDirectoryW.KERNEL32(00000000), ref: 0483B7CF
                              • GetLastError.KERNEL32 ref: 0483B7D7
                              • FindClose.KERNEL32(00000000), ref: 0483B7EA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 5c62029e558c151831161c7648b51b3c9b0b43d71b7e0bfa42328357c6cc7f75
                              • Instruction ID: cf41745d516165695f760877418627f58f2073bdacdc8eeda1e9be694b7d76fc
                              • Opcode Fuzzy Hash: 5c62029e558c151831161c7648b51b3c9b0b43d71b7e0bfa42328357c6cc7f75
                              • Instruction Fuzzy Hash: F33140B280521C9ADB20DBB49C88FEA77BCAF05305F440AE6F545D2052EB75F784CB65
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: @CG$XCG$`HG$`HG$>G
                              • API String ID: 341183262-3780268858
                              • Opcode ID: d94125ae7fd3f2ee2e10a22e5fda63dd0ec51cb539db05509f919187017c6563
                              • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                              • Opcode Fuzzy Hash: d94125ae7fd3f2ee2e10a22e5fda63dd0ec51cb539db05509f919187017c6563
                              • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                              • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                              • GetLastError.KERNEL32 ref: 00409A1B
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                              • TranslateMessage.USER32(?), ref: 00409A7A
                              • DispatchMessageA.USER32(?), ref: 00409A85
                              Strings
                              • Keylogger initialization failure: error , xrefs: 00409A32
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error
                              • API String ID: 3219506041-952744263
                              • Opcode ID: 1fbea82a67dbc65da41edf1648a2d0f25a5edb0bf8d0fa79a3fdd58f131edb45
                              • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                              • Opcode Fuzzy Hash: 1fbea82a67dbc65da41edf1648a2d0f25a5edb0bf8d0fa79a3fdd58f131edb45
                              • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00465F1C), ref: 0482B61B
                              • FindClose.KERNEL32(00000000), ref: 0482B635
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0482B758
                              • FindClose.KERNEL32(00000000), ref: 0482B77E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 5b02bdbcf4a37e1aca2b174e4fdcca7b9d7d4ca2704527aaaf21edbe9df3a355
                              • Instruction ID: bc0a643991864c89cfc058e2fa34995a254fd7a936ea105bbac0e239969e0a24
                              • Opcode Fuzzy Hash: 5b02bdbcf4a37e1aca2b174e4fdcca7b9d7d4ca2704527aaaf21edbe9df3a355
                              • Instruction Fuzzy Hash: AA5151319041295BEB15FBB8DD55EED7738AF10308F500AA9E905F20A1EFB07AC58A56
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                              • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: 1383009a34bb50af53acedb3920a2c92360f3de8c08752c77f9db60bdc6b10ad
                              • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                              • Opcode Fuzzy Hash: 1383009a34bb50af53acedb3920a2c92360f3de8c08752c77f9db60bdc6b10ad
                              • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 04839126
                                • Part of subcall function 0483B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B89A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateFindFirst
                              • String ID: @CG$XCG$`HG$`HG$>G
                              • API String ID: 41799849-3780268858
                              • Opcode ID: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                              • Instruction ID: 4eacb447ffce857b698fd23f41444ef2cd36880c23a4664d2f99f004a6e7a09a
                              • Opcode Fuzzy Hash: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                              • Instruction Fuzzy Hash: D3815F715042605BE314FB68CA64EEF73A4AF90304F404F6DE956D71A0EFB4BA89C693
                              APIs
                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                              • Sleep.KERNEL32(00000BB8), ref: 0040E603
                              • ExitProcess.KERNEL32 ref: 0040E672
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.3.0 Pro$override$pth_unenc$BG
                              • API String ID: 2281282204-3981147832
                              • Opcode ID: e7420bd81adcf7ecaeb63c441a7eb2a496d40f418d65372005f5d4e07d0bafb2
                              • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                              • Opcode Fuzzy Hash: e7420bd81adcf7ecaeb63c441a7eb2a496d40f418d65372005f5d4e07d0bafb2
                              • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                              • GetLastError.KERNEL32 ref: 0040B261
                              Strings
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                              • UserProfile, xrefs: 0040B227
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                              • [Chrome StoredLogins not found], xrefs: 0040B27B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: 031224eb9f8915bde11f0ec11fc55aef704c685d7406ebe200c0be158843b9d2
                              • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                              • Opcode Fuzzy Hash: 031224eb9f8915bde11f0ec11fc55aef704c685d7406ebe200c0be158843b9d2
                              • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                              • GetLastError.KERNEL32 ref: 00416B02
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                              • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                              • Instruction ID: 57cc16b57fb9b80973019f24a4c29afa226e887048a240d5689d112d8919aadd
                              • Opcode Fuzzy Hash: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                              • Instruction Fuzzy Hash: 08C26F72D046288FDB25CE28DD407EAB7B5EB44346F1441EBD84DE7242E778AE898F44
                              APIs
                              • __EH_prolog.LIBCMT ref: 004089AE
                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                              • String ID:
                              • API String ID: 4043647387-0
                              • Opcode ID: 1e78a88116ea8d496e813354f772be348f92b535d15e4db1afdcf643b5c19832
                              • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                              • Opcode Fuzzy Hash: 1e78a88116ea8d496e813354f772be348f92b535d15e4db1afdcf643b5c19832
                              • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                              • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                              • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                              • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                              APIs
                                • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                              • GetProcAddress.KERNEL32(00000000), ref: 00415977
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-1420736420
                              • Opcode ID: 4a934245ae85d1e6c5e11647dbf85dabed8ff73be9ee259f9043e3cbcdb2c03e
                              • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                              • Opcode Fuzzy Hash: 4a934245ae85d1e6c5e11647dbf85dabed8ff73be9ee259f9043e3cbcdb2c03e
                              • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                              APIs
                              • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                              • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                              • GetACP.KERNEL32 ref: 004512BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                              • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                              APIs
                              • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 048714E3
                              • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0487150C
                              • GetACP.KERNEL32 ref: 04871521
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction ID: d265d8a9abea8ca8bd7ff9d86a4fe27c04de3e444c74a88a300435f69670ddb3
                              • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction Fuzzy Hash: 8C21D622740104A6D734CF54C928AA773ABEF44B65F5A8F64E90ADBB10F732FA41D390
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                              • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                              • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                              • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                              • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                              APIs
                              • __EH_prolog.LIBCMT ref: 04829013
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 0482908B
                              • FindNextFileW.KERNEL32(00000000,?), ref: 048290B4
                              • FindClose.KERNEL32(?), ref: 048290CB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: cae9dc3e290e62eb3ac1bcabecde37f344aa65a3c2dada11a4f4a429893bb3a7
                              • Instruction ID: 0830ce594cdeb308dafb31563cebda2d4e6b8ae1067bc5b3f1ce2ed46a4954d0
                              • Opcode Fuzzy Hash: cae9dc3e290e62eb3ac1bcabecde37f344aa65a3c2dada11a4f4a429893bb3a7
                              • Instruction Fuzzy Hash: 3E8154729001289BDB15FBA8DE90EED7778AF10314F1047AAD416E70A0EF747B85CB51
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                              • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                              • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                              • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                              • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID:
                              • API String ID: 745075371-0
                              • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                              • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                                • Part of subcall function 04867126: _free.LIBCMT ref: 04867185
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 04867192
                              • GetUserDefaultLCID.KERNEL32 ref: 0487172A
                              • IsValidCodePage.KERNEL32(00000000), ref: 04871785
                              • IsValidLocale.KERNEL32(?,00000001), ref: 04871794
                              • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 048717DC
                              • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 048717FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID:
                              • API String ID: 745075371-0
                              • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction ID: 980ffb84b1883c1245ffa7c3dacaf488458476cc1d79e468a96ab36a180f2ebc
                              • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction Fuzzy Hash: 7951B971A002099FEB10DFA4CC98ABE77B9EF04745F044A79E915EB694EB70E940CB61
                              APIs
                              • __EH_prolog.LIBCMT ref: 00407A91
                              • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: ae2f9336e2b536fcca37d1515f3fccbc5794d6336441985431570f766e098a52
                              • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                              • Opcode Fuzzy Hash: ae2f9336e2b536fcca37d1515f3fccbc5794d6336441985431570f766e098a52
                              • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                              APIs
                              • __EH_prolog.LIBCMT ref: 04827CF8
                              • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04827DB1
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04827DD5
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04827EDD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                              • Instruction ID: 5cb07db1d1aaeb5c2d7f599fd68d39e1c578b2324346bf27181a3a5a481d6a51
                              • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                              • Instruction Fuzzy Hash: 3D516572900119ABDF04FBA8DE559ED7778AF10348F500B59A806E7190EF74BB89CB92
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 04836D2B
                              • OpenProcessToken.ADVAPI32(00000000), ref: 04836D32
                              • LookupPrivilegeValueA.ADVAPI32(00000000,0046BA18,?), ref: 04836D44
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 04836D63
                              • GetLastError.KERNEL32 ref: 04836D69
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID:
                              • API String ID: 3534403312-0
                              • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                              • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe$open
                              • API String ID: 2825088817-2160947846
                              • Opcode ID: 7bbef4f0a9aaf0e4763c0af5c4ac1283b7885e237de53885e1a1d9711ed2488a
                              • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                              • Opcode Fuzzy Hash: 7bbef4f0a9aaf0e4763c0af5c4ac1283b7885e237de53885e1a1d9711ed2488a
                              • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                              APIs
                                • Part of subcall function 0483271E: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 0483273E
                                • Part of subcall function 0483271E: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 0483275C
                                • Part of subcall function 0483271E: RegCloseKey.ADVAPI32(00000000), ref: 04832767
                              • Sleep.KERNEL32(00000BB8), ref: 0482E86A
                              • ExitProcess.KERNEL32 ref: 0482E8D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: pth_unenc$BG
                              • API String ID: 2281282204-2233081382
                              • Opcode ID: 893b02ec2893ac076e1b48ec4804a82b241512304dbf54cdddd5c3cf734e141d
                              • Instruction ID: 53fa65d2e9008f63afc2afe931bcaab8ef0d2470dd98014d9035b8ae186c75e7
                              • Opcode Fuzzy Hash: 893b02ec2893ac076e1b48ec4804a82b241512304dbf54cdddd5c3cf734e141d
                              • Instruction Fuzzy Hash: 92210B21B0022027F604777D9E15F7E3599AB80609F500F68F815D72C5FED5BA8083EB
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: x@G$x@G
                              • API String ID: 4113138495-3390264752
                              • Opcode ID: 089730e36f5153ba7641c1985eea7d34b11eb44061c97df73c2efdc6532b0b23
                              • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                              • Opcode Fuzzy Hash: 089730e36f5153ba7641c1985eea7d34b11eb44061c97df73c2efdc6532b0b23
                              • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 04826D44
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 04826E0C
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: x@G$x@G
                              • API String ID: 4113138495-3390264752
                              • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                              • Instruction ID: 8198a2a95be0834c96498932d0051cbf7196fa07ebdf583c0520409f72dde102
                              • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                              • Instruction Fuzzy Hash: 782170311042645BE314FB68DE54DAF77A8AF80358F400F69E586E2190EF75BA88CA53
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                              • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                              • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                              • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                              • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                              • Opcode Fuzzy Hash: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                              • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                              • _wcschr.LIBVCRUNTIME ref: 00450BF1
                              • _wcschr.LIBVCRUNTIME ref: 00450BFF
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                              • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                              • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                              • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                              • IsValidCodePage.KERNEL32(00000000), ref: 04870DC8
                              • _wcschr.LIBVCRUNTIME ref: 04870E58
                              • _wcschr.LIBVCRUNTIME ref: 04870E66
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 04870F09
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                              • Instruction ID: 770aa8648ea95cf2e5213978f1f272d1eb651e7d80b3ab210ef402d58a664513
                              • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                              • Instruction Fuzzy Hash: 9561FC72A00305AAE724AF78CC55FB677A8EF46714F144F6AE905DB180FBB4F5408762
                              APIs
                              • __EH_prolog.LIBCMT ref: 00408DAC
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstH_prologNext
                              • String ID:
                              • API String ID: 301083792-0
                              • Opcode ID: b98001833b424a8e13902b03ced749a154e3db440a151ea28f75177239e4d3a3
                              • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                              • Opcode Fuzzy Hash: b98001833b424a8e13902b03ced749a154e3db440a151ea28f75177239e4d3a3
                              • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                              APIs
                              • _free.LIBCMT ref: 00448067
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • GetTimeZoneInformation.KERNEL32 ref: 00448079
                              • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                              • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                              • String ID:
                              • API String ID: 806657224-0
                              • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                              • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                              • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                              • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                              • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                              • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                              • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                              APIs
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 04835BC2
                              • LoadLibraryA.KERNEL32(0046B9C0,0046B9B0), ref: 04835BD7
                              • GetProcAddress.KERNEL32(00000000), ref: 04835BDE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressExitLibraryLoadProcWindows
                              • String ID:
                              • API String ID: 1366546845-0
                              • Opcode ID: 8e87e24a53ed8da24effc80685a90e9af26916bb391603b6d9938ccb756c893d
                              • Instruction ID: 1fecc007792a4ef24705b74b6e56872e6e26240ca041657ac84abf3a6735e6f1
                              • Opcode Fuzzy Hash: 8e87e24a53ed8da24effc80685a90e9af26916bb391603b6d9938ccb756c893d
                              • Instruction Fuzzy Hash: 6C21CA706443156BEB14F7B8895CA6E2399AF40388F100E69A902D75C0FFB4F98A9353
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                              • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0485A9BC
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0485A9C6
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0485A9D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction ID: fbd5ebbb9c619ced5387fd2af7ff40497ddd834f4d6e6d366fbc3f6273b785f4
                              • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction Fuzzy Hash: B531C6759013289BCB21DF68D8887DCB7B8BF08710F5046EAE81CA7260E7709B818F45
                              APIs
                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                              APIs
                              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,00471B2C,00000000,0485282C,00000034,00471B2C,?,?), ref: 04852BB3
                              • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,048528BE,00000000,?,00000000), ref: 04852BC9
                              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,048528BE,00000000,?,00000000,0483D9C7), ref: 04852BDB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction ID: 74f2c988f886f7eaecb864b7e6a0e856ee62e5c74b0882cb8bc0c6390cd6a0d0
                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction Fuzzy Hash: 14E06D3130C210FBEB310F15BC08F663A949B81B75F600BB8B651E40F4DA6194409959
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                              • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                              • ExitProcess.KERNEL32 ref: 0044258E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                              • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                              APIs
                              • GetCurrentProcess.KERNEL32(00000000,?,04862791,00000000,0046DAE0,0000000C,048628E8,00000000,00000002,00000000), ref: 048627DC
                              • TerminateProcess.KERNEL32(00000000,?,04862791,00000000,0046DAE0,0000000C,048628E8,00000000,00000002,00000000), ref: 048627E3
                              • ExitProcess.KERNEL32 ref: 048627F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction ID: 12dd94452d58c6cfd675106ad666bc941e0c28b63200657d8789c49f04e591e7
                              • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction Fuzzy Hash: 91E0B636004208EFCF517F55ED08A893B69EB50246F008AB4F84A8A532CB75E982DA94
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3,00000000), ref: 0041ACCC
                              • NtSuspendProcess.NTDLL(00000000), ref: 0041ACD9
                              • CloseHandle.KERNEL32(00000000,?,?,004150C3,00000000), ref: 0041ACE2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenSuspend
                              • String ID:
                              • API String ID: 1999457699-0
                              • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                              • Instruction ID: f0940f0a464cb9da12e036c8bcda16370f3965740af83b573a45ae51f9acba0f
                              • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                              • Instruction Fuzzy Hash: E7D0A733605131638221176A7C0CC87EE6CDFC1EB37024136F404C3220DA30C84186F4
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8,00000000), ref: 0041ACF8
                              • NtResumeProcess.NTDLL(00000000), ref: 0041AD05
                              • CloseHandle.KERNEL32(00000000,?,?,004150E8,00000000), ref: 0041AD0E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenResume
                              • String ID:
                              • API String ID: 3614150671-0
                              • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                              • Instruction ID: b64f47c6af987b25b68fadd97e6a7e629856a7b738c344dffca8a71896aa998e
                              • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                              • Instruction Fuzzy Hash: DFD0A733504132638220176A7C0CC87EDADDFC5EB37024236F404C3621DA34C841C6F4
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0483532A,00000000), ref: 0483AF33
                              • NtSuspendProcess.NTDLL(00000000), ref: 0483AF40
                              • CloseHandle.KERNEL32(00000000,?,?,0483532A,00000000), ref: 0483AF49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenSuspend
                              • String ID:
                              • API String ID: 1999457699-0
                              • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                              • Instruction ID: cdea2c4c31ffb17dca740e382274fdc75ee226fa9b3ac2ffc4a2fae6425b4460
                              • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                              • Instruction Fuzzy Hash: 39D0A733508131638220176A7C0CC97EE6CDFC1EB37024275F808D3220DA30C84187F4
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0483534F,00000000), ref: 0483AF5F
                              • NtResumeProcess.NTDLL(00000000), ref: 0483AF6C
                              • CloseHandle.KERNEL32(00000000,?,?,0483534F,00000000), ref: 0483AF75
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenResume
                              • String ID:
                              • API String ID: 3614150671-0
                              • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                              • Instruction ID: 221fcb6db309bbd40e5df0c8e3725b196f0e6d7f371d9a5eaeb038de76b1bf7b
                              • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                              • Instruction Fuzzy Hash: EAD05E32508121638220176A7C0C887EDA8DBC6AB37024235F805C21209A20D84186E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .$GetProcAddress.$l
                              • API String ID: 0-2784972518
                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                              • Instruction ID: 8187e9d5fc2642250b8ef033f37b768ca7b94207ba16212c6361619c847e4065
                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                              • Instruction Fuzzy Hash: CF318BB2900229DFEB11CF88C980AADBBF5FF09328F14454AD501E7210D370FA85CBA4
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0483BED3
                                • Part of subcall function 04832939: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 04832948
                                • Part of subcall function 04832939: RegSetValueExA.ADVAPI32(004655B0,0046BE08,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0483BEAD,0046BE08,004655B0,00000001,00473EE8,00000000), ref: 04832970
                                • Part of subcall function 04832939: RegCloseKey.ADVAPI32(004655B0,?,?,0483BEAD,0046BE08,004655B0,00000001,00473EE8,00000000,?,04827C44,00000001), ref: 0483297B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 4127273184-27424756
                              • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                              • Instruction ID: 89d7cca0e53ae2d4f581148195d8f51c1ec04fc170693488163e8e07e877556d
                              • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                              • Instruction Fuzzy Hash: F3118762F8021032E915303D4E1BF6E2906D746B56F900A5AFB02BE7C6FAC7769003DB
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0483BED3
                                • Part of subcall function 04832939: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 04832948
                                • Part of subcall function 04832939: RegSetValueExA.ADVAPI32(004655B0,0046BE08,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0483BEAD,0046BE08,004655B0,00000001,00473EE8,00000000), ref: 04832970
                                • Part of subcall function 04832939: RegCloseKey.ADVAPI32(004655B0,?,?,0483BEAD,0046BE08,004655B0,00000001,00473EE8,00000000,?,04827C44,00000001), ref: 0483297B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 4127273184-27424756
                              • Opcode ID: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                              • Instruction ID: 1cc7840847f450e6652eae20838caf972ee3599dc516c35d71e2e2acd36e6624
                              • Opcode Fuzzy Hash: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                              • Instruction Fuzzy Hash: E6F0F673B8012022E929347C4E1FFAE1905C786B16F540A15F702ED3D6E5C6715102DB
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                              • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                              • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                              • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                              • Instruction ID: cffdc6bb8eb20f5336ace8b102e865ec7dcfb2cf624fb46ac032ba80a60d6a90
                              • Opcode Fuzzy Hash: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                              • Instruction Fuzzy Hash: 8A024C71E002199BEF14CFA9C9806AEBBF1FF88314F25826AD919E7350D735AD45CB84
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f628971186b7869ff55a994468a376647b4631b563bdc3b7b4e6f267e50c07e
                              • Instruction ID: abbb62da62dbe64ddf40af0085a22c6ebf6a826290c091b5968acac2af48ec02
                              • Opcode Fuzzy Hash: 6f628971186b7869ff55a994468a376647b4631b563bdc3b7b4e6f267e50c07e
                              • Instruction Fuzzy Hash: 77024B71E002199FDF54CFA9C8846AEB7F1EF88324F158669D91AEB385D730A941CB80
                              APIs
                              • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7BF
                              • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Name$ComputerUser
                              • String ID:
                              • API String ID: 4229901323-0
                              • Opcode ID: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                              • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                              • Opcode Fuzzy Hash: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                              • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004520CD,?,?,00000008,?,?,00455412,00000000), ref: 004522FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                              • Instruction ID: 47108b7899804ebb5d40a9255b8f0d240b678f8396b787326aeb691ef157153f
                              • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                              • Instruction Fuzzy Hash: C0B18F351106089FD715CF28C586B567BE0FF06325F29869AEC99CF3A2C379E986CB44
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,04872334,?,?,00000008,?,?,04875679,00000000), ref: 04872566
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                              • Instruction ID: bc1ce5d4b867b4c2d3db42f64197823a5a1613bf4bebecb4b4ab07bff6a93fc4
                              • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                              • Instruction Fuzzy Hash: FBB11C316106099FD715CF28C4AAB657BE0FF45365F298B98E8DACF2A1C335E991CB40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                              • Instruction ID: f72c02501a8b687524d4eed2bba9748ce27a8789a4669d3223b659a6f876a8a8
                              • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                              • Instruction Fuzzy Hash: 8002B3727083004BD714DF39D95272EF3E2AFCC758F15492EF499AB391DA78A8058A4A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                              • Instruction ID: 8f050ea72c23dc3f84b40bae047ca76bcaf4f1f0740fcd00ca24941b8407fc13
                              • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                              • Instruction Fuzzy Hash: A802713270C3008BE714DF29D951A2EB3E2BFC8758F154E6DE985EB390DE74A8458A47
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                              • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                                • Part of subcall function 04867126: _free.LIBCMT ref: 04867185
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 04867192
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 04871375
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction ID: 5daded6a90f4d3cd2ee559b62bd0df4202d9b5e3aeb338050fef2a1ae73a4ef3
                              • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction Fuzzy Hash: 3721A4725242069BEB249E1DDC55BB673A8EB44314F00067AED45C6E40FBB9F980CB91
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 00450DB4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                              • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                              • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                              • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                              • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 0487101B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                              • Instruction ID: d20eda67a658df560dfc92bff4a68d26434ddfc2e3df305d185123d55b4ca7aa
                              • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                              • Instruction Fuzzy Hash: 751129362003019FDB18AF39D8A557AB7A2FF80358B14892DE94687B40E775B443CB40
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                              • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                              • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                              • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,048712EF,00000000,00000000,?), ref: 0487157D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                              • Instruction ID: b4b53412447779c49f30b20c08db00b7b610b4d93da2da4e4de4477dd061ac4f
                              • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                              • Instruction Fuzzy Hash: 06F0F932A00215ABDB3C5E248C5DABA7778EB40318F040B69EC16E3A40EA70FE41C6D1
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 00450E29
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                              • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                              • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                              • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                              • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 04871090
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                              • Instruction ID: 235353e00895105ba4d8957adaf5884e78565d8323777ff126492381ba91e78c
                              • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                              • Instruction Fuzzy Hash: 03F028363003045FDB246F399C94A6A7B91EF80358B05492DF901C7A80D6B1E8428640
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,048639B1,?,00000004), ref: 04867851
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                              • Instruction ID: 8e1a45c9bf0e61f0c2668b5a74c3e3d894042c80b138ba6b0d6570380c12e713
                              • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                              • Instruction Fuzzy Hash: A0F0F631A40308BBDB116F649C01F6E7B25DF04B15F004675FC0696251CAB1AE1096DA
                              APIs
                                • Part of subcall function 00444ACC: RtlEnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                              • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                              • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                              • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                              • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                              APIs
                                • Part of subcall function 04864D33: RtlEnterCriticalSection.NTDLL(?), ref: 04864D42
                              • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 0486734D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                              • Instruction ID: 642e06e6d260aa13667cdb2f96c028c19439ab8e9a2d1cb507b6937a2f54ce70
                              • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                              • Instruction Fuzzy Hash: 25F04932A10204EFE704EF6CE805B4D37B0EB45729F108666F814DB2A0CBB499808B9A
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 00450D2E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                              • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                              • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                              • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                              • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 04870F95
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                              • Instruction ID: bf9fad56fbaf155eb7f4735fcf7a35444785b9fe66edde3ab6622b35e0dde261
                              • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                              • Instruction Fuzzy Hash: 10F0553A30020557CB08AF39DC15A6A7F90EFC3715B0A80A9FE09CB281D671E882C790
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                              • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                              • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                              • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,04834814,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,0046673C), ref: 0482E8F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                              • Instruction ID: 04e55a40980d458d9ca4db48099dd325745b5956b503812ec7351caca6e6521c
                              • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                              • Instruction Fuzzy Hash: 8DD05E607002287BEA1092859C0AE9B7A9CE700B96F000161BA01E72C0E9E0AE008AE2
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                              • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                              • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                              • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                              • Instruction Fuzzy Hash:
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: BG3i@
                              • API String ID: 0-2407888476
                              • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                              • Instruction ID: a817909710d0090f483bb13cdd1d1ee80d6dfae79024daed79820ace932836b2
                              • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                              • Instruction Fuzzy Hash: E361777160070966DA385A2858D6BBF6396EB0DB04F10391BE943FF3C1D61DAD43874E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction ID: e47b97b21f836cd03f295ee90de6feb37cae4df0254a032430ab3cefd666e269
                              • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction Fuzzy Hash: C851AC3160070457DF388A6985DA7BF6B959B0E700F18352FE48AFB382C60DED02979E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction ID: 01d983e3113aa350dafca2c933a9b8eb6cdb6fef657214b1ca4514b807094c5a
                              • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction Fuzzy Hash: 0D51577170074896EB348A6C84557BE2BEA9B46348F080F0ADC82DB2B1E645FE41AF52
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction ID: 979517cf7d950d0e02c9c978dbcecbcbb55cb409bff3d88e0a585a706c45ccfb
                              • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction Fuzzy Hash: 98515862B04B4857EF349A6C85547BF6BD59B02348F084F0ADC83CB2B1D6D5FA468F92
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                              • Instruction ID: 4dd25ef8aece06dcbd44762d080e1d81d96ea4c89eb3931c7e752ffea448aa68
                              • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                              • Instruction Fuzzy Hash: 99417576A083158FC314CE29D18021BFBE1FBC8300F568A2EF99693350D679E980CB86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                              • Instruction ID: 34a3ce60eea025b0265de6d0f24625e8bb6a08000df1b35bb98135020ecf2f86
                              • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                              • Instruction Fuzzy Hash: 6F4123769187498FD314CE29C58061BFBE1FBC8354F148E2EF996A3350E775A980CB82
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                              • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                              • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                              • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                              • Instruction ID: 1fbb2d6a6e610910e1865e113166bba559d0ad1400e2c5ed2b94208389d41108
                              • Opcode Fuzzy Hash: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                              • Instruction Fuzzy Hash: 4E323621D2AF014DE7639634C862336A649AFB73C5F19D737F81AB5AA6EB2CC4C34105
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f36ab663cb4d239ef1e0a5f108238eabc662f1d3d061ede5d5b4150ec9228ddd
                              • Instruction ID: 2a34495ee4f42e5442afe8381c33b9994a027dd0bc8bc0cc3fe6fc4803c66e78
                              • Opcode Fuzzy Hash: f36ab663cb4d239ef1e0a5f108238eabc662f1d3d061ede5d5b4150ec9228ddd
                              • Instruction Fuzzy Hash: 9732C1796087469BD714DF2AC4807ABB7E1BF84304F444A2EFC958B381D778DD858B8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a18e7bb7c2c42d1902aff7cdab2f32fbef15b0e2cf6e19f50b6dfc23c9c72e89
                              • Instruction ID: 3e7f2710faa24b59055310faac7555f1591bae0683d74fd77b735e907c62c13d
                              • Opcode Fuzzy Hash: a18e7bb7c2c42d1902aff7cdab2f32fbef15b0e2cf6e19f50b6dfc23c9c72e89
                              • Instruction Fuzzy Hash: 5B32A931A087469BD719DF28C48077AB7E1AF84309F044F6DF9A5CB291E7B5E9058BC2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                              • Instruction ID: 022d1978040d43b7ea9bbfc0a41ffb8b00617051ae00cac38c3f572af68edcce
                              • Opcode Fuzzy Hash: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                              • Instruction Fuzzy Hash: 0D028F717046518FD318CF2EE880536B7E1AF8E301B46863EE585C7395EB74E922CB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                              • Instruction ID: 73cb56d445fd6dfad88fe9929287526e0a63c7a991144a0fe12de4f61cfdfad9
                              • Opcode Fuzzy Hash: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                              • Instruction Fuzzy Hash: BD028E717046518FD328CF2DE880536B7E1AF8A3017468A3EE485D7391EB74E926CB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                              • Instruction ID: dd4ce2a6fae4266494c2f053a510589cf36d02151b1693af83bcfdcd1697f2cb
                              • Opcode Fuzzy Hash: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                              • Instruction Fuzzy Hash: 55F13B716142548FC314DF1DE89187BB3E0EB8A301B460A2EF5C2D7392DB78E91ADB56
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ae54c0c007aacb93a7dd55fc151a9a0813301b4ecfdd70e7c81fd1d8629b8821
                              • Instruction ID: c0c18c2a7bc01cd35c349936015b9f330094abde344b25c52e9a329465433d3e
                              • Opcode Fuzzy Hash: ae54c0c007aacb93a7dd55fc151a9a0813301b4ecfdd70e7c81fd1d8629b8821
                              • Instruction Fuzzy Hash: 80F15C716142548FD314DF1DE89087BB3E0EB8A305B460A2EF5C2D7391DB74EA1ACB56
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7363a9fedaeb76f2bf31ad894624b0994c444190ff40f401d8ef5418a52334f3
                              • Instruction ID: a134442df30985c3d9ded0ed06b90328dea8838589cb671b1bd0994677c35241
                              • Opcode Fuzzy Hash: 7363a9fedaeb76f2bf31ad894624b0994c444190ff40f401d8ef5418a52334f3
                              • Instruction Fuzzy Hash: 60D1A171A083158BC721DE29C88096FB7E4FFD8354F446A2EF88597361EB38DD058B86
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                              • Instruction ID: 86422b113df266cbb8d28aa4d41e6099a1760efb4c6ea83322c03ecd969c618c
                              • Opcode Fuzzy Hash: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                              • Instruction Fuzzy Hash: 46B1817951429A8ACB05EF28C4913F63BA1EF6A300F4851B9EC9CCF757D3399506EB24
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                              • Instruction ID: 3c58b341d579cb436f4a77e27fb0ab3503697849dbff76685977e4d143b13d24
                              • Opcode Fuzzy Hash: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                              • Instruction Fuzzy Hash: 6DB1A03911429A8BCB01EF68C4913F63BE0EF6A301F0855B9EC9CCF756E2359506EB64
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                              • Instruction ID: c2ccfb52f11e3b3b259396a7657262a28929e77abe156aeb413db61674ad6f9a
                              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                              • Instruction Fuzzy Hash: EB91C8722080A319DB2D463E847403FFFE19A563A1B1BA79FD4F2CB2C5EE18D564D624
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                              • Instruction ID: 4bc7a19b78b3923bd294324807b23a5e70e392b11aa895e474023c0768c286cc
                              • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                              • Instruction Fuzzy Hash: 1C91B6762080A35ADB2D463AC43403FFFE15A563A1B1B979FD4F2CB2C5EE18C568D624
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                              • Instruction ID: 8cd81e8b6c8cb135a2d00aee0b4681899237c427d703fcd1ed6b13232f465ad6
                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                              • Instruction Fuzzy Hash: 439195722090A35ADB2D463D843403FFFE15E5A3A1B1B979FD4F2CB2C5EE28C5649624
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                              • Instruction ID: 3f92c48b0efc6548e9d2ace3e3fdbc0fca8b075b553eb95927f683fa27391a83
                              • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                              • Instruction Fuzzy Hash: A4613471E0070867DE385928B896BBF23A8AB0D708F24755BE942DB381D65DDD43C24E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                              • Instruction ID: b8932ce97a96bfc6fffa5c60c253fe5394095a989f0839719367078492deaab3
                              • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                              • Instruction Fuzzy Hash: F1614A71780609A7FE347A6C6891BBEA3D4DB41348F14CF19EC43DB2B0D651F982831A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                              • Instruction ID: fe95d9a8be0f6e8189e859b322c464d29a3fff8dccf462167148a57e441e65b3
                              • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                              • Instruction Fuzzy Hash: 95614461300708A6EB349A6C8895BFE63D4EB41748F44CF1AEC42DB2B0F659B946C756
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                              • Instruction ID: b40c52ae0115b4061fe2d1036eda9829452ee7622c5651f608d151b30f65a328
                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                              • Instruction Fuzzy Hash: B081C4722090A319DB2D463E843403FFFE15A563A5B1BA7AFD4F2CB2C5EE18C5649624
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction ID: 61f6cd4e2a94a36a6652522188f48ed2bcd63c305fdb574287b7df62abf21a4e
                              • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction Fuzzy Hash: BB51677170460D9BDB34E96894E77BFA3899B0E344F18350BD882B7382D60CED02939E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                              • Instruction ID: 42e819d74c2f676ea4fb49a2469d6a41ac5eaf2d1859dcf64078451750f97267
                              • Opcode Fuzzy Hash: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                              • Instruction Fuzzy Hash: 49614E32A083119FC308DF35E581A5BB7E5FFDC718F550E1EF48996151E674EA088B8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                              • Instruction ID: e0ce9e9c4b8eb9e5422674a5ce41afd953a83de4aee6640382e3910951e84f5b
                              • Opcode Fuzzy Hash: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                              • Instruction Fuzzy Hash: 58611D729083059FD308DF78D581A5BB7E9EFD8718F454E2DF499D6150E770EA088B82
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction ID: d77b428d8deff70f46db9a150fef47e19855adfe796a652afc1ecdf390514463
                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction Fuzzy Hash: D1110BF724C18143EE74862DD8B46B7A795EACE320F2C636BD0C14B758D52A99459908
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction ID: c9c2c8f8e814b883a563f771f00d352f937b2539fd90fff6e7c87871778a8962
                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction Fuzzy Hash: CA11C87B20019243D6158A2DD4B45FAAB95FBC5361F6DCF7ADC41CB678D222B144A600
                              Memory Dump Source
                              • Source File: 00000000.00000002.2074953120.0000000002D93000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D93000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2d93000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                              • Instruction ID: 9c52f58c76151df1e4ce3d58827adc95d9d5c91dac142410bdcbcdf84bf5c2cd
                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                              • Instruction Fuzzy Hash: F71182B6340101AFDB84DF59DCC0FA673EAEB89760B198095ED04CB315D676EC42CB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                              • Instruction ID: 933ff9f54dff6ff0bbd477003fb5c7ca2ccdbcdd9af991a805a220ef85264ab2
                              • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                              • Instruction Fuzzy Hash: B001F777A016148FDF21CF20C904BAA33F5EB87205F154AA4E606D7281E370B8C18B80
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                              • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                              • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                              • DeleteDC.GDI32(?), ref: 0041805D
                              • DeleteDC.GDI32(00000000), ref: 00418060
                              • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                              • GetCursorInfo.USER32(?), ref: 004180B5
                              • GetIconInfo.USER32(?,?), ref: 004180CB
                              • DeleteObject.GDI32(?), ref: 004180FA
                              • DeleteObject.GDI32(?), ref: 00418107
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                              • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                              • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                              • DeleteDC.GDI32(?), ref: 0041827F
                              • DeleteDC.GDI32(00000000), ref: 00418282
                              • DeleteObject.GDI32(00000000), ref: 00418285
                              • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                              • DeleteObject.GDI32(00000000), ref: 00418344
                              • GlobalFree.KERNEL32(?), ref: 0041834B
                              • DeleteDC.GDI32(?), ref: 0041835B
                              • DeleteDC.GDI32(00000000), ref: 00418366
                              • DeleteDC.GDI32(?), ref: 00418398
                              • DeleteDC.GDI32(00000000), ref: 0041839B
                              • DeleteObject.GDI32(?), ref: 004183A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 1352755160-865373369
                              • Opcode ID: 8de94a20f336419d21da44f2af65b8452e737ccf24adddd005fb609867b243bd
                              • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                              • Opcode Fuzzy Hash: 8de94a20f336419d21da44f2af65b8452e737ccf24adddd005fb609867b243bd
                              • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                              • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                              • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                              • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                              • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                              • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                              • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                              • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                              • ResumeThread.KERNEL32(?), ref: 00417582
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                              • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                              • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                              • GetLastError.KERNEL32 ref: 004175C7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                              • API String ID: 4188446516-3035715614
                              • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                              • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                              • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                              • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                              • ExitProcess.KERNEL32 ref: 0041151D
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                              • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                              • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                              • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                              • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                              • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                              • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                              • API String ID: 4250697656-2665858469
                              • Opcode ID: b68df8224523070e2f82cd34dc7b2adce00a37accb578c29d62ccc5e9000c55b
                              • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                              • Opcode Fuzzy Hash: b68df8224523070e2f82cd34dc7b2adce00a37accb578c29d62ccc5e9000c55b
                              • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                              • ExitProcess.KERNEL32 ref: 0040C287
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                              • API String ID: 3797177996-1998216422
                              • Opcode ID: 53eb539aca13c9557a54cb0f12d86c48ccabed0c2d36aef9f146bf9f885d7e5f
                              • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                              • Opcode Fuzzy Hash: 53eb539aca13c9557a54cb0f12d86c48ccabed0c2d36aef9f146bf9f885d7e5f
                              • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                              • SetEvent.KERNEL32 ref: 0041A38A
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                              • CloseHandle.KERNEL32 ref: 0041A3AB
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                              • API String ID: 738084811-1408154895
                              • Opcode ID: 67a24f6113aabf6128109dc61cf26ab2441941a35e225fe1c9d441213504bd5b
                              • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                              • Opcode Fuzzy Hash: 67a24f6113aabf6128109dc61cf26ab2441941a35e225fe1c9d441213504bd5b
                              • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 0483153B
                              • ExitProcess.KERNEL32 ref: 04831784
                                • Part of subcall function 048328C4: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 048328E0
                                • Part of subcall function 048328C4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 048328F9
                                • Part of subcall function 048328C4: RegCloseKey.ADVAPI32(?), ref: 04832904
                                • Part of subcall function 0483B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B89A
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 048315C2
                              • OpenProcess.KERNEL32(00100000,00000000,0482E3BB,?,?,?,?,00000000), ref: 048315D1
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 048315DC
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 048315E3
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 048315E9
                                • Part of subcall function 04832A3C: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 04832A4A
                                • Part of subcall function 04832A3C: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0482BBB3,004660E0,00000001,000000AF,00465554), ref: 04832A65
                                • Part of subcall function 04832A3C: RegCloseKey.ADVAPI32(?,?,?,?,0482BBB3,004660E0,00000001,000000AF,00465554), ref: 04832A70
                              • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 0483161A
                              • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 04831676
                              • GetTempFileNameW.KERNEL32(?,0046B7CC,00000000,?,?,?,?,?,?,?,?,00000000), ref: 04831690
                              • lstrcatW.KERNEL32(?,0046B7D8,?,?,?,?,?,?,?,00000000), ref: 048316A2
                                • Part of subcall function 0483B7F6: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000000,0483B90C,00000000,00000000,?,?,0482A270), ref: 0483B852
                                • Part of subcall function 0483B7F6: WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,0483B90C,00000000,00000000,?,?,0482A270), ref: 0483B866
                                • Part of subcall function 0483B7F6: CloseHandle.KERNEL32(00000000,?,00000000,0483B90C,00000000,00000000,?,?,0482A270), ref: 0483B873
                              • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 0483172B
                              • OpenProcess.KERNEL32(00100000,00000000,0482E3BB,?,?,?,?,00000000), ref: 04831740
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 0483174B
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 04831752
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 04831758
                                • Part of subcall function 0483B7F6: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0483B90C,00000000,00000000,?), ref: 0483B835
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExistsExitMutexNamePointerQuerySleepWritelstrcat
                              • String ID: 0DG$@CG$WDH$exepath
                              • API String ID: 1212092484-1464086911
                              • Opcode ID: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                              • Instruction ID: fa8edb6568bdc81de85f34192d1e0f18e29dc9fbffcd66291d2098685a10bb4c
                              • Opcode Fuzzy Hash: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                              • Instruction Fuzzy Hash: D6510871A043256BEB10B7A4EC48EFE336C9B04656F144AB1F901E31D1EFB4AE81CB95
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                              • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                              • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                              • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                              • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                              • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                              • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\NujUXO42Rg.exe,00000001,004068B2,C:\Users\user\Desktop\NujUXO42Rg.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                              • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                              • GetProcAddress.KERNEL32(00000000), ref: 00406511
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                              • GetProcAddress.KERNEL32(00000000), ref: 00406525
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                              • GetProcAddress.KERNEL32(00000000), ref: 00406539
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                              • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                              • GetProcAddress.KERNEL32(00000000), ref: 00406561
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-3757735386
                              • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                              • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                              • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                              • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                              APIs
                              • CreateDCA.GDI32(0046BAC8,00000000,00000000,00000000), ref: 04838220
                              • CreateCompatibleDC.GDI32(00000000), ref: 0483822B
                                • Part of subcall function 048386B9: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 048386E9
                              • CreateCompatibleBitmap.GDI32(?,00000000), ref: 048382AC
                              • SelectObject.GDI32(00000000,00000000), ref: 048382D2
                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 048382FA
                              • GetCursorInfo.USER32(?), ref: 0483831C
                              • GetIconInfo.USER32(?,?), ref: 04838332
                              • DeleteObject.GDI32(?), ref: 04838361
                              • DeleteObject.GDI32(?), ref: 0483836E
                              • DrawIcon.USER32(00000000,?,?,?), ref: 0483837B
                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00471DE4,00000000,00000000,00660046), ref: 048383AB
                              • GetObjectA.GDI32(?,00000018,?), ref: 048383DA
                              • LocalAlloc.KERNEL32(00000040,00000028), ref: 04838423
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 04838446
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 048384AF
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 048384D2
                              • DeleteObject.GDI32(00000000), ref: 048384EC
                              • GlobalFree.KERNEL32(00CC0020), ref: 048384F7
                              • DeleteObject.GDI32(00000000), ref: 048385AB
                              • GlobalFree.KERNEL32(?), ref: 048385B2
                              • DeleteObject.GDI32(?), ref: 04838608
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object$Delete$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                              • String ID:
                              • API String ID: 615876539-0
                              • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                              • Instruction ID: 7c7dad18a539227cc91f0dedda4b84658ba4fb0e891239c71b0164942fbbeb2a
                              • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                              • Instruction Fuzzy Hash: 64C16A71108354AFD720AF24DC44B6BBBE8EF84741F044A2DF989D72A1EB70E944CB96
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041B1D6
                              • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                              • lstrlenW.KERNEL32(?), ref: 0041B207
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                              • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                              • _wcslen.LIBCMT ref: 0041B2DB
                              • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                              • GetLastError.KERNEL32 ref: 0041B313
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                              • lstrcatW.KERNEL32(?,?), ref: 0041B359
                              • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                              • GetLastError.KERNEL32 ref: 0041B370
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                              • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                              • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                              • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0483B43D
                              • _memcmp.LIBVCRUNTIME ref: 0483B455
                              • lstrlenW.KERNEL32(?), ref: 0483B46E
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0483B4A9
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0483B4BC
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0483B500
                              • lstrcmpW.KERNEL32(?,?), ref: 0483B51B
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0483B533
                              • _wcslen.LIBCMT ref: 0483B542
                              • FindVolumeClose.KERNEL32(?), ref: 0483B562
                              • GetLastError.KERNEL32 ref: 0483B57A
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0483B5A7
                              • lstrcatW.KERNEL32(?,?), ref: 0483B5C0
                              • lstrcpyW.KERNEL32(?,?), ref: 0483B5CF
                              • GetLastError.KERNEL32 ref: 0483B5D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                              • Instruction ID: 97ed93d66f3a9f4ca9f55731720a45be1c0e3f5bd4635db0ea920b16ae4f6f13
                              • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                              • Instruction Fuzzy Hash: 5B4161B1508709ABD720DF64EC48AAB77E8AB44716F000E3AF545C2162EB74E548CBD6
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$___from_strstr_to_strchr_wcschr
                              • String ID:
                              • API String ID: 2719235668-0
                              • Opcode ID: 7acce36c14b6035b1c2eb814a55043d454006441e01e78848d5c2bc81b6dc77b
                              • Instruction ID: 085aeb84df7bb0ffe4fe9c145e2500147db43d2b322fa9c5a2eeb75022b9281c
                              • Opcode Fuzzy Hash: 7acce36c14b6035b1c2eb814a55043d454006441e01e78848d5c2bc81b6dc77b
                              • Instruction Fuzzy Hash: 0AD14C79900304AFEBA5AF7CD885A7A7BA59F00314F044B6DE907E7280FB72B541CB91
                              APIs
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 048375D3
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 048375EB
                              • GetThreadContext.KERNEL32(?,00000000), ref: 04837601
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 04837627
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 048376A7
                              • TerminateProcess.KERNEL32(?,00000000), ref: 048376BB
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 048376F2
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 048377BF
                              • SetThreadContext.KERNEL32(?,00000000), ref: 048377DC
                              • ResumeThread.KERNEL32(?), ref: 048377E9
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 04837801
                              • GetCurrentProcess.KERNEL32(?), ref: 0483780C
                              • TerminateProcess.KERNEL32(?,00000000), ref: 04837826
                              • GetLastError.KERNEL32 ref: 0483782E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ntdll
                              • API String ID: 3275803005-3337577438
                              • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                              • Instruction ID: 48679472879a3c49a16608a3b1f92bba94d2fb2a2517915e7d4ee18fca698ef4
                              • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                              • Instruction Fuzzy Hash: 0BA17BB1504304AFD7209F69DC88F6B7BE8FF48346F004929F689D2261E771E444CBAA
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 048252F5
                                • Part of subcall function 04853736: RtlEnterCriticalSection.NTDLL(00470D18), ref: 04853740
                                • Part of subcall function 04853736: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 04853773
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              • __Init_thread_footer.LIBCMT ref: 04825332
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 0482544E
                                • Part of subcall function 04853780: RtlEnterCriticalSection.NTDLL(00470D18), ref: 0485378B
                                • Part of subcall function 04853780: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 048537C8
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 048254A6
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 048254CB
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 048254F8
                                • Part of subcall function 04853B0C: __onexit.LIBCMT ref: 04853B12
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 048255F5
                              • Sleep.KERNEL32(00000064,00000062,00465554), ref: 0482560F
                              • TerminateProcess.KERNEL32(00000000), ref: 04825628
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterFileInit_thread_footerLeaveProcessSleep$CreateNamedPeekPipeReadTerminateWrite__onexitsend
                              • String ID: P\G$P\G$P\G$P\G$P\G$cmd.exe
                              • API String ID: 121539554-3292008770
                              • Opcode ID: 797804256bd83e4a27056d5b7dd8b844625091c3a01af072158c3512f2156987
                              • Instruction ID: 2492401e96bd5eacc9e8a6c4c4dfa16e0b9b8563422cea4a7301f2144f2f63ab
                              • Opcode Fuzzy Hash: 797804256bd83e4a27056d5b7dd8b844625091c3a01af072158c3512f2156987
                              • Instruction Fuzzy Hash: 3C912D715407147FE705BB6CDE44E2E3759EB40348F404A39F90AEA1A1EEE4BDC4876A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID:
                              • API String ID: 3899193279-0
                              • Opcode ID: 7acce36c14b6035b1c2eb814a55043d454006441e01e78848d5c2bc81b6dc77b
                              • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                              • Opcode Fuzzy Hash: 7acce36c14b6035b1c2eb814a55043d454006441e01e78848d5c2bc81b6dc77b
                              • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                              • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                              • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                              • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                              • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                              • Sleep.KERNEL32(00000064), ref: 00412060
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$HDG$HDG$>G$>G
                              • API String ID: 1223786279-3931108886
                              • Opcode ID: 85435beb10913ec10ccfc63f65e56650ada055219fa0cdfb60d186f8f08b2856
                              • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                              • Opcode Fuzzy Hash: 85435beb10913ec10ccfc63f65e56650ada055219fa0cdfb60d186f8f08b2856
                              • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                              • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                              • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                              • LoadLibraryA.KERNEL32(?), ref: 00413F27
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                              • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                              • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                              • API String ID: 2490988753-744132762
                              • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                              • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                              • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                              • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                              APIs
                                • Part of subcall function 04831900: TerminateProcess.KERNEL32(00000000,?,0482C8E4), ref: 04831910
                                • Part of subcall function 04831900: WaitForSingleObject.KERNEL32(000000FF,?,0482C8E4), ref: 04831923
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0482C27A
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0482C28D
                                • Part of subcall function 0483AD9F: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,04823CA7), ref: 0483ADC6
                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0482C4E7
                              • ExitProcess.KERNEL32 ref: 0482C4EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentDeleteExecuteExitFileModuleNameObjectShellSingleTerminateWait
                              • String ID: @CG$On Error Resume Next$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$`=G$exepath$fso.DeleteFolder "$pth_unenc$while fso.FileExists("
                              • API String ID: 508158800-1730539264
                              • Opcode ID: cadd17a6f3b3dd84aa2841c1ffb737251bc648ed92d01ac99516321e3e8970e8
                              • Instruction ID: 9319e6654f51358242ec8c57628dc8682e669e5b6d8ab9e4968879ce9b57487b
                              • Opcode Fuzzy Hash: cadd17a6f3b3dd84aa2841c1ffb737251bc648ed92d01ac99516321e3e8970e8
                              • Instruction Fuzzy Hash: 258196316042605BE724FB38DE60EBF73999F90704F104E6EE446D7190EFA8B989C697
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                              • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                              • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                              • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                              • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                              • __aulldiv.LIBCMT ref: 00407FE9
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                              • CloseHandle.KERNEL32(00000000), ref: 00408200
                              • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                              • CloseHandle.KERNEL32(00000000), ref: 00408256
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                              • API String ID: 1884690901-3066803209
                              • Opcode ID: 12ef924cdf4f9084f592aa5a7178c4cfd0b4d2fd73302b04ae28af43f202c323
                              • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                              • Opcode Fuzzy Hash: 12ef924cdf4f9084f592aa5a7178c4cfd0b4d2fd73302b04ae28af43f202c323
                              • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                              APIs
                              • _wcslen.LIBCMT ref: 0482BEDC
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0482BEF5
                              • _wcslen.LIBCMT ref: 0482BFBB
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0482C043
                              • _wcslen.LIBCMT ref: 0482C09B
                              • CloseHandle.KERNEL32 ref: 0482C102
                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000001), ref: 0482C120
                              • ExitProcess.KERNEL32 ref: 0482C137
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen$CreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\Desktop\NujUXO42Rg.exe$BG$BG
                              • API String ID: 3303048660-2453285178
                              • Opcode ID: 0ce300c52b2574979d2682925cabc15749f3fad58451f58e2d3683bc22aef4dd
                              • Instruction ID: 9cb9236ff20de272ba9a177f0e30c33a8d786a8b823238392495e3356a6cae7d
                              • Opcode Fuzzy Hash: 0ce300c52b2574979d2682925cabc15749f3fad58451f58e2d3683bc22aef4dd
                              • Instruction Fuzzy Hash: C251D3202043606BE718BB389E50F7E2799AF90648F104E6DF405D6191EFD8F9C5C26B
                              APIs
                              • Sleep.KERNEL32(00001388), ref: 00409E62
                                • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                              • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0040A049
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                              • API String ID: 3795512280-3163867910
                              • Opcode ID: 73cedba46b2bf97ca7266f4c35e210858aecb6fd45dc0bc99301d0743ff000a1
                              • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                              • Opcode Fuzzy Hash: 73cedba46b2bf97ca7266f4c35e210858aecb6fd45dc0bc99301d0743ff000a1
                              • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                              APIs
                              • Sleep.KERNEL32(00001388), ref: 0482A0C9
                                • Part of subcall function 04829FFE: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0482A0D6), ref: 0482A034
                                • Part of subcall function 04829FFE: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0482A0D6), ref: 0482A043
                                • Part of subcall function 04829FFE: Sleep.KERNEL32(00002710,?,?,?,0482A0D6), ref: 0482A070
                                • Part of subcall function 04829FFE: CloseHandle.KERNEL32(00000000,?,?,?,0482A0D6), ref: 0482A077
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0482A105
                              • GetFileAttributesW.KERNEL32(00000000), ref: 0482A116
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0482A12D
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0482A1A7
                                • Part of subcall function 0483B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B89A
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0482A2B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                              • API String ID: 3795512280-3163867910
                              • Opcode ID: f1eb223cb7d2e6894d1a2c78ceddde7f199078b5105718b7a6d2036e1116f8b0
                              • Instruction ID: fd9bc623279aaed7f12cda802a4e577c83540c007bf937e00fa1833a1f0f4585
                              • Opcode Fuzzy Hash: f1eb223cb7d2e6894d1a2c78ceddde7f199078b5105718b7a6d2036e1116f8b0
                              • Instruction Fuzzy Hash: F951B5703043245BE719FB7C9A64ABE73599F80208F000FADE942E71D1EFA5B985C653
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 004500B1
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                              • _free.LIBCMT ref: 004500A6
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 004500C8
                              • _free.LIBCMT ref: 004500DD
                              • _free.LIBCMT ref: 004500E8
                              • _free.LIBCMT ref: 0045010A
                              • _free.LIBCMT ref: 0045011D
                              • _free.LIBCMT ref: 0045012B
                              • _free.LIBCMT ref: 00450136
                              • _free.LIBCMT ref: 0045016E
                              • _free.LIBCMT ref: 00450175
                              • _free.LIBCMT ref: 00450192
                              • _free.LIBCMT ref: 004501AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                              • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 04870318
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F567
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F579
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F58B
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F59D
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F5AF
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F5C1
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F5D3
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F5E5
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F5F7
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F609
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F61B
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F62D
                                • Part of subcall function 0486F54A: _free.LIBCMT ref: 0486F63F
                              • _free.LIBCMT ref: 0487030D
                                • Part of subcall function 04866D2C: HeapFree.KERNEL32(00000000,00000000,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?), ref: 04866D42
                                • Part of subcall function 04866D2C: GetLastError.KERNEL32(?,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?,?), ref: 04866D54
                              • _free.LIBCMT ref: 0487032F
                              • _free.LIBCMT ref: 04870344
                              • _free.LIBCMT ref: 0487034F
                              • _free.LIBCMT ref: 04870371
                              • _free.LIBCMT ref: 04870384
                              • _free.LIBCMT ref: 04870392
                              • _free.LIBCMT ref: 0487039D
                              • _free.LIBCMT ref: 048703D5
                              • _free.LIBCMT ref: 048703DC
                              • _free.LIBCMT ref: 048703F9
                              • _free.LIBCMT ref: 04870411
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction ID: 1c9a642890f7d31333705069b1059fd9c0c603db2c037ef7a4f88eba211a39ac
                              • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction Fuzzy Hash: 643159316006449FEBA0AA3CD845B5A7BE9EF01314F144E2AE599E7160EFBAFC80C715
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 048311AC
                                • Part of subcall function 04832A3C: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 04832A4A
                                • Part of subcall function 04832A3C: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0482BBB3,004660E0,00000001,000000AF,00465554), ref: 04832A65
                                • Part of subcall function 04832A3C: RegCloseKey.ADVAPI32(?,?,?,?,0482BBB3,004660E0,00000001,000000AF,00465554), ref: 04832A70
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 048311E8
                              • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 0483124D
                                • Part of subcall function 0483271E: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 0483273E
                                • Part of subcall function 0483271E: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 0483275C
                                • Part of subcall function 0483271E: RegCloseKey.ADVAPI32(00000000), ref: 04832767
                              • CloseHandle.KERNEL32(00000000), ref: 048311F7
                                • Part of subcall function 0483A8ED: GetLocalTime.KERNEL32(00000000), ref: 0483A907
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 048314C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                              • String ID: 0DG$TTF$WDH$BG
                              • API String ID: 65172268-1505503698
                              • Opcode ID: cfd1e48dead6c5d3f6b6817fbfe2d8e6c01e86e7030477cd0b94be603cb5524d
                              • Instruction ID: 29c6300b2e73c6bb09f411f7dfd85981c963c1314aba0e55150ad486bba75d0f
                              • Opcode Fuzzy Hash: cfd1e48dead6c5d3f6b6817fbfe2d8e6c01e86e7030477cd0b94be603cb5524d
                              • Instruction Fuzzy Hash: 7071B6316042105BE614FB78DE55DAE73A4AF90749F400F6DF842D21E0EFA4B985C6E7
                              APIs
                              • __EH_prolog.LIBCMT ref: 0041912D
                              • 6FD65D90.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                              • Sleep.KERNEL32(000003E8), ref: 0041926D
                              • GetLocalTime.KERNEL32(?), ref: 0041927C
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryH_prologLocalTime
                              • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                              • API String ID: 3069631530-65789007
                              • Opcode ID: 8074c6d2a8c5259bdf3f2abb277cb149c52984373f57ca3af48006e7f706a112
                              • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                              • Opcode Fuzzy Hash: 8074c6d2a8c5259bdf3f2abb277cb149c52984373f57ca3af48006e7f706a112
                              • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                              APIs
                              • connect.WS2_32(?,?,?), ref: 004042A5
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                              • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-2151626615
                              • Opcode ID: 9226ec0d559c0467b3e57ce3565401e3e6c10b66abf032ad901ed386416ba1c6
                              • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                              • Opcode Fuzzy Hash: 9226ec0d559c0467b3e57ce3565401e3e6c10b66abf032ad901ed386416ba1c6
                              • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                              • ExitProcess.KERNEL32 ref: 0040C832
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                              • API String ID: 1913171305-390638927
                              • Opcode ID: de81de90bb00fa40865098a27361b9aa8ab8014ae03233542862b3331af95a34
                              • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                              • Opcode Fuzzy Hash: de81de90bb00fa40865098a27361b9aa8ab8014ae03233542862b3331af95a34
                              • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                              • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                              • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                              • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                              • closesocket.WS2_32(?), ref: 0040481F
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID:
                              • API String ID: 3658366068-0
                              • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                              • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                              • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                              • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 048281B3
                              • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 04828229
                              • __aulldiv.LIBCMT ref: 04828250
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 04828374
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 0482838F
                              • CloseHandle.KERNEL32(00000000), ref: 04828467
                              • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 04828481
                              • CloseHandle.KERNEL32(00000000), ref: 048284BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                              • String ID: Uploading file to Controller: $>G
                              • API String ID: 1884690901-111729153
                              • Opcode ID: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                              • Instruction ID: 9893ef35d6e3f71aa114d1a0b2dc627bd366016cc236d96c991932aa0fab437b
                              • Opcode Fuzzy Hash: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                              • Instruction Fuzzy Hash: 7EB1A3316083509FD614FB28C950B6FB7A5AF84314F404F5DF886D6290EFB4B9898B97
                              APIs
                                • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                              • GetLastError.KERNEL32 ref: 00454A96
                              • __dosmaperr.LIBCMT ref: 00454A9D
                              • GetFileType.KERNEL32(00000000), ref: 00454AA9
                              • GetLastError.KERNEL32 ref: 00454AB3
                              • __dosmaperr.LIBCMT ref: 00454ABC
                              • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                              • CloseHandle.KERNEL32(?), ref: 00454C26
                              • GetLastError.KERNEL32 ref: 00454C58
                              • __dosmaperr.LIBCMT ref: 00454C5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                              • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                              • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                              • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                              APIs
                              • __EH_prolog.LIBCMT ref: 04839394
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 04839452
                              • Sleep.KERNEL32(000003E8), ref: 048394D4
                              • GetLocalTime.KERNEL32(?), ref: 048394E3
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 048395CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryH_prologLocalTime
                              • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                              • API String ID: 3069631530-65789007
                              • Opcode ID: a8f8b58d2128b4f531cd6f97798560ad721fb8e33840202611e7dd41891fb402
                              • Instruction ID: e5f5d05e13998ac47e4c972204dc9f0e9fad8995387ceca5b063ffba9dbf633e
                              • Opcode Fuzzy Hash: a8f8b58d2128b4f531cd6f97798560ad721fb8e33840202611e7dd41891fb402
                              • Instruction Fuzzy Hash: A951D871A002649BEF24FBB8CD54AFD77B8AF50309F004A69E405E7180EFB86D85D792
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040A456
                              • Sleep.KERNEL32(000001F4), ref: 0040A461
                              • GetForegroundWindow.USER32 ref: 0040A467
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                              • Sleep.KERNEL32(000003E8), ref: 0040A574
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(00000000,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$]
                              • API String ID: 911427763-3954389425
                              • Opcode ID: 3c6f45afa5cefde77739fe0ec6228a29e02dad0888cc20a56e59f4c05a05e561
                              • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                              • Opcode Fuzzy Hash: 3c6f45afa5cefde77739fe0ec6228a29e02dad0888cc20a56e59f4c05a05e561
                              • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                              • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                              • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                              • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                              • Instruction ID: c1a4db7afda8cfb4e6847803f00ff545328e08a5439726430fe81f4c8611248e
                              • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                              • Instruction Fuzzy Hash: A741C531308305ABE760AB28D914B3B77E8EB85B46F040F2DFC85D7292E765E44096D6
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                              • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                              • __dosmaperr.LIBCMT ref: 004393CD
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                              • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                              • __dosmaperr.LIBCMT ref: 0043940A
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                              • __dosmaperr.LIBCMT ref: 0043945E
                              • _free.LIBCMT ref: 0043946A
                              • _free.LIBCMT ref: 00439471
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                              • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                              • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                              • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,04821D3F,?,00000050,00465290,00000000), ref: 04859620
                              • GetLastError.KERNEL32(?,?,04821D3F,?,00000050,00465290,00000000), ref: 0485962D
                              • __dosmaperr.LIBCMT ref: 04859634
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,04821D3F,?,00000050,00465290,00000000), ref: 04859660
                              • GetLastError.KERNEL32(?,?,?,04821D3F,?,00000050,00465290,00000000), ref: 0485966A
                              • __dosmaperr.LIBCMT ref: 04859671
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,00465290,00000000,00000000,?,?,?,?,?,?,04821D3F,?), ref: 048596B4
                              • GetLastError.KERNEL32(?,?,?,?,?,?,04821D3F,?,00000050,00465290,00000000), ref: 048596BE
                              • __dosmaperr.LIBCMT ref: 048596C5
                              • _free.LIBCMT ref: 048596D1
                              • _free.LIBCMT ref: 048596D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: 7dca9c723f0a3f3e5eee78a7163c4708e0db19878e5bf6bf14be5ff931373868
                              • Instruction ID: ae8107512aca2ba2e922a3d2ba41d5e84219a6d8aadf10b5fbf74067d20c57f9
                              • Opcode Fuzzy Hash: 7dca9c723f0a3f3e5eee78a7163c4708e0db19878e5bf6bf14be5ff931373868
                              • Instruction Fuzzy Hash: 9A3193B150820AFFDF116FA8DC48DAE3BADEF04265F1407A9F811D6160EB31E910DB62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7
                              • API String ID: 0-3177665633
                              • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                              • Instruction ID: cef36261016f50eac6205b3c50cf30696b1a98442d8a6c496d25e73d94735d0f
                              • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                              • Instruction Fuzzy Hash: 5661F375588311AEF740EF24C950AAA77E4AF95B21F004E4CF496971E1DBB0AD48C7B3
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00404E71
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                              • TranslateMessage.USER32(?), ref: 00404F30
                              • DispatchMessageA.USER32(?), ref: 00404F3B
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 236290326205517b7326f1b18ffedce7127d6ea463f16ae508159d8ac251aad0
                              • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                              • Opcode Fuzzy Hash: 236290326205517b7326f1b18ffedce7127d6ea463f16ae508159d8ac251aad0
                              • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 048250D8
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 04825188
                              • TranslateMessage.USER32(?), ref: 04825197
                              • DispatchMessageA.USER32(?), ref: 048251A2
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 0482525A
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 04825292
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                              • Instruction ID: 9b43fb70ba4f1de63163bcdc2ef65d9bd258e81b3864dfa7cea6e1d13f3c2b4b
                              • Opcode Fuzzy Hash: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                              • Instruction Fuzzy Hash: 1341CE316042206BE714FB7CDE5886E77A8AB86608F400F6DF816D31A4EF74BA45C793
                              APIs
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                              • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                              • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                              • ShellExecuteEx.SHELL32(0000003C), ref: 00416EF0
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                              • String ID: <$@$@FG$@FG$Temp
                              • API String ID: 1107811701-2245803885
                              • Opcode ID: ac23cdd46b0d64bf920c3852ec1e277135585087fb5cf0bcb8dc93b11978ff01
                              • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                              • Opcode Fuzzy Hash: ac23cdd46b0d64bf920c3852ec1e277135585087fb5cf0bcb8dc93b11978ff01
                              • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                              APIs
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 0483718B
                              • CloseHandle.KERNEL32(00000000), ref: 04837194
                              • DeleteFileA.KERNEL32(00000000), ref: 048371A3
                              • ShellExecuteEx.SHELL32(0000003C), ref: 04837157
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                              • String ID: <$@$@FG$@FG$TUF
                              • API String ID: 1107811701-3315534519
                              • Opcode ID: c09cddb986173b223f0ae78b0a5cb3d5da982f6b9b7ae30d07bc44f4aa3a3996
                              • Instruction ID: 01f384f1b3e1358ec111bad843bbfbc15ede8f264220c4af46fd70e69a98c504
                              • Opcode Fuzzy Hash: c09cddb986173b223f0ae78b0a5cb3d5da982f6b9b7ae30d07bc44f4aa3a3996
                              • Instruction Fuzzy Hash: 183194319001299BEB14FBA8DD55EFD7735AF00309F4046A8E506B60E0EFB47AC6CB96
                              APIs
                              • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                              • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\NujUXO42Rg.exe), ref: 00406705
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                              • API String ID: 2050909247-4145329354
                              • Opcode ID: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                              • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                              • Opcode Fuzzy Hash: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                              • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                              • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                              • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                              • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                              APIs
                              • _free.LIBCMT ref: 00446DDF
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 00446DEB
                              • _free.LIBCMT ref: 00446DF6
                              • _free.LIBCMT ref: 00446E01
                              • _free.LIBCMT ref: 00446E0C
                              • _free.LIBCMT ref: 00446E17
                              • _free.LIBCMT ref: 00446E22
                              • _free.LIBCMT ref: 00446E2D
                              • _free.LIBCMT ref: 00446E38
                              • _free.LIBCMT ref: 00446E46
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                              • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                              APIs
                              • _free.LIBCMT ref: 04867046
                                • Part of subcall function 04866D2C: HeapFree.KERNEL32(00000000,00000000,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?), ref: 04866D42
                                • Part of subcall function 04866D2C: GetLastError.KERNEL32(?,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?,?), ref: 04866D54
                              • _free.LIBCMT ref: 04867052
                              • _free.LIBCMT ref: 0486705D
                              • _free.LIBCMT ref: 04867068
                              • _free.LIBCMT ref: 04867073
                              • _free.LIBCMT ref: 0486707E
                              • _free.LIBCMT ref: 04867089
                              • _free.LIBCMT ref: 04867094
                              • _free.LIBCMT ref: 0486709F
                              • _free.LIBCMT ref: 048670AD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction ID: 260be9af811978ea6a784ac6ccc67e15578b14737e161425ba50d5723646d823
                              • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction Fuzzy Hash: F811D77610004CBFDB81EF68D841CD93F79EF04254B0156A5BA0A9F121EA77EE50DB85
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 04831F01
                                • Part of subcall function 0483AD9F: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,04823CA7), ref: 0483ADC6
                                • Part of subcall function 0483791D: CloseHandle.KERNEL32(04823D20,?,?,04823D20,00465324), ref: 04837933
                                • Part of subcall function 0483791D: CloseHandle.KERNEL32($SF,?,?,04823D20,00465324), ref: 0483793C
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 048321F8
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 0483222F
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 0483226B
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: HDG$HDG$>G$>G
                              • API String ID: 1937857116-1666402509
                              • Opcode ID: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                              • Instruction ID: 53e91012d2e79d2bcffcb6cf6646aa006072405d15ff9536c9d36db0dc991845
                              • Opcode Fuzzy Hash: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                              • Instruction Fuzzy Hash: A20257311083505EE329FB78D960BEEB3D5AF94304F404EADD58AD2190EEB4BA89C753
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                              • API String ID: 3578746661-4192532303
                              • Opcode ID: 7e87e2fb5fc23302a6a5a7d3ee088eb784a406df97fcddfcd571807500e57e1c
                              • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                              • Opcode Fuzzy Hash: 7e87e2fb5fc23302a6a5a7d3ee088eb784a406df97fcddfcd571807500e57e1c
                              • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                              • API String ID: 3578746661-4192532303
                              • Opcode ID: a0049f2f09a357c7da3f2da1302c44ceee5b7892c88a4f25036bd0ddf1a9f3a7
                              • Instruction ID: ccdcaeef3ce3fa9f8f14c711a5cdde0b3aec8ebd10886ee35ed1d75ef4f9b843
                              • Opcode Fuzzy Hash: a0049f2f09a357c7da3f2da1302c44ceee5b7892c88a4f25036bd0ddf1a9f3a7
                              • Instruction Fuzzy Hash: 09512831A042105BE714F77CC919A6E36A4AB81309F004F69E806D72E4EFB5BD85CBC7
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0483A519
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0483A555
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,?,00000000), ref: 0483A566
                              • SetEvent.KERNEL32 ref: 0483A5F1
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0483A602
                              • CloseHandle.KERNEL32 ref: 0483A612
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateExistsFileHandleObjectPathSendSingleStringWait
                              • String ID: TUF$open "
                              • API String ID: 1811012380-2979349893
                              • Opcode ID: afa000e900512d794b59872f8fe6b6e7421b33da501b9bd85e28326864c8fc87
                              • Instruction ID: 2aefb6f2574fceb44cd78ef35f10c1995fd203c44fdebbe2269b260f69feb289
                              • Opcode Fuzzy Hash: afa000e900512d794b59872f8fe6b6e7421b33da501b9bd85e28326864c8fc87
                              • Instruction Fuzzy Hash: 8B51D3612042046FE214FB38DD85EBF375CDB90649F100A2EF486D21A1EEA4BD88C6A7
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0482A6BD
                              • Sleep.KERNEL32(000001F4), ref: 0482A6C8
                              • GetForegroundWindow.USER32 ref: 0482A6CE
                              • GetWindowTextLengthW.USER32(00000000), ref: 0482A6D7
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0482A70B
                              • Sleep.KERNEL32(000003E8), ref: 0482A7DB
                                • Part of subcall function 04829FBF: SetEvent.KERNEL32(00000000,?,00000000,0482AB83,00000000), ref: 04829FEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for
                              • API String ID: 911427763-3934435721
                              • Opcode ID: 6d776f70f920023e5288755160ba8f24f5da9fa6db96a00e1421ea32c0579234
                              • Instruction ID: 5a90a00e636ddfc08e11353e52aa7d69f1ba03db7eb9c3cad57f0fd7495a2ae1
                              • Opcode Fuzzy Hash: 6d776f70f920023e5288755160ba8f24f5da9fa6db96a00e1421ea32c0579234
                              • Instruction Fuzzy Hash: 945116716047205BE318FB38CA54A6E73A5AF84718F100F6DF886D71E0EFA4BA85C657
                              APIs
                              • RtlDecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: DecodePointer
                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                              • API String ID: 3527080286-3064271455
                              • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                              • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                              • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                              • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • Sleep.KERNEL32(00000064), ref: 00416688
                              • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: 52d81db7fbfcdf412c38a43fe1cb1cb4bc330dbf6b75d54ea58b3f9174838b7d
                              • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                              • Opcode Fuzzy Hash: 52d81db7fbfcdf412c38a43fe1cb1cb4bc330dbf6b75d54ea58b3f9174838b7d
                              • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                              APIs
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 0483718B
                              • CloseHandle.KERNEL32(00000000), ref: 04837194
                              • DeleteFileA.KERNEL32(00000000), ref: 048371A3
                              • ShellExecuteEx.SHELL32(0000003C), ref: 04837157
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                              • String ID: <$@$@FG$TUF
                              • API String ID: 1107811701-3349172182
                              • Opcode ID: b36bc87eb4507af4992a544fbd13103342267bc18c2cc7e8b00c7cda52f17d37
                              • Instruction ID: 39db3391e96e943fee369649be6e9d7b2673c2299eb893ab807b12fe2dfc2ee7
                              • Opcode Fuzzy Hash: b36bc87eb4507af4992a544fbd13103342267bc18c2cc7e8b00c7cda52f17d37
                              • Instruction Fuzzy Hash: E73193319001299BEB15FBA8DD55EFD7734AF10309F4046A8E506B60E0EFB47AC6CB96
                              APIs
                              • _strftime.LIBCMT ref: 00401AD3
                                • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                              • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                              • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                              • API String ID: 3809562944-3643129801
                              • Opcode ID: e789c898a8776279d1be885f4496294a579eb7a6de74ead4328c70602f75bda2
                              • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                              • Opcode Fuzzy Hash: e789c898a8776279d1be885f4496294a579eb7a6de74ead4328c70602f75bda2
                              • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                              • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                              • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                              • waveInStart.WINMM ref: 00401A81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: XCG$`=G$x=G
                              • API String ID: 1356121797-903574159
                              • Opcode ID: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                              • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                              • Opcode Fuzzy Hash: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                              • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 04821BE2
                              • waveInOpen.WINMM(00471AF8,000000FF,00471B00,00401A8E,00000000,00000000,00000024), ref: 04821C78
                              • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 04821CCD
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 04821CDC
                              • waveInStart.WINMM ref: 04821CE8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: XCG$`=G$x=G
                              • API String ID: 1356121797-903574159
                              • Opcode ID: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                              • Instruction ID: 4bda1be03014c5cc2f55c35e1a7c01958b1303f3f27c270cb6369f1c3111c8aa
                              • Opcode Fuzzy Hash: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                              • Instruction Fuzzy Hash: A5218035A013119BC714DF7DBD1995A7BA9FB84741B00893AE11DD76B0EBB4A881CB0D
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                              • lstrcpyn.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                              • Shell_NotifyIcon.SHELL32(00000000,00473B50), ref: 0041C9EF
                              • TranslateMessage.USER32(?), ref: 0041C9FB
                              • DispatchMessageA.USER32(?), ref: 0041CA05
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                              • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                              • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                              • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                              • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b50f87e948356266a42ac280b2451f101745a062afa0556d4abdae292072cfe6
                              • Instruction ID: 4ca71a411a6a262d88605ff2c255d7dcec850e4746f94a42336ea1770a8f42e1
                              • Opcode Fuzzy Hash: b50f87e948356266a42ac280b2451f101745a062afa0556d4abdae292072cfe6
                              • Instruction Fuzzy Hash: 39C11770E04269AFDF51DFACD844BADBBB1AF09318F044A54E906E7392D770B941CB61
                              APIs
                              • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                              • __alloca_probe_16.LIBCMT ref: 00452C91
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                              • __alloca_probe_16.LIBCMT ref: 00452D3B
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                              • __freea.LIBCMT ref: 00452DAA
                              • __freea.LIBCMT ref: 00452DB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 201697637-0
                              • Opcode ID: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                              • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                              • Opcode Fuzzy Hash: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                              • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 5328bd0f7edc37ac40c0d0f8fad2384ac8a9632e9013bb03371bda9eca2e0847
                              • Instruction ID: 077754badaf637bb04221b9c26217eb32098cff1467e86b9764186538fe015de
                              • Opcode Fuzzy Hash: 5328bd0f7edc37ac40c0d0f8fad2384ac8a9632e9013bb03371bda9eca2e0847
                              • Instruction Fuzzy Hash: 5A51CF31900249AFDB91DF7CD840BEEBBF1FF09304F140AA9E896EB251D676A805DB50
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • _memcmp.LIBVCRUNTIME ref: 004446A3
                              • _free.LIBCMT ref: 00444714
                              • _free.LIBCMT ref: 0044472D
                              • _free.LIBCMT ref: 0044475F
                              • _free.LIBCMT ref: 00444768
                              • _free.LIBCMT ref: 00444774
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                              • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                              • Opcode Fuzzy Hash: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                              • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                              APIs
                                • Part of subcall function 04867126: GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                                • Part of subcall function 04867126: _free.LIBCMT ref: 0486715D
                                • Part of subcall function 04867126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                                • Part of subcall function 04867126: _abort.LIBCMT ref: 048671A4
                              • _memcmp.LIBVCRUNTIME ref: 0486490A
                              • _free.LIBCMT ref: 0486497B
                              • _free.LIBCMT ref: 04864994
                              • _free.LIBCMT ref: 048649C6
                              • _free.LIBCMT ref: 048649CF
                              • _free.LIBCMT ref: 048649DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 073fed261fa285cd6c65459185357f93b396e03b6829dbcf8ce3010cb8f635a5
                              • Instruction ID: dc186985e75a115a720422a90c502f060bddb5f93ac5ade98edbb15bc76be6a5
                              • Opcode Fuzzy Hash: 073fed261fa285cd6c65459185357f93b396e03b6829dbcf8ce3010cb8f635a5
                              • Instruction Fuzzy Hash: D5B12A75A012199FDB65DF18C884AADB7B4FF08704F104AAAD94AE7350E771BE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                              • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                              • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                              • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: gKE$HE$HE
                              • API String ID: 269201875-2777690135
                              • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                              • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                              • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                              • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004017BC
                                • Part of subcall function 004334CF: RtlEnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                • Part of subcall function 004334CF: RtlLeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                              • RtlExitUserThread.KERNEL32(00000000), ref: 004017F4
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                • Part of subcall function 00433519: RtlEnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                • Part of subcall function 00433519: RtlLeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepareUser__onexitwave
                              • String ID: T=G$p[G$>G$>G
                              • API String ID: 2307665288-2461731529
                              • Opcode ID: 9cfb955585da3b25f3af39c5c40d798f801c27b3d7342a2d9258cce51ad4b1de
                              • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                              • Opcode Fuzzy Hash: 9cfb955585da3b25f3af39c5c40d798f801c27b3d7342a2d9258cce51ad4b1de
                              • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 04821A23
                                • Part of subcall function 04853736: RtlEnterCriticalSection.NTDLL(00470D18), ref: 04853740
                                • Part of subcall function 04853736: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 04853773
                              • RtlExitUserThread.NTDLL(00000000), ref: 04821A5B
                              • waveInUnprepareHeader.WINMM(00001E64,00000020,00000000,?,00000020,00473EE8,00000000), ref: 04821B69
                                • Part of subcall function 04853780: RtlEnterCriticalSection.NTDLL(00470D18), ref: 0485378B
                                • Part of subcall function 04853780: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 048537C8
                                • Part of subcall function 04853B0C: __onexit.LIBCMT ref: 04853B12
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepareUser__onexitwave
                              • String ID: T=G$p[G$>G$>G
                              • API String ID: 2307665288-2461731529
                              • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                              • Instruction ID: c615bb01ea99ffcae185a7d24931f53ff85d8a5675939c15d5e87618fc2128d3
                              • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                              • Instruction Fuzzy Hash: 4241D4316042205BE325EB6CDE54EAE73A5EB80314F504F6AE51ADA1F0DFB0B9C5C617
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 04832F28
                                • Part of subcall function 04832C11: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 04832C84
                                • Part of subcall function 04832C11: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 04832CB3
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 04833098
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: TUF$TUFTUF$>G$DG$DG
                              • API String ID: 3114080316-72097156
                              • Opcode ID: 09c09115532b36cedb4214abfd7c567596c85741be2dd330b3884bc25d138105
                              • Instruction ID: add1d554b3a926f518ef253af44db70ed8ec6fd6aa941247c01ed00431fe2839
                              • Opcode Fuzzy Hash: 09c09115532b36cedb4214abfd7c567596c85741be2dd330b3884bc25d138105
                              • Instruction Fuzzy Hash: 5B41EA316042506BE324F72CD950EEF73949F90308F408E6EE54AD7290EFA47D8986A7
                              APIs
                              • GetForegroundWindow.USER32 ref: 04829DA6
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 04829DB2
                              • GetKeyboardLayout.USER32(00000000), ref: 04829DB9
                              • GetKeyState.USER32(00000010), ref: 04829DC3
                              • GetKeyboardState.USER32(?), ref: 04829DCE
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 04829E83
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                              • String ID: 8[G
                              • API String ID: 3566172867-1691237782
                              • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                              • Instruction ID: 8d28f81ec0270b268d89967b303291fea83e534f974d21b3ba1a6a06f749bfaf
                              • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                              • Instruction Fuzzy Hash: 00315DB2504308ABE7109B94DC44F9B77ACEB48715F00093ABA45D61A0E6B1A5889B92
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                              • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                              • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                              • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                              APIs
                                • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                              • _wcslen.LIBCMT ref: 0041A8F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                              • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 3286818993-703403762
                              • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                              • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                              • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                              • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 04829C68
                              • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 04829C76
                              • GetLastError.KERNEL32 ref: 04829C82
                                • Part of subcall function 0483A8ED: GetLocalTime.KERNEL32(00000000), ref: 0483A907
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 04829CD2
                              • TranslateMessage.USER32(?), ref: 04829CE1
                              • DispatchMessageA.USER32(?), ref: 04829CEC
                              Strings
                              • Keylogger initialization failure: error , xrefs: 04829C99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error
                              • API String ID: 3219506041-952744263
                              • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                              • Instruction ID: 1a5efcf0de8a3af64371f9673983a13f41a761226ce673539d868bb933ef393e
                              • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                              • Instruction Fuzzy Hash: EF11C1B16043119B9310BB79AD49D6B77ECAB85A16F000A7AFC86C2250FA60F540C7A6
                              APIs
                              • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                              • GetConsoleWindow.KERNEL32 ref: 0041BEBF
                              • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$Window$AllocOutputShow
                              • String ID: Remcos v$5.3.0 Pro$CONOUT$
                              • API String ID: 4067487056-2527699604
                              • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                              • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                              • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                              • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                              • __alloca_probe_16.LIBCMT ref: 004499E2
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                              • __alloca_probe_16.LIBCMT ref: 00449AC7
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                              • __freea.LIBCMT ref: 00449B37
                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • __freea.LIBCMT ref: 00449B40
                              • __freea.LIBCMT ref: 00449B65
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID:
                              • API String ID: 3864826663-0
                              • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                              • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                              • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                              • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                              APIs
                              • SendInput.USER32 ref: 00418B08
                              • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                              • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend$Virtual
                              • String ID:
                              • API String ID: 1167301434-0
                              • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                              • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                              • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                              • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                              APIs
                              • OpenClipboard.USER32 ref: 00415A46
                              • EmptyClipboard.USER32 ref: 00415A54
                              • CloseClipboard.USER32 ref: 00415A5A
                              • OpenClipboard.USER32 ref: 00415A61
                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                              • CloseClipboard.USER32 ref: 00415A89
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID:
                              • API String ID: 2172192267-0
                              • Opcode ID: de12941edbbee2554ef4b3ac52f7e037dcad4b46b22ed329c995893b29769f03
                              • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                              • Opcode Fuzzy Hash: de12941edbbee2554ef4b3ac52f7e037dcad4b46b22ed329c995893b29769f03
                              • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                              APIs
                              • GetCPInfo.KERNEL32(?,?), ref: 04872E3D
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 04872EC0
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 04872F53
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 04872F6A
                                • Part of subcall function 04866D66: RtlAllocateHeap.NTDLL(00000000,0485468A,?), ref: 04866D98
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 04872FE6
                              • __freea.LIBCMT ref: 04873011
                              • __freea.LIBCMT ref: 0487301D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 2829977744-0
                              • Opcode ID: c4a89f2486a78fdb2d2cd6a1d115c2a82ca2a719920f1ba833c456cc9ed525cb
                              • Instruction ID: ad3755a233a86ed4fa62cdd626ea3057410bebab70e2364367c3e20065006305
                              • Opcode Fuzzy Hash: c4a89f2486a78fdb2d2cd6a1d115c2a82ca2a719920f1ba833c456cc9ed525cb
                              • Instruction Fuzzy Hash: 9791C772E0025A9BDF219E64CC60EEEBBB5EF08714F144BA9EC15E7181E735E880D761
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: udp
                              • API String ID: 0-4243565622
                              • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                              • Instruction ID: 02b6557b31e57e00b3b242a8133555a6af676399e27c118544d64aa6419c0529
                              • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                              • Instruction Fuzzy Hash: 54718A31A093568FDB25CF18848462AB6E4AF8474BF044E2EFC86D7261E774F945CBC2
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                              • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                              • Opcode Fuzzy Hash: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                              • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                              • Instruction ID: 5f1e1b46fb1780cec70f4b0bfeefb2239ca0cd91a205223039461706624b5a15
                              • Opcode Fuzzy Hash: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                              • Instruction Fuzzy Hash: E961D572D00209AFDBA0DF68D841B9ABBF5EF44714F144A69EB46EB240E771ED41CB50
                              APIs
                                • Part of subcall function 04830820: SetLastError.KERNEL32(0000000D,04830D9F,?,00000000), ref: 04830826
                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,04830D7C), ref: 04830E2B
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 04830E91
                              • RtlAllocateHeap.NTDLL(00000000), ref: 04830E98
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04830FA6
                              • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,04830D7C), ref: 04830FD0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Heap$AllocateInfoNativeProcessSystem
                              • String ID: A
                              • API String ID: 4001361727-520424720
                              • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                              • Instruction ID: 1a8aec3960d0fd8c6a574f3606c1227f0f5fe00d2285429550ecac0c24b61b2b
                              • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                              • Instruction Fuzzy Hash: B861D270705205ABDB109F29CD80B267BE5BF86706F048A29FD05CB289E7B4F445CBD6
                              APIs
                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • _free.LIBCMT ref: 00444086
                              • _free.LIBCMT ref: 0044409D
                              • _free.LIBCMT ref: 004440BC
                              • _free.LIBCMT ref: 004440D7
                              • _free.LIBCMT ref: 004440EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID: J7D
                              • API String ID: 3033488037-1677391033
                              • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                              • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                              • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                              • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                              APIs
                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                              • __fassign.LIBCMT ref: 0044A180
                              • __fassign.LIBCMT ref: 0044A19B
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                              • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                              • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                              • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                              • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                              • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                              APIs
                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0486AA9F,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0486A36C
                              • __fassign.LIBCMT ref: 0486A3E7
                              • __fassign.LIBCMT ref: 0486A402
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0486A428
                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0486AA9F,00000000,?,?,?,?,?,?,?,?,?,0486AA9F,?), ref: 0486A447
                              • WriteFile.KERNEL32(?,?,00000001,0486AA9F,00000000,?,?,?,?,?,?,?,?,?,0486AA9F,?), ref: 0486A480
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: d742a0ed7e7f80d5daee9f90daca0257aad30d4fad8407fa3c2509fb5468b32f
                              • Instruction ID: c5d46b53993488172170f9097981e1a80fc2c2b58255d61b0820b31c772d3c05
                              • Opcode Fuzzy Hash: d742a0ed7e7f80d5daee9f90daca0257aad30d4fad8407fa3c2509fb5468b32f
                              • Instruction Fuzzy Hash: 3E51D671A002099FDB14CFA8DC45BEEBBF5EF0A310F144A6AE95AF7251D730A940CB65
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: TUFTUF$>G$DG$DG
                              • API String ID: 3114080316-344394840
                              • Opcode ID: a246e9b51e8787535268c8dbd34b2557dfb32c380a5f04f9bf28eb25711f8795
                              • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                              • Opcode Fuzzy Hash: a246e9b51e8787535268c8dbd34b2557dfb32c380a5f04f9bf28eb25711f8795
                              • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                              APIs
                                • Part of subcall function 0483B3C2: GetCurrentProcess.KERNEL32(00000003,?,?,0483A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0483B3D3
                                • Part of subcall function 0483B3C2: IsWow64Process.KERNEL32(00000000,?,?,0483A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0483B3DA
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0482E928
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0482E94C
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0482E95B
                              • CloseHandle.KERNEL32(00000000), ref: 0482EB12
                                • Part of subcall function 0483B3EE: OpenProcess.KERNEL32(00000400,00000000), ref: 0483B403
                                • Part of subcall function 0483B3EE: IsWow64Process.KERNEL32(00000000,?), ref: 0483B40E
                                • Part of subcall function 0483B5E4: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0483B5FC
                                • Part of subcall function 0483B5E4: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0483B60F
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0482EB03
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID: PgF
                              • API String ID: 2180151492-654241383
                              • Opcode ID: 4103c74ef064f91666f8864adad10e095dbae6404165e6ea80ccaa02d20916fc
                              • Instruction ID: b31dd751855753dba2c6321a722e9aa81ad9a6bb9c74f2c5d99bce2111b6b019
                              • Opcode Fuzzy Hash: 4103c74ef064f91666f8864adad10e095dbae6404165e6ea80ccaa02d20916fc
                              • Instruction Fuzzy Hash: 274143312082509BD325FB68DD50EEF73E9AF94305F004E6DE54AD21A0EF70BA89C657
                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                              • _ValidateLocalCookies.LIBCMT ref: 00437B41
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                              • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: csm
                              • API String ID: 1170836740-1018135373
                              • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                              • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                              • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                              • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                              APIs
                              • _strftime.LIBCMT ref: 04821D3A
                                • Part of subcall function 04821E4F: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 04821EBB
                              • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 04821DEC
                              • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 04821E2A
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 04821E39
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: `=G$x=G
                              • API String ID: 3809562944-3004145341
                              • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                              • Instruction ID: f3397ffa7374575255f86e6ac20383fead86f35e14588916e591aba45c526579
                              • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                              • Instruction Fuzzy Hash: 0C316D31504350AFE324FF28DD54AAA77A8BB94304F004A79E559D21B0EFB4B989CB57
                              APIs
                                • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                              • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              • API String ID: 1133728706-4073444585
                              • Opcode ID: 1166db4daed8d1db40675aae0048c6928f78f3371c997fab95fd3a15c1ee7f5f
                              • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                              • Opcode Fuzzy Hash: 1166db4daed8d1db40675aae0048c6928f78f3371c997fab95fd3a15c1ee7f5f
                              • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                              • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                              • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                              • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 73f4216d9227424834ab683a62f21571e8b2afaadca920fe74bb7b8a40116277
                              • Instruction ID: 397270ec91c9ead40c0718fa8ba22398eb5d19180a7f40ef6cc1bc950768d646
                              • Opcode Fuzzy Hash: 73f4216d9227424834ab683a62f21571e8b2afaadca920fe74bb7b8a40116277
                              • Instruction Fuzzy Hash: 16110A72508219BFDB202F79AC48D2B7FADDFC5734B100F69F812C6250EA71E84096A1
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                              • int.LIBCPMT ref: 0040FC0F
                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                              • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: P[G
                              • API String ID: 2536120697-571123470
                              • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                              • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                              • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                              • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0482FE63
                              • int.LIBCPMT ref: 0482FE76
                                • Part of subcall function 0482D147: std::_Lockit::_Lockit.LIBCPMT ref: 0482D158
                                • Part of subcall function 0482D147: std::_Lockit::~_Lockit.LIBCPMT ref: 0482D172
                              • std::_Facet_Register.LIBCPMT ref: 0482FEB2
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0482FED8
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0482FEF4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: P[G
                              • API String ID: 2536120697-571123470
                              • Opcode ID: 66d1d2f93b0a437ba6194d5bb56da3cbca8cefc802f69fb3ca8fff7099274c15
                              • Instruction ID: 1a4a9dcb106e15e50ba26770ef66bd810615f76c817adb5f08c9ef281e7b01ab
                              • Opcode Fuzzy Hash: 66d1d2f93b0a437ba6194d5bb56da3cbca8cefc802f69fb3ca8fff7099274c15
                              • Instruction Fuzzy Hash: 18113A31D00128A7DB05F7ACD9449DE77B89F40618B200A55EA05FB190EBB0BF85C7D6
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                              • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                              • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041A54E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: ed38c8eb47c4413ac5ddd4ccc21499adaf56ac1386eedc0bb40dd9b82a8380be
                              • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                              • Opcode Fuzzy Hash: ed38c8eb47c4413ac5ddd4ccc21499adaf56ac1386eedc0bb40dd9b82a8380be
                              • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                              APIs
                                • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                              • _free.LIBCMT ref: 0044FD29
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 0044FD34
                              • _free.LIBCMT ref: 0044FD3F
                              • _free.LIBCMT ref: 0044FD93
                              • _free.LIBCMT ref: 0044FD9E
                              • _free.LIBCMT ref: 0044FDA9
                              • _free.LIBCMT ref: 0044FDB4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                              • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                              APIs
                                • Part of subcall function 0486FC89: _free.LIBCMT ref: 0486FCB2
                              • _free.LIBCMT ref: 0486FF90
                                • Part of subcall function 04866D2C: HeapFree.KERNEL32(00000000,00000000,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?), ref: 04866D42
                                • Part of subcall function 04866D2C: GetLastError.KERNEL32(?,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?,?), ref: 04866D54
                              • _free.LIBCMT ref: 0486FF9B
                              • _free.LIBCMT ref: 0486FFA6
                              • _free.LIBCMT ref: 0486FFFA
                              • _free.LIBCMT ref: 04870005
                              • _free.LIBCMT ref: 04870010
                              • _free.LIBCMT ref: 0487001B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction ID: fa53fe81400c75fbc0b7f938394d442eaeaf38b12bc16a12a7f4feb52a84c5eb
                              • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction Fuzzy Hash: 93115471540718B6E5A0B774DC06FCB7FAD9F08B04F400E15A7ABEA451D6FBF5048652
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\NujUXO42Rg.exe), ref: 00406835
                                • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                              • CoUninitialize.OLE32 ref: 0040688E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-2218356347
                              • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                              • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                              • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                              • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                              • int.LIBCPMT ref: 0040FEF2
                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                              • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: H]G
                              • API String ID: 2536120697-1717957184
                              • Opcode ID: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                              • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                              • Opcode Fuzzy Hash: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                              • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 04830146
                              • int.LIBCPMT ref: 04830159
                                • Part of subcall function 0482D147: std::_Lockit::_Lockit.LIBCPMT ref: 0482D158
                                • Part of subcall function 0482D147: std::_Lockit::~_Lockit.LIBCPMT ref: 0482D172
                              • std::_Facet_Register.LIBCPMT ref: 04830195
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 048301BB
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 048301D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: H]G
                              • API String ID: 2536120697-1717957184
                              • Opcode ID: 0a2989e8c640b6c3179e3035855110f6a7cb0f7e06d84751caa425ed32edbe19
                              • Instruction ID: 2da4b59c2027a4c6fcafffca6c98ce5bcde9c37bfdfa1c3153567ff8e5db8816
                              • Opcode Fuzzy Hash: 0a2989e8c640b6c3179e3035855110f6a7cb0f7e06d84751caa425ed32edbe19
                              • Instruction Fuzzy Hash: 8A110231900518EBDB05FFA8C9409EDB7B89F41619B200A58D801F71A4EFB0BF45CBD6
                              APIs
                              • _wcslen.LIBCMT ref: 048269EF
                              • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 04826A50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$[+] CoGetObject SUCCESS$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-4254711192
                              • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                              • Instruction ID: acce938eb3508a4e9854676820a540028ada67a5ae495b1d98483a0a33388d12
                              • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                              • Instruction Fuzzy Hash: BE11A572910128AFEB10EBA8DD54BDEB7BCDB44714F50056AE905F3140FBB8AF44867A
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                              • GetLastError.KERNEL32 ref: 0040B2EE
                              Strings
                              • [Chrome Cookies found, cleared!], xrefs: 0040B314
                              • [Chrome Cookies not found], xrefs: 0040B308
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                              • UserProfile, xrefs: 0040B2B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: 45e32228aa009ae6db7946c5e54d0309790eb3edd30a2fcdc75fecf9f9571f1a
                              • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                              • Opcode Fuzzy Hash: 45e32228aa009ae6db7946c5e54d0309790eb3edd30a2fcdc75fecf9f9571f1a
                              • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0483CBEF
                                • Part of subcall function 0483CC86: RegisterClassExA.USER32(00000030), ref: 0483CCD3
                                • Part of subcall function 0483CC86: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0483CCEE
                                • Part of subcall function 0483CC86: GetLastError.KERNEL32 ref: 0483CCF8
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0483CC26
                              • lstrcpyn.KERNEL32(00473B68,0046C104,00000080), ref: 0483CC40
                              • Shell_NotifyIcon.SHELL32(00000000,00473B50), ref: 0483CC56
                              • TranslateMessage.USER32(?), ref: 0483CC62
                              • DispatchMessageA.USER32(?), ref: 0483CC6C
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0483CC79
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID:
                              • API String ID: 1970332568-0
                              • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction ID: 8118e837d70abda59cc35be9a0055a395a79e7feaea9e244994a665d7972005b
                              • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction Fuzzy Hash: 810144B1904344ABD7109FA5EC4CEDB7BBCA745B16F004135F605E3062D7B8A245DB6D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe$Rmc-I7G983$BG
                              • API String ID: 0-148614549
                              • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                              • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                              • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                              • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe$Rmc-I7G983$BG
                              • API String ID: 0-148614549
                              • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                              • Instruction ID: bb6cdca996399e6ab868740586384e0f4cf61d559c3858077cb432b7e6c930ce
                              • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                              • Instruction Fuzzy Hash: 26F09670B412319BDB203B746E187793645F780796F004E75F509E6261FB64A8C18689
                              APIs
                              • __allrem.LIBCMT ref: 00439789
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                              • __allrem.LIBCMT ref: 004397BC
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                              • __allrem.LIBCMT ref: 004397F1
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                              • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                              • Opcode Fuzzy Hash: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                              • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                              APIs
                              • __allrem.LIBCMT ref: 048599F0
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04859A0C
                              • __allrem.LIBCMT ref: 04859A23
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04859A41
                              • __allrem.LIBCMT ref: 04859A58
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04859A76
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                              • Instruction ID: 1d7a0174eab5df840d765e36873b4539b0c1add724f93be941e5993fdd95b619
                              • Opcode Fuzzy Hash: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                              • Instruction Fuzzy Hash: 4381E9F2600B06EBF7259E6DCC41B6A73A9AF40378F144F2AE915D7690E7B0F9408B51
                              APIs
                              • _free.LIBCMT ref: 04862DCF
                              • _free.LIBCMT ref: 04862DE9
                              • _free.LIBCMT ref: 04862DF4
                              • _free.LIBCMT ref: 04862EC8
                              • _free.LIBCMT ref: 04862EE4
                                • Part of subcall function 0485AABB: IsProcessorFeaturePresent.KERNEL32(00000017,0485AA8D,?,?,04821BC9,?,?,00000000,?,?,0485AAAD,00000000,00000000,00000000,00000000,00000000), ref: 0485AABD
                                • Part of subcall function 0485AABB: GetCurrentProcess.KERNEL32(C0000417), ref: 0485AADF
                                • Part of subcall function 0485AABB: TerminateProcess.KERNEL32(00000000), ref: 0485AAE6
                              • _free.LIBCMT ref: 04862EEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Process$CurrentFeaturePresentProcessorTerminate
                              • String ID:
                              • API String ID: 2329545287-0
                              • Opcode ID: e40ad7fbed77d86ed48c5751771db778d898a633fb700c5612ced942e7692302
                              • Instruction ID: a8ac83990a572bf18f5ad47aee51727a39936af10c8d8cbcaa3e7f8e7bc92d9a
                              • Opcode Fuzzy Hash: e40ad7fbed77d86ed48c5751771db778d898a633fb700c5612ced942e7692302
                              • Instruction Fuzzy Hash: 1351B2369042185BEB55BF7C9840ABA77A8DF40314F144BD9ED06EB281FA72BD41C251
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,04869E08,00000001,00000001,00000006), ref: 04869C11
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,?,?,?,04869E08,00000001,00000001,00000006), ref: 04869C97
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,00000006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 04869D91
                              • __freea.LIBCMT ref: 04869D9E
                                • Part of subcall function 04866D66: RtlAllocateHeap.NTDLL(00000000,0485468A,?), ref: 04866D98
                              • __freea.LIBCMT ref: 04869DA7
                              • __freea.LIBCMT ref: 04869DCC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                              • String ID:
                              • API String ID: 1414292761-0
                              • Opcode ID: a4f5f7d7e0253137201d24c54ea4cf660dd43f3a14d4cde2709bba3cbd133d87
                              • Instruction ID: 4794e057fbbae7627186399014ad199f0e156bbe44f7a7714e035840bf30f219
                              • Opcode Fuzzy Hash: a4f5f7d7e0253137201d24c54ea4cf660dd43f3a14d4cde2709bba3cbd133d87
                              • Instruction Fuzzy Hash: 2F51C1B2600216AFEB658E68CC40EAA77A9EF40764F154B39FC06DA180EB75FC50C760
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                              • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                              • Opcode Fuzzy Hash: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                              • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                              • Instruction ID: c8a7a1120a14d759c9443fd7ed8143dd08c6cfe73ae597f4166a453c6340d058
                              • Opcode Fuzzy Hash: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                              • Instruction Fuzzy Hash: AC516F32D00105ABEBA19F6C8D40EAE77A9DF49B34F104B1DFC17D6191EB71F9408669
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: 15c1efeab650589001bcb3423f25e61575b515edc70c88f8593ca702e347ec5e
                              • Instruction ID: abd581b7f26b004c560c83cc11374cb8f32fc3f6190f7d48287024f09eb70409
                              • Opcode Fuzzy Hash: 15c1efeab650589001bcb3423f25e61575b515edc70c88f8593ca702e347ec5e
                              • Instruction Fuzzy Hash: 595163B0900305AEEB519F69CC81FEEB6F8FF48304F44492DE59AF2241DBB5A8458B21
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16
                              • String ID: a/p$am/pm
                              • API String ID: 3509577899-3206640213
                              • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                              • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                              • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                              • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00403E8A
                                • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                              • API String ID: 3469354165-462540288
                              • Opcode ID: 3a68b2b278323215d64d6165b3cb7497d5ac47ec80e4e86ec93a288f612456aa
                              • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                              • Opcode Fuzzy Hash: 3a68b2b278323215d64d6165b3cb7497d5ac47ec80e4e86ec93a288f612456aa
                              • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 048240F1
                                • Part of subcall function 04824234: __EH_prolog.LIBCMT ref: 04824239
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                              • API String ID: 3469354165-462540288
                              • Opcode ID: 37a605f6fc1509c022d5344fe3f73bddb8cf724610274ffecc6b5ec626bfb4aa
                              • Instruction ID: caefd260f3580ddbf1384db76535662b054753d5e80c040d83180bdd9c3b0de0
                              • Opcode Fuzzy Hash: 37a605f6fc1509c022d5344fe3f73bddb8cf724610274ffecc6b5ec626bfb4aa
                              • Instruction Fuzzy Hash: 3841F630A0422057EB14FB7C8A1465D3691AB41A48F004F69EC1AD77E5EFB4BAC5C797
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 04826E9F
                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0), ref: 04826EE7
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              • CloseHandle.KERNEL32(00000000), ref: 04826F27
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 04826F44
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008), ref: 04826F6F
                              • DeleteFileW.KERNEL32(00000000), ref: 04826F7F
                                • Part of subcall function 048247C2: WaitForSingleObject.KERNEL32(?,000000FF,?,?,04824875,00000000,?,?), ref: 048247D1
                                • Part of subcall function 048247C2: SetEvent.KERNEL32(?,?,?,04824875,00000000,?,?), ref: 048247EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID:
                              • API String ID: 1303771098-0
                              • Opcode ID: 7cdf14121b30b943d831dc041884720089c76492bcd48607f22f732c73577ab1
                              • Instruction ID: fb0877a707aa0376c2c41ec2172cd97451b17f00ae3f2603e1e8de857265f517
                              • Opcode Fuzzy Hash: 7cdf14121b30b943d831dc041884720089c76492bcd48607f22f732c73577ab1
                              • Instruction Fuzzy Hash: 263192715083149FD210EF24DE44DAFB7A8FB94655F004F6EF985E2150EBB4BA88CB92
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                              • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                              • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                              • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011), ref: 04839EFB
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F), ref: 04839F12
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 04839F1F
                              • ControlService.ADVAPI32(00000000,00000001,?), ref: 04839F2E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$Open$CloseControlHandleManager
                              • String ID:
                              • API String ID: 1243734080-0
                              • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                              • Instruction ID: bfd853437b04fdf442c61f63f8a1c5c48ed208ccc9c7f95bfe60033114dd4507
                              • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                              • Instruction Fuzzy Hash: 3711C672545218AFD7116B64EC84DBF3BBCDB45AA6B000535F902D20C1DBA4DC46DAF1
                              APIs
                              • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                              • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                              • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                              • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                              • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                              APIs
                              • GetLastError.KERNEL32(?,?,04858064,04857A18), ref: 0485807B
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 04858089
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 048580A2
                              • SetLastError.KERNEL32(00000000,?,04858064,04857A18), ref: 048580F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                              • Instruction ID: 9c349b8827808d2861aeeeb0ed91c7879d917e38e6d16c1ce2a2049e6c33c158
                              • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                              • Instruction Fuzzy Hash: B901AC3221E3119EF7253B78BC8862B2755FB01779B20073BFE18C55F0EF6168515655
                              APIs
                              • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • _free.LIBCMT ref: 00446EF6
                              • _free.LIBCMT ref: 00446F1E
                              • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • _abort.LIBCMT ref: 00446F3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                              • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                              APIs
                              • GetLastError.KERNEL32(?,0485E4C7,04859583,0485E4C7,00475B70,?,0485BBBC,FF8BC35D,00475B70,00473EE8), ref: 0486712A
                              • _free.LIBCMT ref: 0486715D
                              • _free.LIBCMT ref: 04867185
                              • SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 04867192
                              • SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 0486719E
                              • _abort.LIBCMT ref: 048671A4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction ID: 9dab00a25f06c9d6461480ebe7a7fa9aafaa6355df822a83dba58f93deddb545
                              • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction Fuzzy Hash: 73F0F93114470077E3D3373C6C05E1E26699BC16AEF240F26F52BE2290FF61E4424596
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                              • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                              • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                              • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                              • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                              • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                              • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                              • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                              • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                              • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]$DG
                              • API String ID: 3554306468-1089238109
                              • Opcode ID: 694dce4d70480d7b3be1ba608ab26d579951478be55e0cc1dc41939145a73817
                              • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                              • Opcode Fuzzy Hash: 694dce4d70480d7b3be1ba608ab26d579951478be55e0cc1dc41939145a73817
                              • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                              APIs
                                • Part of subcall function 04831900: TerminateProcess.KERNEL32(00000000,?,0482C8E4), ref: 04831910
                                • Part of subcall function 04831900: WaitForSingleObject.KERNEL32(000000FF,?,0482C8E4), ref: 04831923
                                • Part of subcall function 048328C4: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 048328E0
                                • Part of subcall function 048328C4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 048328F9
                                • Part of subcall function 048328C4: RegCloseKey.ADVAPI32(?), ref: 04832904
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0482C92E
                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0482CA8D
                              • ExitProcess.KERNEL32 ref: 0482CA99
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: @CG$exepath
                              • API String ID: 1913171305-1253070338
                              • Opcode ID: 7fefd4fcae7e0ef6d55ce9d204f1d3822a483be89a92adb2579d4a357fc0ee6e
                              • Instruction ID: 06478912425707309d67ee0435ac4bba25b0384cb6abbed3853d4ba093d9a3f7
                              • Opcode Fuzzy Hash: 7fefd4fcae7e0ef6d55ce9d204f1d3822a483be89a92adb2579d4a357fc0ee6e
                              • Instruction Fuzzy Hash: F94166329001386AEB14FB78DD50EFE7379AF50609F1006A9D806E3190EFA47EC5CA97
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 048340ED
                              • LoadLibraryA.KERNEL32(?), ref: 0483412F
                              • LoadLibraryA.KERNEL32(?), ref: 0483418E
                              • GetProcAddress.KERNEL32(00000000,?), ref: 048341B6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$AddressDirectoryProcSystem
                              • String ID: g<A
                              • API String ID: 4217395396-3237022798
                              • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                              • Instruction ID: 4880c00fb579c2620bb80162e5c77869ab11a450a049fe77d5ca9330e3e672ed
                              • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                              • Instruction Fuzzy Hash: 1031F5B69067256BD320EB24DC44E9F77DCEF45B85F000F25E844D3201E774E9808AEA
                              APIs
                                • Part of subcall function 00433519: RtlEnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                • Part of subcall function 00433519: RtlLeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                              • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                • Part of subcall function 004334CF: RtlEnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                • Part of subcall function 004334CF: RtlLeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                              • API String ID: 2974294136-753205382
                              • Opcode ID: 4edaf87c9c71299f8ef3cd98cc0e37af3e54353d82195265a94b6e4fabe15cbd
                              • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                              • Opcode Fuzzy Hash: 4edaf87c9c71299f8ef3cd98cc0e37af3e54353d82195265a94b6e4fabe15cbd
                              • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                              APIs
                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                              • wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(00000000,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                              • API String ID: 1497725170-248792730
                              • Opcode ID: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                              • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                              • Opcode Fuzzy Hash: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                              • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                              • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                              • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: `AG
                              • API String ID: 1958988193-3058481221
                              • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                              • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                              • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                              • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0482A0D6), ref: 0482A034
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0482A0D6), ref: 0482A043
                              • Sleep.KERNEL32(00002710,?,?,?,0482A0D6), ref: 0482A070
                              • CloseHandle.KERNEL32(00000000,?,?,?,0482A0D6), ref: 0482A077
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: `AG
                              • API String ID: 1958988193-3058481221
                              • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                              • Instruction ID: 24818328c9b2bf2ec40a9b2b385f8611bddf22e24ce8624f10e2ab11ccc62e67
                              • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                              • Instruction Fuzzy Hash: 0711EB30704760FAE735B7649E88A3E7B9AAF95315F440F68F286C2592C761B8C4C259
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                              • GetLastError.KERNEL32 ref: 0041CA91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                              • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                              • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                              • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0483CCD3
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0483CCEE
                              • GetLastError.KERNEL32 ref: 0483CCF8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                              • Instruction ID: 79a9d5d0c2bc72c176ce175be7dbffa8a92df8933c3b0930932697835685c2fc
                              • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                              • Instruction Fuzzy Hash: B001E9B1D1421DAB8B01DFD9DDC49EFBBBDBE49255B50462AF410B2100E7705A458BA4
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                              • CloseHandle.KERNEL32(?), ref: 00406A0F
                              • CloseHandle.KERNEL32(?), ref: 00406A14
                              Strings
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                              • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                              • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                              • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                              • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                              • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                              • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                              • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                              • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 048329E6
                              • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0482E832,pth_unenc,004742E0), ref: 04832A14
                              • RegCloseKey.ADVAPI32(?,?,0482E832,pth_unenc,004742E0), ref: 04832A1F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc$BG
                              • API String ID: 1818849710-2233081382
                              • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                              • Instruction ID: fae5011456fcac2667fbf8e18a0c3d55065f83e68f29e8d1622f192707d3f9ba
                              • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                              • Instruction Fuzzy Hash: 52F09671540218BBDF10AFA4ED55FEE376CEF00745F004A64F902D6051E671EB44DB50
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                              • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                              • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                              • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                              APIs
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                              • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                              • Sleep.KERNEL32(00002710), ref: 00419F79
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered
                              • API String ID: 614609389-2816303416
                              • Opcode ID: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                              • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                              • Opcode Fuzzy Hash: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                              • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                              • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                              • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                              • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                              • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                              • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                              • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e2c0e9d55fcd13551ec2678028d06ddb1c515a5452d77a18986bab3fa9fe77ab
                              • Instruction ID: 5f7beb9c50bd336ca0ebc96dca0dc393fd03f76ad73a13a54d13297e6a638749
                              • Opcode Fuzzy Hash: e2c0e9d55fcd13551ec2678028d06ddb1c515a5452d77a18986bab3fa9fe77ab
                              • Instruction Fuzzy Hash: 4771C631A042169BDB61DF54C8886BEBB76EF43364F144B29E853F7281D770A841CBA5
                              APIs
                                • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                              • RtlAllocateHeap.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                              • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Heap$AllocateInfoNativeProcessSystem
                              • String ID:
                              • API String ID: 4001361727-0
                              • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                              • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                              • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                              • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID:
                              • API String ID: 3033488037-0
                              • Opcode ID: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                              • Instruction ID: 9c3ad1f86948fba3a55274ed5d3a93d491f0f116c6b3c4f4046635607784cc6b
                              • Opcode Fuzzy Hash: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                              • Instruction Fuzzy Hash: DF51B131A00208AFDBA1DF6DD941A6E77F5EB48B24F140B69E80ADB250E775E901CB84
                              APIs
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                              • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                • Part of subcall function 0041B187: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1A7
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID:
                              • API String ID: 2180151492-0
                              • Opcode ID: e9d60bfe43037cee2d571e6d846ab44a25635f8e3edd29a439d85f29d954b860
                              • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                              • Opcode Fuzzy Hash: e9d60bfe43037cee2d571e6d846ab44a25635f8e3edd29a439d85f29d954b860
                              • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                              • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction ID: 8460871a92bb5d21277eecc2be362bb0af7a54f9bc276bb78df74823e40aeb7d
                              • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction Fuzzy Hash: BA41D132A002049FDB24DF7CD980A6DB7F5EF84324B154AA9D916EB391EB31F901CB81
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                              • __alloca_probe_16.LIBCMT ref: 0044FF58
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                              • __freea.LIBCMT ref: 0044FFC4
                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID:
                              • API String ID: 313313983-0
                              • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                              • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                              • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                              • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                              • _free.LIBCMT ref: 0044E1A0
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                              • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                              • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                              • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0486E3AB
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0486E3CE
                                • Part of subcall function 04866D66: RtlAllocateHeap.NTDLL(00000000,0485468A,?), ref: 04866D98
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0486E3F4
                              • _free.LIBCMT ref: 0486E407
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0486E416
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                              • Instruction ID: e94b532bdefd485106a81f2947251c7395ea4c243b02fe1aebc63a03609cd74c
                              • Opcode Fuzzy Hash: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                              • Instruction Fuzzy Hash: 7E012476605B147B27601BBAAC8CC7B7A2CDEC2EA17140638FD06C3201EA61DC0281B1
                              APIs
                              • GetLastError.KERNEL32(?,00000000,00000000,0043A7C2,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08,?), ref: 00446F48
                              • _free.LIBCMT ref: 00446F7D
                              • _free.LIBCMT ref: 00446FA4
                              • SetLastError.KERNEL32(00000000), ref: 00446FB1
                              • SetLastError.KERNEL32(00000000), ref: 00446FBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                              • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                              APIs
                              • GetLastError.KERNEL32(?,00000000,00000000,0485AA29,00000000,?,?,0485AAAD,00000000,00000000,00000000,00000000,00000000,00000000,04822E6F,?), ref: 048671AF
                              • _free.LIBCMT ref: 048671E4
                              • _free.LIBCMT ref: 0486720B
                              • SetLastError.KERNEL32(00000000), ref: 04867218
                              • SetLastError.KERNEL32(00000000), ref: 04867221
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction ID: 4ada56508de47a5983622d493e1dddf56d480279f2a7b5997a57ac4215ee61a5
                              • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction Fuzzy Hash: B001D63624470067D3922A386C45A2F2A6DDBC166DB240F36F93BE2291EEA5E8014595
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                              • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3C8
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpen$FileImageName
                              • String ID:
                              • API String ID: 2951400881-0
                              • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                              • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                              • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                              • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0483B5FC
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0483B60F
                              • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0483B62F
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0483B63A
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0483B642
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpen$FileImageName
                              • String ID:
                              • API String ID: 2951400881-0
                              • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                              • Instruction ID: 1eaeb6602eee7c79951f73d168bff65c0229643b7793edecf4cae12e674e9b6b
                              • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                              • Instruction Fuzzy Hash: 25F07DB16003196BE31067989C19F77B26CDB44797F000676F612D21A3FFB0FC8146A5
                              APIs
                              • _free.LIBCMT ref: 0044F7B5
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 0044F7C7
                              • _free.LIBCMT ref: 0044F7D9
                              • _free.LIBCMT ref: 0044F7EB
                              • _free.LIBCMT ref: 0044F7FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                              • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                              APIs
                              • _free.LIBCMT ref: 0486FA1C
                                • Part of subcall function 04866D2C: HeapFree.KERNEL32(00000000,00000000,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?), ref: 04866D42
                                • Part of subcall function 04866D2C: GetLastError.KERNEL32(?,?,0486FCB7,?,00000000,?,00000000,?,0486FF5B,?,00000007,?,?,0487046C,?,?), ref: 04866D54
                              • _free.LIBCMT ref: 0486FA2E
                              • _free.LIBCMT ref: 0486FA40
                              • _free.LIBCMT ref: 0486FA52
                              • _free.LIBCMT ref: 0486FA64
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction ID: 974a48c1db1b3afa169d9efd02e38793edd56d4f825a9feaf4cd687a6a1494dc
                              • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction Fuzzy Hash: DEF06232505244ABD6E0DB68F882C0677EEEA007197941D09F30AE7550D737FCC0C654
                              APIs
                              • _free.LIBCMT ref: 00443305
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 00443317
                              • _free.LIBCMT ref: 0044332A
                              • _free.LIBCMT ref: 0044333B
                              • _free.LIBCMT ref: 0044334C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                              • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                              • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                              • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                              APIs
                              • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                              • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                              • IsWindowVisible.USER32(?), ref: 004167A1
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessWindow$Open$TextThreadVisible
                              • String ID: (FG
                              • API String ID: 3142014140-2273637114
                              • Opcode ID: 8c9d400708d7676008f8b6917e8fc0d4ca328f5c6c017e5dca4436d7c141ebef
                              • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                              • Opcode Fuzzy Hash: 8c9d400708d7676008f8b6917e8fc0d4ca328f5c6c017e5dca4436d7c141ebef
                              • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                              APIs
                              • GetWindowThreadProcessId.USER32(?,?), ref: 048369CF
                              • GetWindowTextW.USER32(?,?,0000012C), ref: 04836A01
                              • IsWindowVisible.USER32(?), ref: 04836A08
                                • Part of subcall function 0483B5E4: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0483B5FC
                                • Part of subcall function 0483B5E4: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0483B60F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessWindow$Open$TextThreadVisible
                              • String ID: (FG
                              • API String ID: 3142014140-2273637114
                              • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                              • Instruction ID: d7a517c06a4ef608a07be67e99c7842ab23af212d27691b714711059567e212c
                              • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                              • Instruction Fuzzy Hash: 137145311082509ED365FB68D960EEF73A4EF94304F404E6DD58AD21A0EF747A89CB93
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 04832C84
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 04832CB3
                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 04832D54
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: DG
                              • API String ID: 3554306468-2560412334
                              • Opcode ID: bddf4943656ecba2bd9c39908ecfff909f44732c8dc369bfccc853cd4406e952
                              • Instruction ID: ab72eedb5d75a8e1804a1e0ce92d06d65de43faad428e038ac5f6c0ee18c7a6f
                              • Opcode Fuzzy Hash: bddf4943656ecba2bd9c39908ecfff909f44732c8dc369bfccc853cd4406e952
                              • Instruction Fuzzy Hash: BF51FD72108354AFE311EB64D950DABB3ECAF84704F404E6EBA95D2150EB74F6498B63
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                              • String ID: XCG$`AG$>G
                              • API String ID: 2334542088-2372832151
                              • Opcode ID: fdc7cd4a8e4d8b5acfad67b55764cc2d4921bd2f76632d42095ae9d2f2733ea9
                              • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                              • Opcode Fuzzy Hash: fdc7cd4a8e4d8b5acfad67b55764cc2d4921bd2f76632d42095ae9d2f2733ea9
                              • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 04829868
                                • Part of subcall function 04824458: socket.WS2_32(00000000,00000001,00000006), ref: 04824479
                                • Part of subcall function 048244F3: connect.WS2_32(?,00000000,00000000), ref: 0482450C
                                • Part of subcall function 0483B911: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,048298F0,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0483B926
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                              • String ID: XCG$`AG$>G
                              • API String ID: 2334542088-2372832151
                              • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                              • Instruction ID: 6160a6ae86621668531c8845d9f3135509b025b63e97db5e50120f50158ad40a
                              • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                              • Instruction Fuzzy Hash: 8C5173312082505FE329F76CD960EEF7394AF94304F404E6DE54AD31A0EEB0B99ACA57
                              APIs
                              • connect.WS2_32(?,00000000,00000000), ref: 0482450C
                              • WSAGetLastError.WS2_32(?,?,?,04821B92), ref: 0482464E
                                • Part of subcall function 0483A8ED: GetLocalTime.KERNEL32(00000000), ref: 0483A907
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $TLS Handshake... |
                              • API String ID: 227477821-1510355367
                              • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                              • Instruction ID: 59b0d8f8972ce7956c26d2c0128b4bc99482d6789daf6b69b9ab415083658ddb
                              • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                              • Instruction Fuzzy Hash: E2417A60B0072177B704B7BC8E0A93D7A55AB81748B400F99ED01D7691FED1B8948BFB
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\NujUXO42Rg.exe,00000104), ref: 00442714
                              • _free.LIBCMT ref: 004427DF
                              • _free.LIBCMT ref: 004427E9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe
                              • API String ID: 2506810119-3505467735
                              • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                              • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                              • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                              • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\NujUXO42Rg.exe,00000104), ref: 0486297B
                              • _free.LIBCMT ref: 04862A46
                              • _free.LIBCMT ref: 04862A50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe
                              • API String ID: 2506810119-3505467735
                              • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                              • Instruction ID: eaff47612d4a0b6ce26bc687223422f879e2bc5157767e73a55c193a36db654d
                              • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                              • Instruction Fuzzy Hash: A031B971A00208AFDB62EF5DDC84D9EBBFDEB85314F1046E6E906D7210D7B0AA81C751
                              APIs
                              • ShellExecuteW.SHELL32(00000000,0046559C,0046BA00,00000000,00000000,00000000), ref: 048368C3
                                • Part of subcall function 0483B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B89A
                              • Sleep.KERNEL32(00000064), ref: 048368EF
                              • DeleteFileW.KERNEL32(00000000), ref: 04836923
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t
                              • API String ID: 1462127192-3161277685
                              • Opcode ID: bb2c0f94cc430c17f8d99c3ea8886f75899e052070629971ff6dc793af8fbd9b
                              • Instruction ID: 51ccd45146984d235532ca8a0a67ceabcd2d6171576789f352c664138d05e636
                              • Opcode Fuzzy Hash: bb2c0f94cc430c17f8d99c3ea8886f75899e052070629971ff6dc793af8fbd9b
                              • Instruction Fuzzy Hash: 253149319001286AEB14FBA8DD95EED7734EF10708F404A65D506E71D0FFA47ACACA96
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$8>G
                              • API String ID: 368326130-2663660666
                              • Opcode ID: b1015e8b758e9c3129ee91cd0e7d28f26c3532ef63c23a422b137b4e1536ee93
                              • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                              • Opcode Fuzzy Hash: b1015e8b758e9c3129ee91cd0e7d28f26c3532ef63c23a422b137b4e1536ee93
                              • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                              APIs
                                • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                              • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                              • ExitProcess.KERNEL32 ref: 0040C63E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateExecuteExitFileProcessShell
                              • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                              • API String ID: 2309964880-3562070623
                              • Opcode ID: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                              • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                              • Opcode Fuzzy Hash: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                              • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                              • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                              • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: f033a4aead9e0acef95a16b174315c46b925166992e416fb7166f263872808a8
                              • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                              • Opcode Fuzzy Hash: f033a4aead9e0acef95a16b174315c46b925166992e416fb7166f263872808a8
                              • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                              APIs
                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0482AAEB
                              • wsprintfW.USER32 ref: 0482AB6C
                                • Part of subcall function 04829FBF: SetEvent.KERNEL32(00000000,?,00000000,0482AB83,00000000), ref: 04829FEB
                              Strings
                              • Offline Keylogger Started, xrefs: 0482AAE4
                              • [%04i/%02i/%02i %02i:%02i:%02i , xrefs: 0482AAF4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started
                              • API String ID: 1497725170-184404310
                              • Opcode ID: d5ceb195e9b1766e7296a956330388e17a452e3f282c8842e463cd6a29e782c0
                              • Instruction ID: d6923bb8e1c72a94bfcb8fa7294a5915b61e0ff823fc1931cef86129048632b9
                              • Opcode Fuzzy Hash: d5ceb195e9b1766e7296a956330388e17a452e3f282c8842e463cd6a29e782c0
                              • Instruction Fuzzy Hash: B3119672404128BADB18FB59ED50CFE77B8AE54315B00066AF802D2190EFB87AC5C6A6
                              APIs
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                              • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                              • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: 5ffc21e7f1a7812c534696ab81d5ccbc20bc1d1a481056626f751f2ccc9470c1
                              • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                              • Opcode Fuzzy Hash: 5ffc21e7f1a7812c534696ab81d5ccbc20bc1d1a481056626f751f2ccc9470c1
                              • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                              APIs
                              • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                              • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                              • __dosmaperr.LIBCMT ref: 0044AAFE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseErrorHandleLast__dosmaperr
                              • String ID: `@
                              • API String ID: 2583163307-951712118
                              • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                              • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                              • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                              • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404946
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                              • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: b2cf25a7feec8ed5c0674505605e409b24cdd005271a72cdcf94f99cf50b5b62
                              • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                              • Opcode Fuzzy Hash: b2cf25a7feec8ed5c0674505605e409b24cdd005271a72cdcf94f99cf50b5b62
                              • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 04824BAD
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04824BFB
                              • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 04824C0E
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 04824BC3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                              • Instruction ID: 2db7026a3c9fdbca67f0f9492528ad50d3e22c86f939bb629eca949b4d4c2728
                              • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                              • Instruction Fuzzy Hash: EB112320A042643BD710ABBA8C08FDB7FA8AF46658F400666F40992151DAB4B085CBF2
                              APIs
                                • Part of subcall function 0483B3C2: GetCurrentProcess.KERNEL32(00000003,?,?,0483A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0483B3D3
                                • Part of subcall function 0483B3C2: IsWow64Process.KERNEL32(00000000,?,?,0483A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0483B3DA
                                • Part of subcall function 0483277A: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0483279E
                                • Part of subcall function 0483277A: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 048327BB
                                • Part of subcall function 0483277A: RegCloseKey.ADVAPI32(?), ref: 048327C6
                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0483A740
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64
                              • String ID: (32 bit)$ (64 bit)$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 782494840-214125106
                              • Opcode ID: 6ae090941000325c3c897e8fa024b5b50426e295cbf2c4f387652279544f3053
                              • Instruction ID: a1b1676ba324a81a8df3142078bc5b99f1cc49968faead12af43a65eb9b95d52
                              • Opcode Fuzzy Hash: 6ae090941000325c3c897e8fa024b5b50426e295cbf2c4f387652279544f3053
                              • Instruction Fuzzy Hash: A3112950A0021126E708B7AC9C8AE6F76699B80205F504E79A551E31D1EF98BE8683E7
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                              • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                              • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                              • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                              • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                              • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                              • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                              • Opcode Fuzzy Hash: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                              • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                              • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                              • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 1818849710-27424756
                              • Opcode ID: a320ddec2c896e01fca0bf56be6ef48c2463d256e80f08a1b0a1932d390c4b64
                              • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                              • Opcode Fuzzy Hash: a320ddec2c896e01fca0bf56be6ef48c2463d256e80f08a1b0a1932d390c4b64
                              • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 04832948
                              • RegSetValueExA.ADVAPI32(004655B0,0046BE08,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0483BEAD,0046BE08,004655B0,00000001,00473EE8,00000000), ref: 04832970
                              • RegCloseKey.ADVAPI32(004655B0,?,?,0483BEAD,0046BE08,004655B0,00000001,00473EE8,00000000,?,04827C44,00000001), ref: 0483297B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 1818849710-27424756
                              • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                              • Instruction ID: c82dce84c280bd08802cd7574d34329dda0d6c94a572199a3a00fee2fbb44f5b
                              • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                              • Instruction Fuzzy Hash: 52F09032540118BBDB01AFA4ED14EEE376CEF00655F1086A4BD06E61A1EA71EE44DA90
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID: T=G$T=G$wkE
                              • API String ID: 3519838083-2195589345
                              • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                              • Instruction ID: 760545941bd20821a036eb009ff2ee1cc3e21be6752b11c06dd9a1dd1c156a5e
                              • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                              • Instruction Fuzzy Hash: FAF0BB71B001306BD714BB5C890065EB674DB41329F108BAA9415F7260C7B96D45C766
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: TUF
                              • API String ID: 1818849710-3431404234
                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 04832A4A
                              • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0482BBB3,004660E0,00000001,000000AF,00465554), ref: 04832A65
                              • RegCloseKey.ADVAPI32(?,?,?,?,0482BBB3,004660E0,00000001,000000AF,00465554), ref: 04832A70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: TUF
                              • API String ID: 1818849710-3431404234
                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction ID: a84d80bf66df94a88667e42bade791e580875ade58b99f3de05c85173d4b274d
                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction Fuzzy Hash: 65E06571540204BBDF219FA09C05FDB3BA8EB04B95F004160FB15E6191D271DE04D794
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                              • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                              • Opcode Fuzzy Hash: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                              • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                              APIs
                              • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                              • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                              • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: TerminateThread$HookUnhookWindows
                              • String ID: pth_unenc
                              • API String ID: 3123878439-4028850238
                              • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                              • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                              • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                              • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                              APIs
                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                              • GetProcAddress.KERNEL32(00000000), ref: 00401441
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetCursorInfo$User32.dll
                              • API String ID: 1646373207-2714051624
                              • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                              • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                              • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                              • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                              APIs
                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                              • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetLastInputInfo$User32.dll
                              • API String ID: 2574300362-1519888992
                              • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                              • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                              • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                              • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                              • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                              • Opcode Fuzzy Hash: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                              • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: 34a4a8fdb2fbaed24085f9f51e48c21e05a0faa9b4c0d03c29d10533be22c836
                              • Instruction ID: 4b7f60a27e0be145245b6431f2cc9c080f3b103dc88fcdd892a022ffd84033f6
                              • Opcode Fuzzy Hash: 34a4a8fdb2fbaed24085f9f51e48c21e05a0faa9b4c0d03c29d10533be22c836
                              • Instruction Fuzzy Hash: 7BA189B2A003869FEB21CF18C8907AEBBE1EF55354F244B6DD596DB3C0D278A941CB51
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                              • Instruction ID: 2b4c299511255a9341e48f0a9492c528ea540a6afc445751bdb524f9466dc1df
                              • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                              • Instruction Fuzzy Hash: 31413A316001047BF7216E7C9CACAAE3EA6EF81378F144F25F419D6690EAB4F9415263
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                              • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                              • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                              • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                              • Instruction ID: 283e4907f9a9d648fe6950c0cbf20f3cc489013e00fbaba3b0106865ed63e57d
                              • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                              • Instruction Fuzzy Hash: 16410A71A00704BFE7259F7CC848B6A7BE9EF88714F108F2AE102DB291E6B1F5418791
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                              • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID:
                              • API String ID: 3360349984-0
                              • Opcode ID: 06f030cb0f13d29b2941cfd1416e0d9a29746f81cc1fb687e7cb422a3bf7cec6
                              • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                              • Opcode Fuzzy Hash: 06f030cb0f13d29b2941cfd1416e0d9a29746f81cc1fb687e7cb422a3bf7cec6
                              • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 048249DF
                              • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 048249F3
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 048249FE
                              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 04824A07
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID:
                              • API String ID: 3360349984-0
                              • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                              • Instruction ID: 0e5a330e331156f207e4ab39c3939a3aaecbe378eceab7958b1865cb86b64893
                              • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                              • Instruction Fuzzy Hash: F141B471204321AFD715FB68DE54D7FB7E9AF80614F000F6DF896D22A0DE60B9898662
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000006,?,00000000,00000000,?,?,?,?,00000001,?,00000006,00000001,?,?), ref: 04870187
                              • MultiByteToWideChar.KERNEL32(?,00000001,00000006,?,00000000,?,?,?,?,00000001,?,00000006,00000001,?,?,?), ref: 04870210
                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,00000006,00000001,?,?,?,00000002,?), ref: 04870222
                              • __freea.LIBCMT ref: 0487022B
                                • Part of subcall function 04866D66: RtlAllocateHeap.NTDLL(00000000,0485468A,?), ref: 04866D98
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                              • String ID:
                              • API String ID: 2652629310-0
                              • Opcode ID: d6883ffe4d8719f2de826ec879274d1cc3acae2ccbd5fd9a5eba82e14a7f8a2b
                              • Instruction ID: e1dd010939f9a9faa55523a609f52cd5b1dfba4dca648893b9783d118b70e70b
                              • Opcode Fuzzy Hash: d6883ffe4d8719f2de826ec879274d1cc3acae2ccbd5fd9a5eba82e14a7f8a2b
                              • Instruction Fuzzy Hash: 70310272A1020AAFDF258FA8DC54EAE7BA5EF05754F050A68FC08D7250E735ED50CBA0
                              APIs
                              Strings
                              • Cleared browsers logins and cookies., xrefs: 0040B8EF
                              • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                              • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                              • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                              • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                              APIs
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                              • Sleep.KERNEL32(00000BB8), ref: 004115C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQuerySleepValue
                              • String ID: @CG$exepath$BG
                              • API String ID: 4119054056-3221201242
                              • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                              • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                              • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                              • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                              APIs
                                • Part of subcall function 048328C4: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 048328E0
                                • Part of subcall function 048328C4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 048328F9
                                • Part of subcall function 048328C4: RegCloseKey.ADVAPI32(?), ref: 04832904
                              • Sleep.KERNEL32(00000BB8), ref: 0483182A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQuerySleepValue
                              • String ID: @CG$exepath$BG
                              • API String ID: 4119054056-3221201242
                              • Opcode ID: 820c01e33afeab3fc0483e6c9ee435281bf1bbf0289cdfb463ea79f6631d800d
                              • Instruction ID: 55444f6e05d3d94f01470f982af916563c4245b1bf5ca48a5059e601b240e683
                              • Opcode Fuzzy Hash: 820c01e33afeab3fc0483e6c9ee435281bf1bbf0289cdfb463ea79f6631d800d
                              • Instruction Fuzzy Hash: 6821FB91B0032417E724B67C5E04A7F724D8BC1659F004FB9A916D72C2EF99B94582EB
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 048250D8
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 04825188
                              • TranslateMessage.USER32(?), ref: 04825197
                              • DispatchMessageA.USER32(?), ref: 048251A2
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 0482525A
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 04825292
                                • Part of subcall function 048246CF: send.WS2_32(?,00000000,00000000,00000000), ref: 04824764
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID:
                              • API String ID: 2956720200-0
                              • Opcode ID: 822d3e8355dfe554be3e3a6cb7f23e7c77d447b8df2c12cbc1a70b6fed0e93d0
                              • Instruction ID: 710c9b2cad9e98990782fffb4d27f15468737d996540548904dcc14c2fcc32e5
                              • Opcode Fuzzy Hash: 822d3e8355dfe554be3e3a6cb7f23e7c77d447b8df2c12cbc1a70b6fed0e93d0
                              • Instruction Fuzzy Hash: 7B2191715043116BD714FB78DE498AE77A8AB85618F400F29F922D3094EF75E648CB52
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: SystemTimes$Sleep__aulldiv
                              • String ID:
                              • API String ID: 188215759-0
                              • Opcode ID: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                              • Instruction ID: 3b66203fd79088dfadce72ddbf0b0401c54eb4bd27628439374ba0e7aa9136f0
                              • Opcode Fuzzy Hash: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                              • Instruction Fuzzy Hash: 9D215E725083009BC304DF65D98589FB7E8EFC8654F044A2EF589D3251EA34EA49CB63
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: SystemTimes$Sleep__aulldiv
                              • String ID:
                              • API String ID: 188215759-0
                              • Opcode ID: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                              • Instruction ID: eeccf2b84c2936b6a54dd6589a98846d5a7e248924a012b40d93222943ffb686
                              • Opcode Fuzzy Hash: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                              • Instruction Fuzzy Hash: 8A2121725083459FD304EF68D98489FB7E8EFC8655F044A2DF585D3250EA74EA098BA3
                              APIs
                                • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                              • Sleep.KERNEL32(000001F4), ref: 00409C95
                              • Sleep.KERNEL32(00000064), ref: 00409D1F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                              • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                              • Opcode Fuzzy Hash: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                              • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002), ref: 0483A063
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002), ref: 0483A077
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 0483A084
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0483A0B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$Open$ChangeCloseConfigHandleManager
                              • String ID:
                              • API String ID: 110783151-0
                              • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                              • Instruction ID: 97faa514c4423949a50311da240dd902fdec8b35dc9d37e3a56525ceab5f0f32
                              • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                              • Instruction Fuzzy Hash: 0101F931144224BAE6256B38EC6DF7B3EACDB42672F000B65F562D21D1DA90E90191E1
                              APIs
                              • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                              • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                              • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandlePointerWrite
                              • String ID:
                              • API String ID: 3604237281-0
                              • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                              • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0483B90C,00000000,00000000,?), ref: 0483B835
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000000,0483B90C,00000000,00000000,?,?,0482A270), ref: 0483B852
                              • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,0483B90C,00000000,00000000,?,?,0482A270), ref: 0483B866
                              • CloseHandle.KERNEL32(00000000,?,00000000,0483B90C,00000000,00000000,?,?,0482A270), ref: 0483B873
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandlePointerWrite
                              • String ID:
                              • API String ID: 3604237281-0
                              • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction ID: f760dd7a6c8f72e306f5c16048a252f7d5c884c6d5d8c60265a2e8fd2584af89
                              • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction Fuzzy Hash: E001D6B1205214BFE7144E24AC89E77739CEB463BBF000B39F951C61D2D621FC05A6B0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                              • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                              • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                              • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                              • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                              • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                              • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                              • _UnwindNestedFrames.LIBCMT ref: 00438124
                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                              • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                              • String ID:
                              • API String ID: 737400349-0
                              • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                              • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                              • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                              • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                              • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                              • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0486741E,?,00000000,00000000,00000000,?,0486774A,00000006,0045D330), ref: 048674A9
                              • GetLastError.KERNEL32(?,0486741E,?,00000000,00000000,00000000,?,0486774A,00000006,0045D330,0045D328,0045D330,00000000,00000364,?,048671F8), ref: 048674B5
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0486741E,?,00000000,00000000,00000000,?,0486774A,00000006,0045D330,0045D328,0045D330,00000000), ref: 048674C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction ID: 7111828e3b99503aea6d95f14d2ef77b518f52c8c7e7daa2ad039a928b4db659
                              • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction Fuzzy Hash: B9018432715326ABC7714A69BC48A567F98AB45BAAB110B70FD07D7241DA20E840CAE4
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                              • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                              • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B89A
                              • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B8AE
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B8D3
                              • CloseHandle.KERNEL32(00000000,?,00000000,04823D5A,00465324), ref: 0483B8E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction ID: 54bc1f97a8f4c8f0ba9587604e41928960d70fa19b237fe7c4210f4412ffb2ec
                              • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction Fuzzy Hash: 70F0C2B12052187FE2102B24BC84EBB375CDB866AAF000779F902E2182DA61AC45A171
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 00418519
                              • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                              • GetSystemMetrics.USER32(0000004E), ref: 00418525
                              • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                              • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                              • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                              • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                              APIs
                              • AllocConsole.KERNEL32 ref: 0483C120
                              • GetConsoleWindow.KERNEL32 ref: 0483C126
                              • ShowWindow.USER32(00000000,00000000), ref: 0483C139
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0483C15E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$Window$AllocOutputShow
                              • String ID:
                              • API String ID: 4067487056-0
                              • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                              • Instruction ID: 5d8aa1336fcb7c3a67d0cab7a36eacc42cb2a7a9c7e4be01caeec8b1d94a8af2
                              • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                              • Instruction Fuzzy Hash: 9E0184B1980304BFE610FBF49C4AF8D77AC9B14705F500926B605F70D1E6E8F504465E
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020), ref: 04839E96
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020), ref: 04839EAA
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 04839EB7
                              • ControlService.ADVAPI32(00000000,00000001,?), ref: 04839EC6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$Open$CloseControlHandleManager
                              • String ID:
                              • API String ID: 1243734080-0
                              • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                              • Instruction ID: d3507419dad10ba363db451e7912190f39e038ebc630a6e27a09ff13186fbae2
                              • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                              • Instruction Fuzzy Hash: 32F0F632900328BBD3107B64AC88EBF3BACDB44AA1B000435F905D2182DBA4DD45C5B1
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 04839F98
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 04839FAC
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 04839FB9
                              • ControlService.ADVAPI32(00000000,00000002,?), ref: 04839FC8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$Open$CloseControlHandleManager
                              • String ID:
                              • API String ID: 1243734080-0
                              • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                              • Instruction ID: 50c37eac4ed1e161b5b404e332d4753a1e76ca8a69d4856c6b196af38f8d4a09
                              • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                              • Instruction Fuzzy Hash: 7BF0F6725003287BD3107F24EC89EBF3BACDB44AA1B000435FA05D2181DBA4DD4585B5
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 04839FFD
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 0483A011
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 0483A01E
                              • ControlService.ADVAPI32(00000000,00000003,?), ref: 0483A02D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$Open$CloseControlHandleManager
                              • String ID:
                              • API String ID: 1243734080-0
                              • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                              • Instruction ID: 61da263b2f6bff231fe8571062c5d2010f11e409e0267dafb22e80be78346951
                              • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                              • Instruction Fuzzy Hash: E7F0F632500328BBD3217F24EC48EBF3BACDB449A1F000435FA05D2181DB68DD4585B5
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,04839A81,00000000,00000000), ref: 04839E34
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,04839A81,00000000,00000000), ref: 04839E49
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,04839A81,00000000,00000000), ref: 04839E56
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,04839A81,00000000,00000000), ref: 04839E61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$Open$CloseHandleManagerStart
                              • String ID:
                              • API String ID: 2553746010-0
                              • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                              • Instruction ID: 8c026e3b6530cf6c5d7d449bd5764a39bc0e4846ecac409fe003b91e278b4585
                              • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                              • Instruction Fuzzy Hash: 5CF0E9B2504328BFE2106B34AC88EBF2AACDF85AA6B000839F501D2190CBA4DC45D5B5
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,04824AA6,00000001,?,?,00000000,00475B70,04821A5A), ref: 04824D54
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,04821A5A), ref: 04824D60
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,04821A5A), ref: 04824D6B
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,04821A5A), ref: 04824D74
                                • Part of subcall function 0483A8ED: GetLocalTime.KERNEL32(00000000), ref: 0483A907
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID:
                              • API String ID: 2993684571-0
                              • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                              • Instruction ID: eb191ad9337928ea4202753939f1e7c7d4ca878c941fa32df07b187cffb42916
                              • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                              • Instruction Fuzzy Hash: 7CF0E0755047207FDB1137B49E0EA7A7F98EB01715F000FAAFC82C26B1D560A4D09767
                              APIs
                              • GetStdHandle.KERNEL32(000000F5), ref: 0483C0E0
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 0483C0ED
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0483C0FA
                              • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0483C10D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID:
                              • API String ID: 3024135584-0
                              • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                              • Instruction ID: 8aa4a7e8de27d6e10cd6c2b573a56d39ee47648bf177b44c88f478d231b0f7d2
                              • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                              • Instruction Fuzzy Hash: 61E04F62108358ABD31427F9BC8DCAB3B6CE784613B101635F612D0393EAB498848A75
                              APIs
                              • FindResourceA.KERNEL32(0046BC64,0000000A,00000000), ref: 0483A8B7
                              • LoadResource.KERNEL32(00000000,?,?,0482E3EA,00000000), ref: 0483A8CB
                              • LockResource.KERNEL32(00000000,?,?,0482E3EA,00000000), ref: 0483A8D2
                              • SizeofResource.KERNEL32(00000000,?,?,0482E3EA,00000000), ref: 0483A8E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID:
                              • API String ID: 3473537107-0
                              • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction ID: 1a4cf4e6078ee797863c41f2dc01db9793334813fcf0c657af656cd5a778a418
                              • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction Fuzzy Hash: A4E01A3A200710ABCB211BA5BC8CD477E39E786B633100036F905C2331DA359840DA58
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: __aulldvrm
                              • String ID: +$-
                              • API String ID: 1302938615-2137968064
                              • Opcode ID: bb05039bd10173984d8ac256ef46a28b781231ebc573ca9b653a1b6ddea24a85
                              • Instruction ID: 2f8dc70208143a6ffe239484ed5eeff011c84b34ef696723e5b36ce123610400
                              • Opcode Fuzzy Hash: bb05039bd10173984d8ac256ef46a28b781231ebc573ca9b653a1b6ddea24a85
                              • Instruction Fuzzy Hash: 4891B570904149DFDF28CEA8C8D0AEDBBF1AF45364F148B5AEC65EB2A0E334E5458B51
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                              • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                              • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                              • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: >G
                              • API String ID: 180926312-1296849874
                              • Opcode ID: f2d690fa7f7bd9e38ffe7ba6de8b3e1352cc5501d2676756f646007645e1327c
                              • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                              • Opcode Fuzzy Hash: f2d690fa7f7bd9e38ffe7ba6de8b3e1352cc5501d2676756f646007645e1327c
                              • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                              APIs
                              • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: Info
                              • String ID: $fD
                              • API String ID: 1807457897-3092946448
                              • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                              • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                              • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                              • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                              APIs
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 04857D1A
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 04857DD3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentImageNonwritable___except_validate_context_record
                              • String ID: csm
                              • API String ID: 3480331319-1018135373
                              • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                              • Instruction ID: 2793a3860b1b886d15c4326acacdc0e52d456bc0b90f06eee29dca07c3840660
                              • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                              • Instruction Fuzzy Hash: 8D419234A00209DFCF10DF6CC884AAEBBB5AF45328F14CA56DC15DB2A5D771E915CB91
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C08
                                • Part of subcall function 004177A2: 6FD42440.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                              • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C55
                                • Part of subcall function 00417815: 6FD5EFB0.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                • Part of subcall function 004177C5: 6FD65080.GDIPLUS(?,00417CCC), ref: 004177CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateStream$D42440D65080
                              • String ID: image/jpeg
                              • API String ID: 3840341602-3785015651
                              • Opcode ID: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                              • Instruction ID: 3dbe320e324aa312c145f712c1d391ec03548c85c69305bb74e69b0931de3aa8
                              • Opcode Fuzzy Hash: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                              • Instruction Fuzzy Hash: 13315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 04823C91
                                • Part of subcall function 0483AD9F: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,04823CA7), ref: 0483ADC6
                                • Part of subcall function 0483791D: CloseHandle.KERNEL32(04823D20,?,?,04823D20,00465324), ref: 04837933
                                • Part of subcall function 0483791D: CloseHandle.KERNEL32($SF,?,?,04823D20,00465324), ref: 0483793C
                                • Part of subcall function 0483B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,04823D5A,00465324), ref: 0483B89A
                              • Sleep.KERNEL32(000000FA,00465324), ref: 04823D63
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: 8>G
                              • API String ID: 368326130-2084872820
                              • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                              • Instruction ID: 9cb799ab91889b980ec3ab5797bae83ca7a8f3c6efbbccd7e73d3dfebaea0d39
                              • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                              • Instruction Fuzzy Hash: F0315931A002345BEB18F7BCDD65EED7775AF50708F000AA5D906E7190EEA47AC9C652
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 04837E6F
                              • SHCreateMemStream.SHLWAPI(00000000), ref: 04837EBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateStream
                              • String ID: image/jpeg
                              • API String ID: 1369699375-3785015651
                              • Opcode ID: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                              • Instruction ID: c5ef7a68f354f243b175643a9fa62aaeb4441a9b9ac6ecdf6c972479c78d683e
                              • Opcode Fuzzy Hash: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                              • Instruction Fuzzy Hash: 9A314B75504210AFD311AF68C844D6FBBE9FF8A704F004A6DF945D7250DBB5AA488BA2
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                              • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002), ref: 04870C20
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction ID: 9b659f517e980402e9ffaf9445fcc67014a7e60d30093ec429b4d35f266cb512
                              • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction Fuzzy Hash: 5721DA62B01108A6E7349F69C920B977396EF86B6DF568F64E909D7200F732FB40C390
                              APIs
                                • Part of subcall function 04853780: RtlEnterCriticalSection.NTDLL(00470D18), ref: 0485378B
                                • Part of subcall function 04853780: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 048537C8
                                • Part of subcall function 04853B0C: __onexit.LIBCMT ref: 04853B12
                              • __Init_thread_footer.LIBCMT ref: 0482B10E
                                • Part of subcall function 04853736: RtlEnterCriticalSection.NTDLL(00470D18), ref: 04853740
                                • Part of subcall function 04853736: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 04853773
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                              • String ID: ,]G$0]G
                              • API String ID: 2974294136-589576501
                              • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                              • Instruction ID: 107b3422515023bf6fff2d8bd3066abf4787f08e40c49f4bbbfae2ccfb4dca1b
                              • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                              • Instruction Fuzzy Hash: 2821C531A001285AEB14FFACDD90EED7375AF50308F104A69D901E71A1EFA479CAC696
                              APIs
                                • Part of subcall function 0483277A: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0483279E
                                • Part of subcall function 0483277A: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 048327BB
                                • Part of subcall function 0483277A: RegCloseKey.ADVAPI32(?), ref: 048327C6
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0482B9D3
                              • PathFileExistsA.SHLWAPI(?), ref: 0482B9E0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: TUF
                              • API String ID: 1133728706-3431404234
                              • Opcode ID: d94b965c273a091329a6f5a73edda4c14bb16021ab9e8e668cdf3b753880c9a9
                              • Instruction ID: a3e526da6e1599596e2c35c7b85923df433853d4d1f0835f32db9f40ca3a3dbc
                              • Opcode Fuzzy Hash: d94b965c273a091329a6f5a73edda4c14bb16021ab9e8e668cdf3b753880c9a9
                              • Instruction Fuzzy Hash: 1421A671A4113866DB04FBF8CE55EEE7765AF10308F400BA59902E7181FEA5BA89C7D3
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417CF4
                                • Part of subcall function 004177A2: 6FD42440.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D19
                                • Part of subcall function 00417815: 6FD5EFB0.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                • Part of subcall function 004177C5: 6FD65080.GDIPLUS(?,00417CCC), ref: 004177CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateStream$D42440D65080
                              • String ID: image/png
                              • API String ID: 3840341602-2966254431
                              • Opcode ID: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                              • Instruction ID: e3b7944e5392015f30009faa46d0af48502643625c308f0969f1fef2cb3c76d4
                              • Opcode Fuzzy Hash: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                              • Instruction Fuzzy Hash: AA21A135204211AFC300AF61CC88CAFBBBDEFCA714F10052EF90693151DB399945CBA6
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 04837F5B
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 04837F80
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateStream
                              • String ID: image/png
                              • API String ID: 1369699375-2966254431
                              • Opcode ID: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                              • Instruction ID: 45cdcdb6f8ba3a4795b55d555fbfbb233574270cb7ad4c6879640ea9ab1f33aa
                              • Opcode Fuzzy Hash: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                              • Instruction Fuzzy Hash: AF21A4752002116FD301AF68CC84C6FBBADEF8A655F004A1DF506C3150DF65A985CBA3
                              APIs
                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 6774526733cda442cc385f322cfcae3e02137ccd8e00c2faf675cc4047ba47db
                              • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                              • Opcode Fuzzy Hash: 6774526733cda442cc385f322cfcae3e02137ccd8e00c2faf675cc4047ba47db
                              • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 04824C58
                                • Part of subcall function 0483A8ED: GetLocalTime.KERNEL32(00000000), ref: 0483A907
                              • GetLocalTime.KERNEL32(?), ref: 04824CB5
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 04824C4C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                              • Instruction ID: ce0e088537f140333d5986524481271f4175e5f44dcc00c1dfab42d950ad458b
                              • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                              • Instruction Fuzzy Hash: BC213861A042506BD314F76C9A04B7A7BD45BC1709F440FA9E84A83261EBB875C987AF
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i
                              • API String ID: 481472006-2430845779
                              • Opcode ID: fd7e8c0c00986b4890a3fd9eb1e331ad6ca5cafe7777f522357c44b8ff437523
                              • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                              • Opcode Fuzzy Hash: fd7e8c0c00986b4890a3fd9eb1e331ad6ca5cafe7777f522357c44b8ff437523
                              • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                              APIs
                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 04826A9C
                                • Part of subcall function 048269CB: _wcslen.LIBCMT ref: 048269EF
                                • Part of subcall function 048269CB: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 04826A50
                              • CoUninitialize.COMBASE ref: 04826AF5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\Desktop\NujUXO42Rg.exe
                              • API String ID: 3851391207-3505467735
                              • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                              • Instruction ID: c8401a7266188bf2336535651542ce6805b4e0b6f286317f26d608e1ce6cb90b
                              • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                              • Instruction Fuzzy Hash: 5601C0722053207FE2246A24DD49F2B7658DB41725F210A2EF901E6080FAA1EC804662
                              APIs
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 04832879
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 048328AF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: QueryValue
                              • String ID: TUF
                              • API String ID: 3660427363-3431404234
                              • Opcode ID: b09a7c0ab263ba9602d255bab372d31fcc1af682bb43ba0fd7320c28ba140ab5
                              • Instruction ID: 3af2fe03a19ef05155cad617ddfd59c430ab052c022d3203e4efa2d0cb0ac4b0
                              • Opcode Fuzzy Hash: b09a7c0ab263ba9602d255bab372d31fcc1af682bb43ba0fd7320c28ba140ab5
                              • Instruction Fuzzy Hash: 4A014FB6A01108FFEB059B94DD45EFE7ABDEB48251F14017AF901E2150E6B4AF009661
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: alarm.wav$xIG
                              • API String ID: 1174141254-4080756945
                              • Opcode ID: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                              • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                              • Opcode Fuzzy Hash: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                              • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0483A115
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: TUF$xIG
                              • API String ID: 1174141254-2109147017
                              • Opcode ID: 2fae138b2d3ec9b0a0b8c660c1a787d1356efb4be69c0d9f0b79cf6aaa7c8617
                              • Instruction ID: faaacf9fb6323c6b97f359c394925f8148509b9ac1d85359f07fabfd54e21521
                              • Opcode Fuzzy Hash: 2fae138b2d3ec9b0a0b8c660c1a787d1356efb4be69c0d9f0b79cf6aaa7c8617
                              • Instruction Fuzzy Hash: BF01285030422167E618F778DA15ABE37454B80689F004F6AD89BD72E0EFD5BD85C3D7
                              APIs
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • CloseHandle.KERNEL32(?), ref: 0040A7CA
                              • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: b1bce0a50f6c2011aa9d95042e916e71d9afcc9c8db52306626ef2af57165e8a
                              • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                              • Opcode Fuzzy Hash: b1bce0a50f6c2011aa9d95042e916e71d9afcc9c8db52306626ef2af57165e8a
                              • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                              APIs
                                • Part of subcall function 0482AADD: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0482AAEB
                                • Part of subcall function 0482AADD: wsprintfW.USER32 ref: 0482AB6C
                                • Part of subcall function 0483A8ED: GetLocalTime.KERNEL32(00000000), ref: 0483A907
                              • CloseHandle.KERNEL32(?), ref: 0482AA31
                              • UnhookWindowsHookEx.USER32 ref: 0482AA44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                              • Instruction ID: 6ea787aee4e4fb6a93394f00f5f312d1ecaf5537ba5c148219cafb3b378197b2
                              • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                              • Instruction Fuzzy Hash: 09012830A00220ABEB197B6CCA06B7D7BB15F41305F400E9DE98392592EAA574C593EB
                              APIs
                              • waveInPrepareHeader.WINMM(02DE64F0,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                              • waveInAddBuffer.WINMM(02DE64F0,00000020,?,00000000,00401913), ref: 0040175D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: T=G
                              • API String ID: 2315374483-379896819
                              • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                              • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                              APIs
                              • waveInPrepareHeader.WINMM(00473D90,00000020,00475BF4,00475BF4,00000000,00475B70,00473EE8,?,00000000,04821B7A), ref: 048219AE
                              • waveInAddBuffer.WINMM(00473D90,00000020,?,00000000,04821B7A), ref: 048219C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: T=G
                              • API String ID: 2315374483-379896819
                              • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction ID: b701936d75b88f96ee7d8fa35c002c06c296f0101922273c93620be50b231df7
                              • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction Fuzzy Hash: 8A01A271301310AFD7109F2CEC48E65BBB5FB49219B014639E919C3761EB71AC909B59
                              APIs
                              • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$j=D
                              • API String ID: 1901932003-3128777819
                              • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                              • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                              • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                              • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID: T=G$T=G
                              • API String ID: 3519838083-3732185208
                              • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                              • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                              • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                              • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040AD5B
                                • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(00000000,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                              • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                              • Opcode Fuzzy Hash: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                              • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                              APIs
                              • _free.LIBCMT ref: 00448825
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFreeHeapLast_free
                              • String ID: `@$`@
                              • API String ID: 1353095263-20545824
                              • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                              • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                              • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                              • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040ADB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                              • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                              • Opcode Fuzzy Hash: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                              • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,J@4fF,00412951,00000000,00000000,J@4fF,?,00000000), ref: 00412988
                              • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 00412998
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: J@4fF
                              • API String ID: 2654517830-1060276034
                              • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                              • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                              • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                              • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,0482DC11,0000000D,00000033,00000000,00000032,00000000,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0482C14D
                              • GetLastError.KERNEL32 ref: 0482C158
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: Rmc-I7G983
                              • API String ID: 1925916568-3173645232
                              • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction ID: d634cf39e10fa097331aea2f318d05aec60eadb1f9a4e98eb516401fbf893d45
                              • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction Fuzzy Hash: 89D012707483119BE7282B787D897693554E784703F0045B9B50FC55D0CF6488809916
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                              • GetLastError.KERNEL32 ref: 0043FB02
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2072828468.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2072828468.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2072828468.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                              • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                              • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                              • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,04821D3F), ref: 0485FD5B
                              • GetLastError.KERNEL32 ref: 0485FD69
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0485FDC4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2075091330.0000000004820000.00000040.00001000.00020000.00000000.sdmp, Offset: 04820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4820000_NujUXO42Rg.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: 51d5f03fba1b172d5651f1593246994e43d26d1415dc77cb91aa80c4233d165d
                              • Instruction ID: feffbaa0dc5ea4ff67198eadc55112a44657d44301b5cc4eb870f35d05b2f12f
                              • Opcode Fuzzy Hash: 51d5f03fba1b172d5651f1593246994e43d26d1415dc77cb91aa80c4233d165d
                              • Instruction Fuzzy Hash: 4B41E931A04206AFDF219F68D848ABA7BB5EF01324F144B69FF55DB1B1EB70A901C751

                              Execution Graph

                              Execution Coverage:1.9%
                              Dynamic/Decrypted Code Coverage:2.5%
                              Signature Coverage:0%
                              Total number of Nodes:1134
                              Total number of Limit Nodes:54
                              execution_graph 84395 41d4d0 84396 41d4e6 _Yarn ___scrt_fastfail 84395->84396 84398 431f99 21 API calls 84396->84398 84410 41d6e3 84396->84410 84402 41d696 ___scrt_fastfail 84398->84402 84399 41d6f4 84400 41d734 84399->84400 84401 41d760 84399->84401 84412 431f99 84399->84412 84401->84400 84420 41d474 21 API calls ___scrt_fastfail 84401->84420 84402->84400 84404 431f99 21 API calls 84402->84404 84408 41d6be ___scrt_fastfail 84404->84408 84406 41d72d ___scrt_fastfail 84406->84400 84417 43264f 84406->84417 84408->84400 84409 431f99 21 API calls 84408->84409 84409->84410 84410->84400 84411 41d071 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection ___scrt_fastfail 84410->84411 84411->84399 84413 431fa3 84412->84413 84414 431fa7 84412->84414 84413->84406 84421 43a88c 84414->84421 84430 43256f 84417->84430 84419 432657 84419->84401 84420->84400 84426 446aff _strftime 84421->84426 84422 446b3d 84429 445354 20 API calls __dosmaperr 84422->84429 84424 446b28 RtlAllocateHeap 84425 431fac 84424->84425 84424->84426 84425->84406 84426->84422 84426->84424 84428 442200 7 API calls 2 library calls 84426->84428 84428->84426 84429->84425 84431 432588 84430->84431 84435 43257e 84430->84435 84432 431f99 21 API calls 84431->84432 84431->84435 84433 4325a9 84432->84433 84433->84435 84436 43293a CryptAcquireContextA 84433->84436 84435->84419 84437 432956 84436->84437 84438 43295b CryptGenRandom 84436->84438 84437->84435 84438->84437 84439 432970 CryptReleaseContext 84438->84439 84439->84437 84440 426030 84445 4260f7 recv 84440->84445 84446 44e8b6 84447 44e8c1 84446->84447 84448 44e8e9 84447->84448 84449 44e8da 84447->84449 84450 44e8f8 84448->84450 84468 455573 27 API calls 2 library calls 84448->84468 84467 445354 20 API calls __dosmaperr 84449->84467 84455 44b9be 84450->84455 84454 44e8df ___scrt_fastfail 84456 44b9d6 84455->84456 84457 44b9cb 84455->84457 84459 44b9de 84456->84459 84465 44b9e7 _strftime 84456->84465 84469 446aff 84457->84469 84476 446ac5 20 API calls __dosmaperr 84459->84476 84461 44ba11 RtlReAllocateHeap 84463 44b9d3 84461->84463 84461->84465 84462 44b9ec 84477 445354 20 API calls __dosmaperr 84462->84477 84463->84454 84465->84461 84465->84462 84478 442200 7 API calls 2 library calls 84465->84478 84467->84454 84468->84450 84470 446b3d 84469->84470 84474 446b0d _strftime 84469->84474 84480 445354 20 API calls __dosmaperr 84470->84480 84472 446b28 RtlAllocateHeap 84473 446b3b 84472->84473 84472->84474 84473->84463 84474->84470 84474->84472 84479 442200 7 API calls 2 library calls 84474->84479 84476->84463 84477->84463 84478->84465 84479->84474 84480->84473 84481 2bf003c 84482 2bf0049 84481->84482 84496 2bf0e0f SetErrorMode SetErrorMode 84482->84496 84487 2bf0265 84488 2bf02ce VirtualProtect 84487->84488 84490 2bf030b 84488->84490 84489 2bf0439 VirtualFree 84494 2bf05f4 LoadLibraryA 84489->84494 84495 2bf04be 84489->84495 84490->84489 84491 2bf04e3 LoadLibraryA 84491->84495 84493 2bf08c7 84494->84493 84495->84491 84495->84494 84497 2bf0223 84496->84497 84498 2bf0d90 84497->84498 84499 2bf0dad 84498->84499 84500 2bf0dbb GetPEB 84499->84500 84501 2bf0238 VirtualAlloc 84499->84501 84500->84501 84501->84487 84502 426091 84507 42610e send 84502->84507 84508 2c92fce 84509 2c92fdd 84508->84509 84512 2c9376e 84509->84512 84513 2c93789 84512->84513 84514 2c93792 CreateToolhelp32Snapshot 84513->84514 84515 2c937ae Module32First 84513->84515 84514->84513 84514->84515 84516 2c937bd 84515->84516 84517 2c92fe6 84515->84517 84519 2c9342d 84516->84519 84520 2c93458 84519->84520 84521 2c93469 VirtualAlloc 84520->84521 84522 2c934a1 84520->84522 84521->84522 84522->84522 84523 43a998 84526 43a9a4 _swprintf __FrameHandler3::FrameUnwindToState 84523->84526 84524 43a9b2 84541 445354 20 API calls __dosmaperr 84524->84541 84526->84524 84529 43a9dc 84526->84529 84527 43a9b7 84542 43a827 26 API calls _Deallocate 84527->84542 84536 444acc RtlEnterCriticalSection 84529->84536 84531 43a9e7 84537 43aa88 84531->84537 84534 43a9c2 __fread_nolock 84536->84531 84538 43aa96 84537->84538 84540 43a9f2 84538->84540 84544 448416 39 API calls 2 library calls 84538->84544 84543 43aa0f RtlLeaveCriticalSection std::_Lockit::~_Lockit 84540->84543 84541->84527 84542->84534 84543->84534 84544->84538 84545 402bcc 84546 402bd7 84545->84546 84547 402bdf 84545->84547 84563 403315 28 API calls 2 library calls 84546->84563 84549 402beb 84547->84549 84553 4015d3 84547->84553 84550 402bdd 84555 43360d 84553->84555 84554 43a88c _Yarn 21 API calls 84554->84555 84555->84554 84556 402be9 84555->84556 84559 43362e std::_Facet_Register 84555->84559 84564 442200 7 API calls 2 library calls 84555->84564 84558 433dec std::_Facet_Register 84566 437bd7 RaiseException 84558->84566 84559->84558 84565 437bd7 RaiseException 84559->84565 84562 433e09 84563->84550 84564->84555 84565->84558 84566->84562 84567 4339be 84568 4339ca __FrameHandler3::FrameUnwindToState 84567->84568 84599 4336b3 84568->84599 84570 4339d1 84571 433b24 84570->84571 84575 4339fb 84570->84575 84897 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 84571->84897 84573 433b2b 84898 4426be 28 API calls _abort 84573->84898 84584 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 84575->84584 84891 4434d1 5 API calls CatchGuardHandler 84575->84891 84576 433b31 84899 442670 28 API calls _abort 84576->84899 84579 433a14 84581 433a1a 84579->84581 84892 443475 5 API calls CatchGuardHandler 84579->84892 84580 433b39 84583 433a9b 84610 433c5e 84583->84610 84584->84583 84893 43edf4 38 API calls 3 library calls 84584->84893 84593 433abd 84593->84573 84594 433ac1 84593->84594 84595 433aca 84594->84595 84895 442661 28 API calls _abort 84594->84895 84896 433842 13 API calls 2 library calls 84595->84896 84598 433ad2 84598->84581 84600 4336bc 84599->84600 84900 433e0a IsProcessorFeaturePresent 84600->84900 84602 4336c8 84901 4379ee 10 API calls 3 library calls 84602->84901 84604 4336cd 84609 4336d1 84604->84609 84902 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 84604->84902 84606 4336e8 84606->84570 84607 4336da 84607->84606 84903 437a17 8 API calls 3 library calls 84607->84903 84609->84570 84904 436050 84610->84904 84613 433aa1 84614 443422 84613->84614 84906 44ddc9 84614->84906 84616 433aaa 84619 40d767 84616->84619 84617 44342b 84617->84616 84910 44e0d3 38 API calls 84617->84910 84912 41bce3 LoadLibraryA GetProcAddress 84619->84912 84621 40d783 GetModuleFileNameW 84917 40e168 84621->84917 84623 40d79f 84932 401fbd 84623->84932 84626 401fbd 28 API calls 84627 40d7bd 84626->84627 84936 41afc3 84627->84936 84631 40d7cf 84961 401d8c 84631->84961 84633 40d7d8 84634 40d835 84633->84634 84635 40d7eb 84633->84635 84967 401d64 84634->84967 85345 40e986 90 API calls 84635->85345 84638 40d7fd 84640 401d64 28 API calls 84638->84640 84639 40d845 84641 401d64 28 API calls 84639->84641 84644 40d809 84640->84644 84642 40d864 84641->84642 84972 404cbf 84642->84972 85346 40e937 68 API calls 84644->85346 84645 40d873 84976 405ce6 84645->84976 84648 40d87f 84979 401eef 84648->84979 84649 40d824 85347 40e155 68 API calls 84649->85347 84652 40d88b 84983 401eea 84652->84983 84654 40d894 84656 401eea 26 API calls 84654->84656 84655 401eea 26 API calls 84657 40dc9f 84655->84657 84658 40d89d 84656->84658 84894 433c94 GetModuleHandleW 84657->84894 84659 401d64 28 API calls 84658->84659 84660 40d8a6 84659->84660 84987 401ebd 84660->84987 84662 40d8b1 84663 401d64 28 API calls 84662->84663 84664 40d8ca 84663->84664 84665 401d64 28 API calls 84664->84665 84667 40d8e5 84665->84667 84666 40d946 84668 401d64 28 API calls 84666->84668 84683 40e134 84666->84683 84667->84666 85348 4085b4 84667->85348 84674 40d95d 84668->84674 84670 40d912 84671 401eef 26 API calls 84670->84671 84672 40d91e 84671->84672 84675 401eea 26 API calls 84672->84675 84673 40d9a4 84991 40bed7 84673->84991 84674->84673 84680 4124b7 3 API calls 84674->84680 84676 40d927 84675->84676 85352 4124b7 RegOpenKeyExA 84676->85352 84678 40d9aa 84679 40d82d 84678->84679 84994 41a463 84678->84994 84679->84655 84685 40d988 84680->84685 85370 412902 30 API calls 84683->85370 84684 40d9c5 84687 40da18 84684->84687 85011 40697b 84684->85011 84685->84673 85355 412902 30 API calls 84685->85355 84688 401d64 28 API calls 84687->84688 84691 40da21 84688->84691 84700 40da32 84691->84700 84701 40da2d 84691->84701 84693 40e14a 85371 4112b5 64 API calls ___scrt_fastfail 84693->85371 84694 40d9e4 85356 40699d 30 API calls 84694->85356 84695 40d9ee 84699 401d64 28 API calls 84695->84699 84708 40d9f7 84699->84708 84705 401d64 28 API calls 84700->84705 85359 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 84701->85359 84702 40d9e9 85357 4064d0 97 API calls 84702->85357 84706 40da3b 84705->84706 85015 41ae08 84706->85015 84708->84687 84710 40da13 84708->84710 84709 40da46 85019 401e18 84709->85019 85358 4064d0 97 API calls 84710->85358 84713 40da51 85023 401e13 84713->85023 84715 40da5a 84716 401d64 28 API calls 84715->84716 84717 40da63 84716->84717 84718 401d64 28 API calls 84717->84718 84719 40da7d 84718->84719 84720 401d64 28 API calls 84719->84720 84721 40da97 84720->84721 84722 401d64 28 API calls 84721->84722 84723 40dab0 84722->84723 84724 401d64 28 API calls 84723->84724 84754 40db1d 84723->84754 84729 40dac5 _wcslen 84724->84729 84725 40db2c 84726 401d64 28 API calls 84725->84726 84751 40dbac ___scrt_fastfail 84725->84751 84728 40db3e 84726->84728 84727 40dcaa ___scrt_fastfail 85361 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 84727->85361 84730 401d64 28 API calls 84728->84730 84732 401d64 28 API calls 84729->84732 84729->84754 84731 40db50 84730->84731 84735 401d64 28 API calls 84731->84735 84733 40dae0 84732->84733 84737 401d64 28 API calls 84733->84737 84736 40db62 84735->84736 84740 401d64 28 API calls 84736->84740 84738 40daf5 84737->84738 85027 40c89e 84738->85027 84739 40dcef 84741 401d64 28 API calls 84739->84741 84743 40db8b 84740->84743 84744 40dd16 84741->84744 84748 401d64 28 API calls 84743->84748 85163 401f66 84744->85163 84746 401e18 26 API calls 84747 40db14 84746->84747 84752 401e13 26 API calls 84747->84752 84753 40db9c 84748->84753 84750 40dd25 85167 4126d2 RegCreateKeyA 84750->85167 85153 4128a2 84751->85153 84752->84754 85084 40bc67 84753->85084 84754->84725 84754->84727 84759 40dc45 ctype 84762 401d64 28 API calls 84759->84762 84760 401d64 28 API calls 84761 40dd47 84760->84761 85173 43a5e7 84761->85173 84763 40dc5c 84762->84763 84763->84739 84766 40dc70 84763->84766 84769 401d64 28 API calls 84766->84769 84767 40dd5e 85362 41beb0 87 API calls ___scrt_fastfail 84767->85362 84768 40dd81 84772 401f66 28 API calls 84768->84772 84770 40dc7e 84769->84770 84773 41ae08 28 API calls 84770->84773 84775 40dd96 84772->84775 84776 40dc87 84773->84776 84774 40dd65 CreateThread 84774->84768 85804 41c96f 10 API calls 84774->85804 84777 401f66 28 API calls 84775->84777 85360 40e219 112 API calls 84776->85360 84779 40dda5 84777->84779 85177 41a686 84779->85177 84780 40dc8c 84780->84739 84782 40dc93 84780->84782 84782->84679 84784 401d64 28 API calls 84785 40ddb6 84784->84785 84786 401d64 28 API calls 84785->84786 84787 40ddcb 84786->84787 84788 401d64 28 API calls 84787->84788 84789 40ddeb 84788->84789 84790 43a5e7 42 API calls 84789->84790 84791 40ddf8 84790->84791 84792 401d64 28 API calls 84791->84792 84793 40de03 84792->84793 84794 401d64 28 API calls 84793->84794 84795 40de14 84794->84795 84796 401d64 28 API calls 84795->84796 84797 40de29 84796->84797 84798 401d64 28 API calls 84797->84798 84799 40de3a 84798->84799 84800 40de41 StrToIntA 84799->84800 85201 409517 84800->85201 84803 401d64 28 API calls 84804 40de5c 84803->84804 84805 40dea1 84804->84805 84806 40de68 84804->84806 84808 401d64 28 API calls 84805->84808 85363 43360d 22 API calls 3 library calls 84806->85363 84811 40deb1 84808->84811 84809 40de71 84810 401d64 28 API calls 84809->84810 84812 40de84 84810->84812 84814 40def9 84811->84814 84815 40debd 84811->84815 84813 40de8b CreateThread 84812->84813 84813->84805 85806 419128 109 API calls __EH_prolog 84813->85806 84816 401d64 28 API calls 84814->84816 85364 43360d 22 API calls 3 library calls 84815->85364 84818 40df02 84816->84818 84822 40df6c 84818->84822 84823 40df0e 84818->84823 84819 40dec6 84820 401d64 28 API calls 84819->84820 84821 40ded8 84820->84821 84824 40dedf CreateThread 84821->84824 84825 401d64 28 API calls 84822->84825 84826 401d64 28 API calls 84823->84826 84824->84814 85805 419128 109 API calls __EH_prolog 84824->85805 84827 40df75 84825->84827 84828 40df1e 84826->84828 84829 40df81 84827->84829 84830 40dfba 84827->84830 84831 401d64 28 API calls 84828->84831 84833 401d64 28 API calls 84829->84833 85226 41a7a2 GetComputerNameExW GetUserNameW 84830->85226 84834 40df33 84831->84834 84836 40df8a 84833->84836 85365 40c854 32 API calls 84834->85365 84842 401d64 28 API calls 84836->84842 84837 401e18 26 API calls 84838 40dfce 84837->84838 84841 401e13 26 API calls 84838->84841 84840 40df46 84844 401e18 26 API calls 84840->84844 84845 40dfd7 84841->84845 84843 40df9f 84842->84843 84854 43a5e7 42 API calls 84843->84854 84846 40df52 84844->84846 84847 40dfe0 SetProcessDEPPolicy 84845->84847 84848 40dfe3 CreateThread 84845->84848 84849 401e13 26 API calls 84846->84849 84847->84848 84850 40e004 84848->84850 84851 40dff8 CreateThread 84848->84851 85774 40e54f 84848->85774 84855 40df5b CreateThread 84849->84855 84852 40e019 84850->84852 84853 40e00d CreateThread 84850->84853 84851->84850 85801 410f36 137 API calls 84851->85801 84857 40e073 84852->84857 84859 401f66 28 API calls 84852->84859 84853->84852 85802 411524 38 API calls ___scrt_fastfail 84853->85802 84856 40dfac 84854->84856 84855->84822 85803 40196b 49 API calls 84855->85803 85366 40b95c 7 API calls 84856->85366 85237 41246e RegOpenKeyExA 84857->85237 84860 40e046 84859->84860 85367 404c9e 28 API calls 84860->85367 84864 40e053 84866 401f66 28 API calls 84864->84866 84865 40e12a 85249 40cbac 84865->85249 84868 40e062 84866->84868 84867 41ae08 28 API calls 84871 40e0a4 84867->84871 84872 41a686 79 API calls 84868->84872 85240 412584 RegOpenKeyExW 84871->85240 84874 40e067 84872->84874 84875 401eea 26 API calls 84874->84875 84875->84857 84878 401e13 26 API calls 84881 40e0c5 84878->84881 84879 40e0ed DeleteFileW 84880 40e0f4 84879->84880 84879->84881 84883 41ae08 28 API calls 84880->84883 84881->84879 84881->84880 84882 40e0db Sleep 84881->84882 85368 401e07 84882->85368 84885 40e104 84883->84885 85245 41297a RegOpenKeyExW 84885->85245 84887 40e117 84888 401e13 26 API calls 84887->84888 84889 40e121 84888->84889 84890 401e13 26 API calls 84889->84890 84890->84865 84891->84579 84892->84584 84893->84583 84894->84593 84895->84595 84896->84598 84897->84573 84898->84576 84899->84580 84900->84602 84901->84604 84902->84607 84903->84609 84905 433c71 GetStartupInfoW 84904->84905 84905->84613 84907 44ddd2 84906->84907 84909 44dddb 84906->84909 84911 44dcc8 51 API calls 5 library calls 84907->84911 84909->84617 84910->84617 84911->84909 84913 41bd22 LoadLibraryA GetProcAddress 84912->84913 84914 41bd12 GetModuleHandleA GetProcAddress 84912->84914 84915 41bd4b 32 API calls 84913->84915 84916 41bd3b LoadLibraryA GetProcAddress 84913->84916 84914->84913 84915->84621 84916->84915 85372 41a63f FindResourceA 84917->85372 84920 43a88c _Yarn 21 API calls 84921 40e192 _Yarn 84920->84921 85375 401f86 84921->85375 84924 401eef 26 API calls 84925 40e1b8 84924->84925 84926 401eea 26 API calls 84925->84926 84927 40e1c1 84926->84927 84928 43a88c _Yarn 21 API calls 84927->84928 84929 40e1d2 _Yarn 84928->84929 85379 406052 84929->85379 84931 40e205 84931->84623 84933 401fcc 84932->84933 85387 402501 84933->85387 84935 401fea 84935->84626 84956 41afd6 84936->84956 84937 41b046 84938 401eea 26 API calls 84937->84938 84939 41b078 84938->84939 84940 401eea 26 API calls 84939->84940 84942 41b080 84940->84942 84941 41b048 85394 403b60 28 API calls 84941->85394 84945 401eea 26 API calls 84942->84945 84948 40d7c6 84945->84948 84946 41b054 84949 401eef 26 API calls 84946->84949 84947 401eef 26 API calls 84947->84956 84957 40e8bd 84948->84957 84950 41b05d 84949->84950 84951 401eea 26 API calls 84950->84951 84953 41b065 84951->84953 84952 401eea 26 API calls 84952->84956 85395 41bfa9 28 API calls 84953->85395 84956->84937 84956->84941 84956->84947 84956->84952 85392 403b60 28 API calls 84956->85392 85393 41bfa9 28 API calls 84956->85393 84958 40e8ca 84957->84958 84960 40e8da 84958->84960 85396 40200a 26 API calls 84958->85396 84960->84631 84963 40200a 84961->84963 84962 40203a 84962->84633 84963->84962 85397 402654 26 API calls 84963->85397 84965 40202b 85398 4026ba 26 API calls _Deallocate 84965->85398 84968 401d6c 84967->84968 84969 401d74 84968->84969 85399 401fff 28 API calls 84968->85399 84969->84639 84973 404ccb 84972->84973 85400 402e78 84973->85400 84975 404cee 84975->84645 85409 404bc4 84976->85409 84978 405cf4 84978->84648 84980 401efe 84979->84980 84982 401f0a 84980->84982 85418 4021b9 26 API calls 84980->85418 84982->84652 84984 4021b9 84983->84984 84985 4021e8 84984->84985 85419 40262e 26 API calls _Deallocate 84984->85419 84985->84654 84989 401ec9 84987->84989 84988 401ee4 84988->84662 84989->84988 84990 402325 28 API calls 84989->84990 84990->84988 85420 401e8f 84991->85420 84993 40bee1 CreateMutexA GetLastError 84993->84678 85422 41b15b 84994->85422 84996 41a471 85426 412513 RegOpenKeyExA 84996->85426 84999 401eef 26 API calls 85000 41a49f 84999->85000 85001 401eea 26 API calls 85000->85001 85002 41a4a7 85001->85002 85003 41a4fa 85002->85003 85004 412513 31 API calls 85002->85004 85003->84684 85005 41a4cd 85004->85005 85006 41a4d8 StrToIntA 85005->85006 85007 41a4e6 85006->85007 85010 41a4ef 85006->85010 85431 41c102 28 API calls 85007->85431 85009 401eea 26 API calls 85009->85003 85010->85009 85012 40698f 85011->85012 85013 4124b7 3 API calls 85012->85013 85014 406996 85013->85014 85014->84694 85014->84695 85016 41ae1c 85015->85016 85432 40b027 85016->85432 85018 41ae24 85018->84709 85020 401e27 85019->85020 85022 401e33 85020->85022 85441 402121 26 API calls 85020->85441 85022->84713 85024 402121 85023->85024 85025 402150 85024->85025 85442 402718 26 API calls _Deallocate 85024->85442 85025->84715 85028 40c8ba 85027->85028 85029 40c8da 85028->85029 85030 40c90f 85028->85030 85032 40c8d0 85028->85032 85447 41a74b 29 API calls 85029->85447 85033 41b15b 2 API calls 85030->85033 85031 40ca03 GetLongPathNameW 85443 403b40 85031->85443 85032->85031 85036 40c914 85033->85036 85039 40c918 85036->85039 85040 40c96a 85036->85040 85037 40c8e3 85041 401e18 26 API calls 85037->85041 85045 403b40 28 API calls 85039->85045 85044 403b40 28 API calls 85040->85044 85042 40c8ed 85041->85042 85049 401e13 26 API calls 85042->85049 85043 403b40 28 API calls 85046 40ca27 85043->85046 85047 40c978 85044->85047 85048 40c926 85045->85048 85450 40cc37 28 API calls 85046->85450 85053 403b40 28 API calls 85047->85053 85054 403b40 28 API calls 85048->85054 85049->85032 85051 40ca3a 85451 402860 28 API calls 85051->85451 85056 40c98e 85053->85056 85057 40c93c 85054->85057 85055 40ca45 85452 402860 28 API calls 85055->85452 85449 402860 28 API calls 85056->85449 85448 402860 28 API calls 85057->85448 85061 40c999 85064 401e18 26 API calls 85061->85064 85062 40c947 85065 401e18 26 API calls 85062->85065 85063 40ca4f 85066 401e13 26 API calls 85063->85066 85068 40c9a4 85064->85068 85069 40c952 85065->85069 85067 40ca59 85066->85067 85070 401e13 26 API calls 85067->85070 85071 401e13 26 API calls 85068->85071 85072 401e13 26 API calls 85069->85072 85073 40ca62 85070->85073 85074 40c9ad 85071->85074 85075 40c95b 85072->85075 85076 401e13 26 API calls 85073->85076 85077 401e13 26 API calls 85074->85077 85078 401e13 26 API calls 85075->85078 85079 40ca6b 85076->85079 85077->85042 85078->85042 85080 401e13 26 API calls 85079->85080 85081 40ca74 85080->85081 85082 401e13 26 API calls 85081->85082 85083 40ca7d 85082->85083 85083->84746 85085 40bc7a _wcslen 85084->85085 85086 40bc84 85085->85086 85087 40bcce 85085->85087 85090 40bc8d CreateDirectoryW 85086->85090 85088 40c89e 32 API calls 85087->85088 85089 40bce0 85088->85089 85091 401e18 26 API calls 85089->85091 85462 40856b 85090->85462 85093 40bccc 85091->85093 85095 401e13 26 API calls 85093->85095 85094 40bca9 85492 4028cf 85094->85492 85100 40bcf7 85095->85100 85097 40bcb5 85098 401e18 26 API calls 85097->85098 85099 40bcc3 85098->85099 85101 401e13 26 API calls 85099->85101 85102 40bd10 85100->85102 85103 40bd2d 85100->85103 85101->85093 85466 40bb7b 85102->85466 85104 40bd36 CopyFileW 85103->85104 85105 40be07 85104->85105 85108 40bd48 _wcslen 85104->85108 85109 40bb7b 31 API calls 85105->85109 85107 40bd21 85107->84751 85108->85105 85110 40bd64 85108->85110 85111 40bdb7 85108->85111 85112 40be18 85109->85112 85113 40c89e 32 API calls 85110->85113 85114 40c89e 32 API calls 85111->85114 85115 40be4d 85112->85115 85122 40be2a SetFileAttributesW 85112->85122 85118 40bd6a 85113->85118 85117 40bdbd 85114->85117 85116 40be95 CloseHandle 85115->85116 85119 403b40 28 API calls 85115->85119 85123 401e07 85116->85123 85121 401e18 26 API calls 85117->85121 85120 401e18 26 API calls 85118->85120 85124 40be63 85119->85124 85125 40bd76 85120->85125 85152 40bdb1 85121->85152 85126 40be39 _wcslen 85122->85126 85127 40beb1 ShellExecuteW 85123->85127 85128 41ae08 28 API calls 85124->85128 85129 401e13 26 API calls 85125->85129 85126->85115 85138 40be4a SetFileAttributesW 85126->85138 85130 40bec4 85127->85130 85131 40bece ExitProcess 85127->85131 85135 40be76 85128->85135 85134 40bd7f 85129->85134 85132 40bed7 2 API calls 85130->85132 85139 40bdf8 85132->85139 85133 401e13 26 API calls 85137 40bdcf 85133->85137 85136 40856b 28 API calls 85134->85136 85495 412774 RegCreateKeyW 85135->85495 85140 40bd93 85136->85140 85143 40bddb CreateDirectoryW 85137->85143 85138->85115 85139->85107 85142 4028cf 28 API calls 85140->85142 85144 40bd9f 85142->85144 85146 401e07 85143->85146 85147 401e18 26 API calls 85144->85147 85148 40bdeb CopyFileW 85146->85148 85150 40bda8 85147->85150 85148->85105 85148->85139 85149 401e13 26 API calls 85149->85116 85151 401e13 26 API calls 85150->85151 85151->85152 85152->85133 85154 4128c0 85153->85154 85155 406052 28 API calls 85154->85155 85156 4128d5 85155->85156 85157 401fbd 28 API calls 85156->85157 85158 4128e5 85157->85158 85159 4126d2 29 API calls 85158->85159 85160 4128ef 85159->85160 85161 401eea 26 API calls 85160->85161 85162 4128fc 85161->85162 85162->84759 85164 401f6e 85163->85164 85523 402301 85164->85523 85168 412722 85167->85168 85171 4126eb 85167->85171 85169 401eea 26 API calls 85168->85169 85170 40dd3b 85169->85170 85170->84760 85172 4126fd RegSetValueExA RegCloseKey 85171->85172 85172->85168 85174 43a600 _swprintf 85173->85174 85527 43993e 85174->85527 85178 41a737 85177->85178 85179 41a69c GetLocalTime 85177->85179 85181 401eea 26 API calls 85178->85181 85180 404cbf 28 API calls 85179->85180 85182 41a6de 85180->85182 85183 41a73f 85181->85183 85184 405ce6 28 API calls 85182->85184 85185 401eea 26 API calls 85183->85185 85186 41a6ea 85184->85186 85187 40ddaa 85185->85187 85561 4027cb 85186->85561 85187->84784 85189 41a6f6 85190 405ce6 28 API calls 85189->85190 85191 41a702 85190->85191 85564 406478 76 API calls 85191->85564 85193 41a710 85194 401eea 26 API calls 85193->85194 85195 41a71c 85194->85195 85196 401eea 26 API calls 85195->85196 85197 41a725 85196->85197 85198 401eea 26 API calls 85197->85198 85199 41a72e 85198->85199 85200 401eea 26 API calls 85199->85200 85200->85178 85202 409536 _wcslen 85201->85202 85203 409541 85202->85203 85204 409558 85202->85204 85205 40c89e 32 API calls 85203->85205 85206 40c89e 32 API calls 85204->85206 85207 409549 85205->85207 85208 409560 85206->85208 85209 401e18 26 API calls 85207->85209 85210 401e18 26 API calls 85208->85210 85213 409553 85209->85213 85211 40956e 85210->85211 85212 401e13 26 API calls 85211->85212 85214 409576 85212->85214 85215 401e13 26 API calls 85213->85215 85216 40856b 28 API calls 85214->85216 85217 4095ad 85215->85217 85218 409588 85216->85218 85569 409837 85217->85569 85220 4028cf 28 API calls 85218->85220 85222 409593 85220->85222 85223 401e18 26 API calls 85222->85223 85224 40959d 85223->85224 85225 401e13 26 API calls 85224->85225 85225->85213 85227 403b40 28 API calls 85226->85227 85228 41a7f1 85227->85228 85591 403cbb 85228->85591 85230 41a7fd 85231 4028cf 28 API calls 85230->85231 85232 41a807 85231->85232 85233 401e13 26 API calls 85232->85233 85234 41a810 85233->85234 85235 401e13 26 API calls 85234->85235 85236 40dfc3 85235->85236 85236->84837 85238 40e08b 85237->85238 85239 41248f RegQueryValueExA RegCloseKey 85237->85239 85238->84865 85238->84867 85239->85238 85241 4125b0 RegQueryValueExW RegCloseKey 85240->85241 85242 4125dd 85240->85242 85241->85242 85243 403b40 28 API calls 85242->85243 85244 40e0ba 85243->85244 85244->84878 85246 412992 RegDeleteValueW 85245->85246 85247 4129a6 85245->85247 85246->85247 85248 4129a2 85246->85248 85247->84887 85248->84887 85250 40cbc5 85249->85250 85251 41246e 3 API calls 85250->85251 85252 40cbcc 85251->85252 85253 40cbeb 85252->85253 85611 401602 85252->85611 85257 413fd4 85253->85257 85255 40cbd9 85614 4127d5 RegCreateKeyA 85255->85614 85258 413feb 85257->85258 85631 41aa73 85258->85631 85260 413ff6 85261 401d64 28 API calls 85260->85261 85262 41400f 85261->85262 85263 43a5e7 42 API calls 85262->85263 85264 41401c 85263->85264 85265 414021 Sleep 85264->85265 85266 41402e 85264->85266 85265->85266 85267 401f66 28 API calls 85266->85267 85268 41403d 85267->85268 85269 401d64 28 API calls 85268->85269 85270 41404b 85269->85270 85271 401fbd 28 API calls 85270->85271 85272 414053 85271->85272 85273 41afc3 28 API calls 85272->85273 85274 41405b 85273->85274 85635 404262 WSAStartup 85274->85635 85276 414065 85277 401d64 28 API calls 85276->85277 85278 41406e 85277->85278 85279 401d64 28 API calls 85278->85279 85320 4140ed 85278->85320 85280 414087 85279->85280 85283 401d64 28 API calls 85280->85283 85281 401d64 28 API calls 85281->85320 85282 401fbd 28 API calls 85282->85320 85284 414098 85283->85284 85286 401d64 28 API calls 85284->85286 85285 41afc3 28 API calls 85285->85320 85287 4140a9 85286->85287 85289 401d64 28 API calls 85287->85289 85288 4085b4 28 API calls 85288->85320 85290 4140ba 85289->85290 85291 401d64 28 API calls 85290->85291 85293 4140cb 85291->85293 85292 401eef 26 API calls 85292->85320 85295 401d64 28 API calls 85293->85295 85294 401eea 26 API calls 85294->85320 85296 4140dd 85295->85296 85737 404101 87 API calls 85296->85737 85299 414244 WSAGetLastError 85738 41bc76 30 API calls 85299->85738 85305 41a686 79 API calls 85305->85320 85307 404cbf 28 API calls 85307->85320 85308 401d8c 26 API calls 85308->85320 85309 43a5e7 42 API calls 85311 414b80 Sleep 85309->85311 85310 405ce6 28 API calls 85310->85320 85311->85320 85312 4027cb 28 API calls 85312->85320 85313 401f66 28 API calls 85313->85320 85319 412513 31 API calls 85319->85320 85320->85281 85320->85282 85320->85285 85320->85288 85320->85292 85320->85294 85320->85299 85320->85305 85320->85307 85320->85308 85320->85309 85320->85310 85320->85312 85320->85313 85320->85319 85324 41446f 85320->85324 85636 413f9a 85320->85636 85642 4041f1 85320->85642 85649 404915 85320->85649 85664 40428c connect 85320->85664 85724 4047eb WaitForSingleObject 85320->85724 85739 404c9e 28 API calls 85320->85739 85740 41a96d GlobalMemoryStatusEx 85320->85740 85741 413683 50 API calls 85320->85741 85742 4082dc 28 API calls 85320->85742 85743 440c51 26 API calls 85320->85743 85744 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 85320->85744 85321 403b40 28 API calls 85321->85324 85324->85320 85324->85321 85325 401d64 28 API calls 85324->85325 85329 41ad46 28 API calls 85324->85329 85332 41aec8 28 API calls 85324->85332 85334 40275c 28 API calls 85324->85334 85335 405ce6 28 API calls 85324->85335 85336 4027cb 28 API calls 85324->85336 85338 401eea 26 API calls 85324->85338 85339 401e13 26 API calls 85324->85339 85342 401f66 28 API calls 85324->85342 85343 41a686 79 API calls 85324->85343 85344 414b22 CreateThread 85324->85344 85745 40cbf1 6 API calls 85324->85745 85746 41adee 28 API calls 85324->85746 85748 41aca0 GetLastInputInfo GetTickCount 85324->85748 85749 41ac52 30 API calls ___scrt_fastfail 85324->85749 85750 40e679 29 API calls 85324->85750 85751 4027ec 28 API calls 85324->85751 85752 404468 59 API calls _Yarn 85324->85752 85753 4045d5 111 API calls _Yarn 85324->85753 85754 40a767 84 API calls 85324->85754 85326 4144ed GetTickCount 85325->85326 85747 41ad46 28 API calls 85326->85747 85329->85324 85332->85324 85334->85324 85335->85324 85336->85324 85338->85324 85339->85324 85342->85324 85343->85324 85344->85324 85773 419e89 103 API calls 85344->85773 85345->84638 85346->84649 85349 4085c0 85348->85349 85350 402e78 28 API calls 85349->85350 85351 4085e4 85350->85351 85351->84670 85353 4124e1 RegQueryValueExA RegCloseKey 85352->85353 85354 41250b 85352->85354 85353->85354 85354->84666 85355->84673 85356->84702 85357->84695 85358->84687 85359->84700 85360->84780 85361->84739 85362->84774 85363->84809 85364->84819 85365->84840 85366->84830 85367->84864 85369 401e0c 85368->85369 85370->84693 85373 40e183 85372->85373 85374 41a65c LoadResource LockResource SizeofResource 85372->85374 85373->84920 85374->85373 85376 401f8e 85375->85376 85382 402325 85376->85382 85378 401fa4 85378->84924 85380 401f86 28 API calls 85379->85380 85381 406066 85380->85381 85381->84931 85383 40232f 85382->85383 85385 40233a 85383->85385 85386 40294a 28 API calls 85383->85386 85385->85378 85386->85385 85389 40250d 85387->85389 85388 40252b 85388->84935 85389->85388 85391 40261a 28 API calls 85389->85391 85391->85388 85392->84956 85393->84956 85394->84946 85395->84937 85396->84960 85397->84965 85398->84962 85402 402e85 85400->85402 85401 402ea9 85401->84975 85402->85401 85403 402e98 85402->85403 85405 402eae 85402->85405 85407 403445 28 API calls 85403->85407 85405->85401 85408 40225b 26 API calls 85405->85408 85407->85401 85408->85401 85410 404bd0 85409->85410 85413 40245c 85410->85413 85412 404be4 85412->84978 85414 402469 85413->85414 85416 402478 85414->85416 85417 402ad3 28 API calls 85414->85417 85416->85412 85417->85416 85418->84982 85419->84985 85421 401e94 85420->85421 85423 41b183 85422->85423 85424 41b168 GetCurrentProcess IsWow64Process 85422->85424 85423->84996 85424->85423 85425 41b17f 85424->85425 85425->84996 85427 412541 RegQueryValueExA RegCloseKey 85426->85427 85428 412569 85426->85428 85427->85428 85429 401f66 28 API calls 85428->85429 85430 41257e 85429->85430 85430->84999 85431->85010 85433 40b02f 85432->85433 85436 40b04b 85433->85436 85435 40b045 85435->85018 85437 40b055 85436->85437 85439 40b060 85437->85439 85440 40b138 28 API calls 85437->85440 85439->85435 85440->85439 85441->85022 85442->85025 85444 403b48 85443->85444 85453 403b7a 85444->85453 85447->85037 85448->85062 85449->85061 85450->85051 85451->85055 85452->85063 85454 403b86 85453->85454 85457 403b9e 85454->85457 85456 403b5a 85456->85043 85458 403ba8 85457->85458 85460 403bb3 85458->85460 85461 403cfd 28 API calls 85458->85461 85460->85456 85461->85460 85463 408577 85462->85463 85501 402ca8 85463->85501 85465 40859b 85465->85094 85467 40bba1 85466->85467 85468 40bbdd 85466->85468 85510 40b0dd 85467->85510 85469 40bc1e 85468->85469 85471 40b0dd 28 API calls 85468->85471 85472 40bc5f 85469->85472 85475 40b0dd 28 API calls 85469->85475 85474 40bbf4 85471->85474 85472->85107 85473 40bbb3 85476 4028cf 28 API calls 85473->85476 85477 4028cf 28 API calls 85474->85477 85478 40bc35 85475->85478 85479 40bbbd 85476->85479 85482 40bbfe 85477->85482 85480 4028cf 28 API calls 85478->85480 85481 412774 29 API calls 85479->85481 85483 40bc3f 85480->85483 85484 40bbd1 85481->85484 85485 412774 29 API calls 85482->85485 85486 412774 29 API calls 85483->85486 85487 401e13 26 API calls 85484->85487 85488 40bc12 85485->85488 85489 40bc53 85486->85489 85487->85468 85490 401e13 26 API calls 85488->85490 85491 401e13 26 API calls 85489->85491 85490->85469 85491->85472 85514 402d8b 85492->85514 85494 4028dd 85494->85097 85496 4127c6 85495->85496 85499 412789 85495->85499 85497 401e13 26 API calls 85496->85497 85498 40be89 85497->85498 85498->85149 85500 4127a2 RegSetValueExW RegCloseKey 85499->85500 85500->85496 85503 402cb5 85501->85503 85502 402cd9 85502->85465 85503->85502 85504 402cc8 85503->85504 85506 402cde 85503->85506 85508 403374 28 API calls 85504->85508 85506->85502 85509 402f21 26 API calls 85506->85509 85508->85502 85509->85502 85511 40b0e9 85510->85511 85512 402ca8 28 API calls 85511->85512 85513 40b10c 85512->85513 85513->85473 85515 402d97 85514->85515 85518 4030f7 85515->85518 85517 402dab 85517->85494 85519 403101 85518->85519 85521 403115 85519->85521 85522 4036c2 28 API calls 85519->85522 85521->85517 85522->85521 85524 40230d 85523->85524 85525 402325 28 API calls 85524->85525 85526 401f80 85525->85526 85526->84750 85545 43a545 85527->85545 85529 43998b 85554 4392de 38 API calls 3 library calls 85529->85554 85531 439950 85531->85529 85532 439965 85531->85532 85544 40dd54 85531->85544 85552 445354 20 API calls __dosmaperr 85532->85552 85534 43996a 85553 43a827 26 API calls _Deallocate 85534->85553 85537 439997 85538 4399c6 85537->85538 85555 43a58a 42 API calls __Tolower 85537->85555 85541 439a32 85538->85541 85556 43a4f1 26 API calls 2 library calls 85538->85556 85557 43a4f1 26 API calls 2 library calls 85541->85557 85542 439af9 _swprintf 85542->85544 85558 445354 20 API calls __dosmaperr 85542->85558 85544->84767 85544->84768 85546 43a54a 85545->85546 85547 43a55d 85545->85547 85559 445354 20 API calls __dosmaperr 85546->85559 85547->85531 85549 43a54f 85560 43a827 26 API calls _Deallocate 85549->85560 85551 43a55a 85551->85531 85552->85534 85553->85544 85554->85537 85555->85537 85556->85541 85557->85542 85558->85544 85559->85549 85560->85551 85565 401e9b 85561->85565 85563 4027d9 85563->85189 85564->85193 85566 401ea7 85565->85566 85567 40245c 28 API calls 85566->85567 85568 401eb9 85567->85568 85568->85563 85570 409855 85569->85570 85571 4124b7 3 API calls 85570->85571 85572 40985c 85571->85572 85573 409870 85572->85573 85574 40988a 85572->85574 85575 4095cf 85573->85575 85576 409875 85573->85576 85586 4082dc 28 API calls 85574->85586 85575->84803 85584 4082dc 28 API calls 85576->85584 85579 409898 85587 4098a5 85 API calls 85579->85587 85580 409883 85585 409959 29 API calls 85580->85585 85583 409888 85583->85575 85584->85580 85585->85583 85588 40999f 130 API calls 85585->85588 85586->85579 85587->85575 85589 4099b5 53 API calls 85587->85589 85590 4099a9 125 API calls 85587->85590 85594 403dc2 85591->85594 85593 403cc9 85593->85230 85595 403dce 85594->85595 85598 402ffd 85595->85598 85597 403de3 85597->85593 85599 40300e 85598->85599 85604 4032a4 85599->85604 85603 40302e 85603->85597 85605 4032b0 85604->85605 85606 40301a 85604->85606 85610 4032b6 28 API calls 85605->85610 85606->85603 85609 4035e8 28 API calls 85606->85609 85609->85603 85617 4395ba 85611->85617 85615 412814 85614->85615 85616 4127ed RegSetValueExA RegCloseKey 85614->85616 85615->85253 85616->85615 85620 43953b 85617->85620 85619 401608 85619->85255 85621 43954a 85620->85621 85623 43955e 85620->85623 85628 445354 20 API calls __dosmaperr 85621->85628 85627 43955a __alldvrm 85623->85627 85630 447601 11 API calls 2 library calls 85623->85630 85624 43954f 85629 43a827 26 API calls _Deallocate 85624->85629 85627->85619 85628->85624 85629->85627 85630->85627 85634 41aab9 _Yarn ___scrt_fastfail 85631->85634 85632 401f66 28 API calls 85633 41ab2e 85632->85633 85633->85260 85634->85632 85635->85276 85637 413fb3 WSASetLastError 85636->85637 85638 413fa9 85636->85638 85637->85320 85755 413e37 35 API calls ___std_exception_copy 85638->85755 85640 413fae 85640->85637 85643 404206 socket 85642->85643 85644 4041fd 85642->85644 85646 404220 85643->85646 85647 404224 CreateEventW 85643->85647 85756 404262 WSAStartup 85644->85756 85646->85320 85647->85320 85648 404202 85648->85643 85648->85646 85650 4049b1 85649->85650 85651 40492a 85649->85651 85650->85320 85652 404933 85651->85652 85653 404987 CreateEventA CreateThread 85651->85653 85654 404942 GetLocalTime 85651->85654 85652->85653 85653->85650 85759 404b1d 85653->85759 85757 41ad46 28 API calls 85654->85757 85656 40495b 85758 404c9e 28 API calls 85656->85758 85658 404968 85659 401f66 28 API calls 85658->85659 85660 404977 85659->85660 85661 41a686 79 API calls 85660->85661 85662 40497c 85661->85662 85663 401eea 26 API calls 85662->85663 85663->85653 85665 4043e1 85664->85665 85666 4042b3 85664->85666 85667 404343 85665->85667 85668 4043e7 WSAGetLastError 85665->85668 85666->85667 85671 404cbf 28 API calls 85666->85671 85691 4042e8 85666->85691 85667->85320 85668->85667 85669 4043f7 85668->85669 85672 4042f7 85669->85672 85673 4043fc 85669->85673 85675 4042d4 85671->85675 85677 401f66 28 API calls 85672->85677 85768 41bc76 30 API calls 85673->85768 85674 4042f0 85674->85672 85680 404306 85674->85680 85678 401f66 28 API calls 85675->85678 85681 404448 85677->85681 85682 4042e3 85678->85682 85679 40440b 85769 404c9e 28 API calls 85679->85769 85688 404315 85680->85688 85689 40434c 85680->85689 85684 401f66 28 API calls 85681->85684 85685 41a686 79 API calls 85682->85685 85690 404457 85684->85690 85685->85691 85686 404418 85687 401f66 28 API calls 85686->85687 85692 404427 85687->85692 85694 401f66 28 API calls 85688->85694 85765 420f34 55 API calls 85689->85765 85695 41a686 79 API calls 85690->85695 85763 420151 27 API calls 85691->85763 85696 41a686 79 API calls 85692->85696 85698 404324 85694->85698 85695->85667 85699 40442c 85696->85699 85697 404354 85700 404389 85697->85700 85701 404359 85697->85701 85702 401f66 28 API calls 85698->85702 85703 401eea 26 API calls 85699->85703 85767 4202ea 28 API calls 85700->85767 85704 401f66 28 API calls 85701->85704 85705 404333 85702->85705 85703->85667 85707 404368 85704->85707 85708 41a686 79 API calls 85705->85708 85710 401f66 28 API calls 85707->85710 85711 404338 85708->85711 85709 404391 85712 4043be CreateEventW CreateEventW 85709->85712 85713 401f66 28 API calls 85709->85713 85714 404377 85710->85714 85764 41dc15 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 85711->85764 85712->85667 85715 4043a7 85713->85715 85716 41a686 79 API calls 85714->85716 85718 401f66 28 API calls 85715->85718 85719 40437c 85716->85719 85720 4043b6 85718->85720 85766 420592 53 API calls 85719->85766 85722 41a686 79 API calls 85720->85722 85723 4043bb 85722->85723 85723->85712 85725 404805 SetEvent CloseHandle 85724->85725 85726 40481c closesocket 85724->85726 85727 40489c 85725->85727 85728 404829 85726->85728 85727->85320 85729 40483f 85728->85729 85770 404ab1 83 API calls 85728->85770 85731 404851 WaitForSingleObject 85729->85731 85732 404892 SetEvent CloseHandle 85729->85732 85771 41dc15 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 85731->85771 85732->85727 85734 404860 SetEvent WaitForSingleObject 85772 41dc15 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 85734->85772 85736 404878 SetEvent CloseHandle CloseHandle 85736->85732 85737->85320 85738->85320 85739->85320 85740->85320 85741->85320 85742->85320 85743->85320 85744->85320 85745->85324 85746->85324 85747->85324 85748->85324 85749->85324 85750->85324 85751->85324 85752->85324 85753->85324 85754->85324 85755->85640 85756->85648 85757->85656 85758->85658 85762 404b29 101 API calls 85759->85762 85761 404b26 85762->85761 85763->85674 85764->85667 85765->85697 85766->85711 85767->85709 85768->85679 85769->85686 85770->85729 85771->85734 85772->85736 85778 40e56a 85774->85778 85775 4124b7 3 API calls 85775->85778 85776 40e60e 85809 4082dc 28 API calls 85776->85809 85778->85775 85778->85776 85780 40e59c 85778->85780 85781 40e5fe Sleep 85778->85781 85782 41ae08 28 API calls 85778->85782 85787 412774 29 API calls 85778->85787 85789 401e13 26 API calls 85778->85789 85792 401f66 28 API calls 85778->85792 85796 4126d2 29 API calls 85778->85796 85808 4082dc 28 API calls 85778->85808 85807 40bf04 73 API calls ___scrt_fastfail 85780->85807 85781->85778 85782->85778 85783 40e619 85785 41ae08 28 API calls 85783->85785 85786 40e625 85785->85786 85788 412774 29 API calls 85786->85788 85787->85778 85790 40e638 85788->85790 85789->85778 85791 401e13 26 API calls 85790->85791 85793 40e644 85791->85793 85792->85778 85794 401f66 28 API calls 85793->85794 85795 40e655 85794->85795 85797 4126d2 29 API calls 85795->85797 85796->85778 85798 40e668 85797->85798 85810 411699 TerminateProcess WaitForSingleObject 85798->85810 85800 40e670 ExitProcess 85811 411637 60 API calls 85801->85811 85808->85778 85809->85783 85810->85800

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 101 40e134-40e154 call 401e8f call 412902 call 4112b5 70->101 89 40d9b5-40d9bc 79->89 90 40d9ae-40d9b0 79->90 80->79 99 40d98e-40d9a4 call 401e8f call 412902 80->99 94 40d9c0-40d9cc call 41a463 89->94 95 40d9be 89->95 93 40dc95 90->93 93->49 105 40d9d5-40d9d9 94->105 106 40d9ce-40d9d0 94->106 95->94 99->79 108 40da18-40da2b call 401d64 call 401e8f 105->108 109 40d9db call 40697b 105->109 106->105 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 108->127 128 40da2d call 4069ba 108->128 117 40d9e0-40d9e2 109->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->108 138 40da03-40da09 121->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->108 140 40da0b-40da11 138->140 140->108 141 40da13 call 4064d0 140->141 141->108 166 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->166 167 40db2c-40db33 163->167 164->163 190 40dad7-40db03 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e 164->190 222 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 166->222 169 40dbb1-40dbbb call 4082d7 167->169 170 40db35-40dba7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 167->170 177 40dbc0-40dbe4 call 4022f8 call 4338c8 169->177 257 40dbac-40dbaf 170->257 198 40dbf3 177->198 199 40dbe6-40dbf1 call 436050 177->199 232 40db08-40db1d call 401e18 call 401e13 190->232 204 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 198->204 199->204 259 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 204->259 273 40dd79-40dd7b 222->273 274 40dd5e 222->274 232->163 257->177 259->222 272 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 259->272 272->222 292 40dc93 272->292 275 40dd81 273->275 276 40dd7d-40dd7f 273->276 278 40dd60-40dd77 call 41beb0 CreateThread 274->278 279 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->279 276->278 278->279 330 40dea1 279->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 279->331 292->93 332 40dea3-40debb call 401d64 call 401e8f 330->332 331->332 343 40def9-40df0c call 401d64 call 401e8f 332->343 344 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 332->344 353 40df6c-40df7f call 401d64 call 401e8f 343->353 354 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 343->354 344->343 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 353->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 353->366 354->353 365->366 388 40dfe0-40dfe1 SetProcessDEPPolicy 366->388 389 40dfe3-40dff6 CreateThread 366->389 388->389 392 40e004-40e00b 389->392 393 40dff8-40e002 CreateThread 389->393 394 40e019-40e020 392->394 395 40e00d-40e017 CreateThread 392->395 393->392 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 413 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->413 414 40e12a-40e12f call 40cbac call 413fd4 401->414 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 413->433 414->101 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->414 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                              APIs
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\xenor\yavascript.exe,00000104), ref: 0040D790
                                • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\AppData\Roaming\xenor\yavascript.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-I7G983$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                              • API String ID: 2830904901-586411355
                              • Opcode ID: 5141310b9409c8181baed94e95acb0445a318c8d43a54c59fa0c125716c6c131
                              • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                              • Opcode Fuzzy Hash: 5141310b9409c8181baed94e95acb0445a318c8d43a54c59fa0c125716c6c131
                              • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                              Control-flow Graph

                              APIs
                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(?), ref: 00412500
                              • Sleep.KERNELBASE(00000BB8), ref: 0040E603
                              • ExitProcess.KERNEL32 ref: 0040E672
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.3.0 Pro$override$pth_unenc$BG
                              • API String ID: 2281282204-3981147832
                              • Opcode ID: dfe2531f520bed85f9cdb59775d1ab774bc167180b9f37c3c00246875b636479
                              • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                              • Opcode Fuzzy Hash: dfe2531f520bed85f9cdb59775d1ab774bc167180b9f37c3c00246875b636479
                              • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                              APIs
                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 384173800-625181639
                              • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                              • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                              Control-flow Graph

                              APIs
                              • _wcslen.LIBCMT ref: 0040BC75
                              • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                              • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\xenor\yavascript.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                              • _wcslen.LIBCMT ref: 0040BD54
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                              • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\xenor\yavascript.exe,00000000,00000000), ref: 0040BDF2
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                              • _wcslen.LIBCMT ref: 0040BE34
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                              • ExitProcess.KERNEL32 ref: 0040BED0
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\AppData\Roaming\xenor\yavascript.exe$del$open$BG$BG
                              • API String ID: 1579085052-2160352743
                              • Opcode ID: 36c0cd1c3c4fd77ebc50aa894e8f0e29d6fb1f7c866a37c39af5c7f33181b06f
                              • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                              • Opcode Fuzzy Hash: 36c0cd1c3c4fd77ebc50aa894e8f0e29d6fb1f7c866a37c39af5c7f33181b06f
                              • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1023 40428c-4042ad connect 1024 4043e1-4043e5 1023->1024 1025 4042b3-4042b6 1023->1025 1028 4043e7-4043f5 WSAGetLastError 1024->1028 1029 40445f 1024->1029 1026 4043da-4043dc 1025->1026 1027 4042bc-4042bf 1025->1027 1030 404461-404465 1026->1030 1031 4042c1-4042e8 call 404cbf call 401f66 call 41a686 1027->1031 1032 4042eb-4042f5 call 420151 1027->1032 1028->1029 1033 4043f7-4043fa 1028->1033 1029->1030 1031->1032 1042 404306-404313 call 420373 1032->1042 1043 4042f7-404301 1032->1043 1036 404439-40443e 1033->1036 1037 4043fc-404437 call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 1033->1037 1039 404443-40445c call 401f66 * 2 call 41a686 1036->1039 1037->1029 1039->1029 1056 404315-404338 call 401f66 * 2 call 41a686 1042->1056 1057 40434c-404357 call 420f34 1042->1057 1043->1039 1086 40433b-404347 call 420191 1056->1086 1069 404389-404396 call 4202ea 1057->1069 1070 404359-404387 call 401f66 * 2 call 41a686 call 420592 1057->1070 1082 404398-4043bb call 401f66 * 2 call 41a686 1069->1082 1083 4043be-4043d7 CreateEventW * 2 1069->1083 1070->1086 1082->1083 1083->1026 1086->1029
                              APIs
                              • connect.WS2_32(?,02CFB608,00000010), ref: 004042A5
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                              • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-2151626615
                              • Opcode ID: 27fdb4641d6acd07b184f880d004bf5cd07ef12742efe0f1b4729e589d035c4c
                              • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                              • Opcode Fuzzy Hash: 27fdb4641d6acd07b184f880d004bf5cd07ef12742efe0f1b4729e589d035c4c
                              • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1098 40c89e-40c8c3 call 401e52 1101 40c8c9 1098->1101 1102 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1098->1102 1104 40c8d0-40c8d5 1101->1104 1105 40c9c2-40c9c7 1101->1105 1106 40c905-40c90a 1101->1106 1107 40c9d8 1101->1107 1108 40c9c9-40c9d6 call 43ac0f 1101->1108 1109 40c8da-40c8e8 call 41a74b call 401e18 1101->1109 1110 40c8fb-40c900 1101->1110 1111 40c9bb-40c9c0 1101->1111 1112 40c90f-40c916 call 41b15b 1101->1112 1123 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1102->1123 1114 40c9dd call 43ac0f 1104->1114 1105->1114 1106->1114 1107->1114 1108->1107 1126 40c9e3-40c9e8 call 4082d7 1108->1126 1129 40c8ed 1109->1129 1110->1114 1111->1114 1124 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1112->1124 1125 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1112->1125 1127 40c9e2 1114->1127 1134 40c8f1-40c8f6 call 401e13 1124->1134 1125->1129 1126->1102 1127->1126 1129->1134 1134->1102
                              APIs
                              • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040CA04
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: 3977c170ac270ccfa71e1007a8ad33575faf59904b9171250ae5d368ec72fc24
                              • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                              • Opcode Fuzzy Hash: 3977c170ac270ccfa71e1007a8ad33575faf59904b9171250ae5d368ec72fc24
                              • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 782494840-2070987746
                              • Opcode ID: 28b77fa3588982cca22922cee5d051b50bc4776d5b2edfd1017c3d77a4d800f6
                              • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                              • Opcode Fuzzy Hash: 28b77fa3588982cca22922cee5d051b50bc4776d5b2edfd1017c3d77a4d800f6
                              • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1335 412774-412787 RegCreateKeyW 1336 4127c6 1335->1336 1337 412789-4127c4 call 4022f8 call 401e07 RegSetValueExW RegCloseKey 1335->1337 1339 4127c8-4127d4 call 401e13 1336->1339 1337->1339
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                              • RegSetValueExW.KERNELBASE(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                              • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc$BG
                              • API String ID: 1818849710-2233081382
                              • Opcode ID: 9bd9232c4b8590a7d93048f7495ac46979be2d34d63401f044812075805c3c4b
                              • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                              • Opcode Fuzzy Hash: 9bd9232c4b8590a7d93048f7495ac46979be2d34d63401f044812075805c3c4b
                              • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1345 4126d2-4126e9 RegCreateKeyA 1346 412722 1345->1346 1347 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1345->1347 1349 412724-412730 call 401eea 1346->1349 1347->1349
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                              • RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                              • RegCloseKey.ADVAPI32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: HgF$pth_unenc
                              • API String ID: 1818849710-3662775637
                              • Opcode ID: ce7a8c297aac78f89b2edf865624ec7a93899207715951d49f746f26ba657cbc
                              • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                              • Opcode Fuzzy Hash: ce7a8c297aac78f89b2edf865624ec7a93899207715951d49f746f26ba657cbc
                              • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1355 404915-404924 1356 4049b1 1355->1356 1357 40492a-404931 1355->1357 1358 4049b3-4049b7 1356->1358 1359 404933-404937 1357->1359 1360 404939-404940 1357->1360 1361 404987-4049af CreateEventA CreateThread 1359->1361 1360->1361 1362 404942-404982 GetLocalTime call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1360->1362 1361->1358 1362->1361
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404946
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 004049A7
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: 6aeed475a3f550dc3ae4c2b7602678861d87bd9aac3a8b8f18cfcebc726a59b2
                              • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                              • Opcode Fuzzy Hash: 6aeed475a3f550dc3ae4c2b7602678861d87bd9aac3a8b8f18cfcebc726a59b2
                              • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1372 4127d5-4127eb RegCreateKeyA 1373 412818-41281b 1372->1373 1374 4127ed-412812 RegSetValueExA RegCloseKey 1372->1374 1374->1373 1375 412814-412817 1374->1375
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: TUF
                              • API String ID: 1818849710-3431404234
                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1379 412513-41253f RegOpenKeyExA 1380 412541-412567 RegQueryValueExA RegCloseKey 1379->1380 1381 412572 1379->1381 1380->1381 1382 412569-412570 1380->1382 1383 412577-412583 call 401f66 1381->1383 1382->1383
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                              • RegCloseKey.ADVAPI32(?), ref: 0041255F
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: fb0399a994eaa7e17bc6b867fc74c46ca573e9fca6dfde94924c7a451072e484
                              • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                              • Opcode Fuzzy Hash: fb0399a994eaa7e17bc6b867fc74c46ca573e9fca6dfde94924c7a451072e484
                              • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                              • RegCloseKey.ADVAPI32(?), ref: 00412500
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                              • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                              • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                              • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                              • RegCloseKey.ADVAPI32(?,?,?,0040B996,004660E0), ref: 004124A4
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                              • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                              • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                              • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen
                              • String ID: xAG
                              • API String ID: 176396367-2759412365
                              • Opcode ID: 6837b32800aa6a1e3178c5689337f86c29767fd775bf0efde663e0a9ccfc8157
                              • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                              • Opcode Fuzzy Hash: 6837b32800aa6a1e3178c5689337f86c29767fd775bf0efde663e0a9ccfc8157
                              • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                              APIs
                              • _free.LIBCMT ref: 0044B9DF
                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                              • RtlReAllocateHeap.NTDLL(00000000,00475D30,?,00000004,00000000,?,0044E90A,00475D30,00000004,?,00475D30,?,?,00443125,00475D30,?), ref: 0044BA1B
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap$_free
                              • String ID:
                              • API String ID: 1482568997-0
                              • Opcode ID: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                              • Instruction ID: 12956794463f81a5c067cbc08b9f94d22fea268b9007f3edb04f63306941b305
                              • Opcode Fuzzy Hash: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                              • Instruction Fuzzy Hash: D6F0F67210051167FF212A27AC01B6B2B2CDFC27B1F15012BFA18AA292DF6CCC0191EE
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C93796
                              • Module32First.KERNEL32(00000000,00000224), ref: 02C937B6
                              Memory Dump Source
                              • Source File: 00000010.00000002.2976585478.0000000002C92000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C92000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_2c92000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFirstModule32SnapshotToolhelp32
                              • String ID:
                              • API String ID: 3833638111-0
                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                              • Instruction ID: fd4489b8cbd10623f8b88e3d8bfcd5429ec4ad9e6fefc4542884b02304c8c57c
                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                              • Instruction Fuzzy Hash: 72F0F6712003507BDB203BF5AD8CB6EB6E8EF89624F1001A8E642D24C0CB71E9054A60
                              APIs
                              • socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEventStartupsocket
                              • String ID:
                              • API String ID: 1953588214-0
                              • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                              • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                              • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                              • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                              APIs
                              • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,00474358), ref: 0041A7BF
                              • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: Name$ComputerUser
                              • String ID:
                              • API String ID: 4229901323-0
                              • Opcode ID: 67fb3bcb8fe4c7113016bc8b0eea450cd06ff407998a9f5e6327ad689a3ced9e
                              • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                              • Opcode Fuzzy Hash: 67fb3bcb8fe4c7113016bc8b0eea450cd06ff407998a9f5e6327ad689a3ced9e
                              • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,00434411,?,?,?,?,?,?,?,?,00434411,?,0046D644,00404AD0), ref: 00437C37
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw$ExceptionRaise
                              • String ID:
                              • API String ID: 3476068407-0
                              • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                              • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                              • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                              • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                              • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                              • Opcode Fuzzy Hash: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                              • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                              APIs
                              • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                              • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                              • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                              • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                              APIs
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                              • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                              APIs
                              Memory Dump Source
                              • Source File: 00000010.00000002.2975049142.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000010.00000002.2975049142.0000000000473000.00000040.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000010.00000002.2975049142.0000000000476000.00000040.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_400000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: send
                              • String ID:
                              • API String ID: 2809346765-0
                              • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                              • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                              • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                              • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                              APIs
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C9347E
                              Memory Dump Source
                              • Source File: 00000010.00000002.2976585478.0000000002C92000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C92000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_16_2_2c92000_yavascript.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                              • Instruction ID: 84a5a99320ba399cfe79cdcd54bf7398f09ce145a4ce2ca1216bd6f46f4270d1
                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                              • Instruction Fuzzy Hash: 94113C79A00208EFDB01DF98C989E98BFF5AF08751F058094F9489B361D375EA50EF80